Content area
Full text
Abstract: Data breaches have gained extensive coverage as businesses and organisations of all sizes become more dependent on digital data, cloud computing and workforce mobility. Companies store sensitive or confidential data on local machines, enterprise databases and cloud servers. To breach a company's data one needs to gain access to restricted networks. Although this is a difficult task that requires specialised skills, hackers continuously identify vulnerabilities and loopholes to gain access and conduct data breaches. The Privacy Rights Clearinghouse1 recorded 901,010,077 data breaches since 2005, with only 5,220 data breaches made public. In 2015 some of the world's largest recorded data breaches occurred; yet a total of only 266 data breaches were made public. 2016 still had a number of major data breaches and a total of 472 breaches were made public. When conducting business in the modern era, data protection and management of personal information have become an integral aspect for organisations and individuals. Despite increased focus on personal information and the existence of data protection legislation internationally, data breaches remain a common occurrence resulting in major cost implications. This paper investigates the most significant data breaches in 2015 and 2016 responsible for the leakage of personal information, with the aim of identifying a general trend in terms of data breaches and personal identifiable (PII) leakage.
Keywords: data breaches, data leakage, hack, PII, privacy
1.Introduction
An essential part of the digital economy today is security and privacy. Policies and legislations are being established world-wide to ensure that people around the world have an open and interconnected digital world (oecd.org 2013). However, even with comprehensive policies and privacy legislation already established in a number of countries across the world, data breaches are not only increasing in frequency, but also in breach size. It is possible to say that these breaches have now become a fact of digital life (Weise 2016). A data breach occur when personal identifiable information (PII) has been lost or maliciously stolen and therefore is at risk of being exposed (Romanosky, S. 2011). A data breach can result in large numbers of compromised records containing PII and could potentially lead to identity theft and other related crimes. PII can include an individual's government issued identification; contact information; birth date and place;...




