SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
What retailers want
you to know
about…..ı
DATA SECURITYı
A data breach is the
unauthorized
acquisition of sensitive
personal information in
digital, electronic or
computerized form that
creates a risk of
financial harm to a
consumer.
What is a data breach?ı
Cybercriminals are constantly trolling for
financial data in order to steal card numbers
and convert them into cash.
Who is breaching?ı
 According to Verizon,
retail represents
8 percent of data
breaches while the
financial services
industry accounts for
13 percent.
Hackers don’t
discriminate – data
breaches have targeted a
wide variety of
businesses from the
entertainment industry
to financial services.
Where do breaches
happen?ı
*The information on this slide was updated to reflect a 2015 report.
Why retailers care about
data security. ı
As a consumer-facing
and reliant industry,
retailers and
merchants value
every interaction
with their
customers. 	
  	
  
Retailers work every single
day and make significant
contributions and
investments in
data, information
and payment
security to
ensure that the
retail-customer
relationship is
secure and protected. 	
  	
  
Cards are fraud proneı
The thief uses
your card, signs
your name and
makes a purchase.
The thief creates a duplicate
card, signs your name and
makes a purchase.
	
  
PIN-and-Chip ı
Since 2005, the National Retail Federation
has urged banks and payment card
companies to switch to more secure PIN-
and-chip cards, which replace the
magnetic stripe with a computer
microchip and replace the signature with
a Personal Identification Number(PIN) to
better protect consumers’ financial data
when they shop.
The new credit cards being issued this
year need to have both a chip and a
PIN, not just a chip as proposed by
most banks and credit unions. The
chip ensures that the card is the one
issued by the bank but the PIN is
needed to ensure that the person
using the card is the actual cardholder
and not a thief who stole your chip
card.
	
  
*Source: Financial Fraud Action UK
Cyber Threat Information
Sharingı
 Congress must pass laws that make it easier for
companies to share information and emerging
threats without hesitation.
NRF’s Efforts to Improve
Threat Information Sharingı
To help fight cybersecurity threats to retailers’
systems, NRF created the Information Technology
Security Council, which keeps retailers up to date on
the latest news, information and threats. More than
150 retail companies are actively involved.
Notification isn't uniformı
For the past decade, NRF has called for a uniform
nationwide data breach notification standard that would
preempt the patchwork of 47 state laws. This uniform
federal law should be based on and reflect the strong
consensus of state laws.
The current patchwork of state and local data breach
notice laws with conflicting requirements doesn’t work
because it diverts limited resources that should be
focused on restoring the integrity of a breached
system.
Data Breach Notification
Lawı
A nationwide breach notification law must preempt
state and local laws so businesses and consumers
understand what disclosures are expected regardless
of when or where breaches occur.
Data breach notification should be appropriate,
reasonable, relevant and timely.
Federal data breach notification requirements should
be comprehensive and apply to every entity that
maintains or transmits sensitive information, not just
retailers.
Industries are held to
different standardsı
 Merchants have multiple tiers of data security standards. These include
Payment Card Industry standards for all merchants accepting payment
cards, as well as specific state standards to protect sensitive information.
The Federal Trade Commission also enforces federal standards that
require all merchants to have reasonable data security protections.
Other breached
entities just need to
follow industry-
specific guidance.
	
  
Cover all entities
involved in data breachı
A data breach
notification law should
cover the entire
payments system from
card companies to
telecommunications
firms without
exception or
exemption. Arbitrary
timeframes or
industry-specific
requirements that
cover only certain
entities should not be
established.
*The information on this slide was updated to reflect a 2015 report.
Learn more: nrf.com/datasecurity

Contenu connexe

Tendances

Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 

Tendances (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
HOW TO RETALIATE AGAINST CYBER THREATS WITH PAYMENT-OVER-TIME MODELS
HOW TO RETALIATE AGAINST CYBER THREATS WITH PAYMENT-OVER-TIME MODELS HOW TO RETALIATE AGAINST CYBER THREATS WITH PAYMENT-OVER-TIME MODELS
HOW TO RETALIATE AGAINST CYBER THREATS WITH PAYMENT-OVER-TIME MODELS
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 

En vedette

List of retail companies in india
List of retail companies in indiaList of retail companies in india
List of retail companies in india
KALPESHASHA
 

En vedette (12)

How TPA Works
How TPA WorksHow TPA Works
How TPA Works
 
NRF's Retail Across America in photos
NRF's Retail Across America in photosNRF's Retail Across America in photos
NRF's Retail Across America in photos
 
List of retail companies in india
List of retail companies in indiaList of retail companies in india
List of retail companies in india
 
Top reasons retail employees go back to school
Top reasons retail employees go back to school Top reasons retail employees go back to school
Top reasons retail employees go back to school
 
Uniquely Gen Z
Uniquely Gen ZUniquely Gen Z
Uniquely Gen Z
 
AWS Meetup - Nordstrom Data Lab and the AWS Cloud
AWS Meetup - Nordstrom Data Lab and the AWS CloudAWS Meetup - Nordstrom Data Lab and the AWS Cloud
AWS Meetup - Nordstrom Data Lab and the AWS Cloud
 
Mexico
Mexico Mexico
Mexico
 
Argentina
Argentina Argentina
Argentina
 
CHILE
CHILECHILE
CHILE
 
Macedonia
MacedoniaMacedonia
Macedonia
 
Colombia
ColombiaColombia
Colombia
 
Top 2015 Halloween Trends
Top 2015 Halloween TrendsTop 2015 Halloween Trends
Top 2015 Halloween Trends
 

Similaire à What retailers want you to know about data security

Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
Peter Tran
 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens Bank
Michael Ouellet
 
Data Breaches
Data BreachesData Breaches
Data Breaches
sstose
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
Aspiration Software LLC
 

Similaire à What retailers want you to know about data security (20)

The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens Bank
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
Insurance Fraud Whitepaper
Insurance Fraud WhitepaperInsurance Fraud Whitepaper
Insurance Fraud Whitepaper
 

Plus de National Retail Federation

Plus de National Retail Federation (20)

Conversational digital humans: The future of retail?
Conversational digital humans: The future of retail?Conversational digital humans: The future of retail?
Conversational digital humans: The future of retail?
 
Drive enhanced customer experiences with the power of data
Drive enhanced customer experiences with the power of dataDrive enhanced customer experiences with the power of data
Drive enhanced customer experiences with the power of data
 
Driving optimal decision-making in fresh grocery
Driving optimal decision-making in fresh groceryDriving optimal decision-making in fresh grocery
Driving optimal decision-making in fresh grocery
 
Five Guys and Flybuy - Challenges, innovations, and what's next
Five Guys and Flybuy - Challenges, innovations, and what's nextFive Guys and Flybuy - Challenges, innovations, and what's next
Five Guys and Flybuy - Challenges, innovations, and what's next
 
Thermal intelligence - Advancing food safety and profitability for retailers
Thermal intelligence - Advancing food safety and profitability for retailersThermal intelligence - Advancing food safety and profitability for retailers
Thermal intelligence - Advancing food safety and profitability for retailers
 
NRF 2023 Back-to-Class Consumer Trends
NRF 2023 Back-to-Class Consumer TrendsNRF 2023 Back-to-Class Consumer Trends
NRF 2023 Back-to-Class Consumer Trends
 
Unlocking the power of in-session marketing to convert the anonymous
Unlocking the power of in-session marketing to convert the anonymousUnlocking the power of in-session marketing to convert the anonymous
Unlocking the power of in-session marketing to convert the anonymous
 
Navigating uncertainty: The art and science of learning and doing 10x in a te...
Navigating uncertainty: The art and science of learning and doing 10x in a te...Navigating uncertainty: The art and science of learning and doing 10x in a te...
Navigating uncertainty: The art and science of learning and doing 10x in a te...
 
Building deeper empathy for your customers in uncertain times and beyond
Building deeper empathy for your customers in uncertain times and beyondBuilding deeper empathy for your customers in uncertain times and beyond
Building deeper empathy for your customers in uncertain times and beyond
 
The state of commerce: Key trends and future predictions
The state of commerce: Key trends and future predictionsThe state of commerce: Key trends and future predictions
The state of commerce: Key trends and future predictions
 
Redefining intelligence: Exploring the latest advances in next-generation AI ...
Redefining intelligence: Exploring the latest advances in next-generation AI ...Redefining intelligence: Exploring the latest advances in next-generation AI ...
Redefining intelligence: Exploring the latest advances in next-generation AI ...
 
Top global consumer trends for retailers in 2023
Top global consumer trends for retailers in 2023Top global consumer trends for retailers in 2023
Top global consumer trends for retailers in 2023
 
Data-driven site selection: How understanding consumer movement drives Little...
Data-driven site selection: How understanding consumer movement drives Little...Data-driven site selection: How understanding consumer movement drives Little...
Data-driven site selection: How understanding consumer movement drives Little...
 
Can resale increase foot traffic in stores?
Can resale increase foot traffic in stores?Can resale increase foot traffic in stores?
Can resale increase foot traffic in stores?
 
Demystifying data: Profitability, people and the power of analytics
Demystifying data: Profitability, people and the power of analyticsDemystifying data: Profitability, people and the power of analytics
Demystifying data: Profitability, people and the power of analytics
 
Five reasons automation will save your restaurant
Five reasons automation will save your restaurantFive reasons automation will save your restaurant
Five reasons automation will save your restaurant
 
Retail Media Networks: How the physical store will power their next phase of ...
Retail Media Networks: How the physical store will power their next phase of ...Retail Media Networks: How the physical store will power their next phase of ...
Retail Media Networks: How the physical store will power their next phase of ...
 
Working together to combat organized retail crime
Working together to combat organized retail crimeWorking together to combat organized retail crime
Working together to combat organized retail crime
 
Voice in retail: It speaks, it listens, it’s impacting our real world businesses
Voice in retail: It speaks, it listens, it’s impacting our real world businessesVoice in retail: It speaks, it listens, it’s impacting our real world businesses
Voice in retail: It speaks, it listens, it’s impacting our real world businesses
 
A look ahead to 2023: Impasse or opportunity for a new path
A look ahead to 2023: Impasse or opportunity for a new pathA look ahead to 2023: Impasse or opportunity for a new path
A look ahead to 2023: Impasse or opportunity for a new path
 

Dernier

call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkacall Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
vikas rana
 

Dernier (9)

Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkacall Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
 
Hifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime Agartala
Hifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime AgartalaHifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime Agartala
Hifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime Agartala
 
5CL-ADBA,5cladba, the best supplier in China
5CL-ADBA,5cladba, the best supplier in China5CL-ADBA,5cladba, the best supplier in China
5CL-ADBA,5cladba, the best supplier in China
 
Planting Seeds of Success and of Failure.pdf
Planting Seeds of Success and of Failure.pdfPlanting Seeds of Success and of Failure.pdf
Planting Seeds of Success and of Failure.pdf
 
The 2024 Prime Day Panel: From Preparation to Profit
The 2024 Prime Day Panel: From Preparation to ProfitThe 2024 Prime Day Panel: From Preparation to Profit
The 2024 Prime Day Panel: From Preparation to Profit
 
Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000
Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000
Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000
 
Digital Business Strategy - How Food Brands Compete Through Technology
Digital Business Strategy - How Food Brands Compete Through TechnologyDigital Business Strategy - How Food Brands Compete Through Technology
Digital Business Strategy - How Food Brands Compete Through Technology
 
How to Start Supermarket Franchise in India
How to Start Supermarket Franchise in IndiaHow to Start Supermarket Franchise in India
How to Start Supermarket Franchise in India
 

What retailers want you to know about data security

  • 1. What retailers want you to know about…..ı DATA SECURITYı
  • 2. A data breach is the unauthorized acquisition of sensitive personal information in digital, electronic or computerized form that creates a risk of financial harm to a consumer. What is a data breach?ı
  • 3. Cybercriminals are constantly trolling for financial data in order to steal card numbers and convert them into cash. Who is breaching?ı
  • 4.  According to Verizon, retail represents 8 percent of data breaches while the financial services industry accounts for 13 percent. Hackers don’t discriminate – data breaches have targeted a wide variety of businesses from the entertainment industry to financial services. Where do breaches happen?ı *The information on this slide was updated to reflect a 2015 report.
  • 5. Why retailers care about data security. ı As a consumer-facing and reliant industry, retailers and merchants value every interaction with their customers.     Retailers work every single day and make significant contributions and investments in data, information and payment security to ensure that the retail-customer relationship is secure and protected.    
  • 6. Cards are fraud proneı The thief uses your card, signs your name and makes a purchase. The thief creates a duplicate card, signs your name and makes a purchase.  
  • 7. PIN-and-Chip ı Since 2005, the National Retail Federation has urged banks and payment card companies to switch to more secure PIN- and-chip cards, which replace the magnetic stripe with a computer microchip and replace the signature with a Personal Identification Number(PIN) to better protect consumers’ financial data when they shop. The new credit cards being issued this year need to have both a chip and a PIN, not just a chip as proposed by most banks and credit unions. The chip ensures that the card is the one issued by the bank but the PIN is needed to ensure that the person using the card is the actual cardholder and not a thief who stole your chip card.  
  • 9. Cyber Threat Information Sharingı  Congress must pass laws that make it easier for companies to share information and emerging threats without hesitation.
  • 10. NRF’s Efforts to Improve Threat Information Sharingı To help fight cybersecurity threats to retailers’ systems, NRF created the Information Technology Security Council, which keeps retailers up to date on the latest news, information and threats. More than 150 retail companies are actively involved.
  • 11. Notification isn't uniformı For the past decade, NRF has called for a uniform nationwide data breach notification standard that would preempt the patchwork of 47 state laws. This uniform federal law should be based on and reflect the strong consensus of state laws. The current patchwork of state and local data breach notice laws with conflicting requirements doesn’t work because it diverts limited resources that should be focused on restoring the integrity of a breached system.
  • 12. Data Breach Notification Lawı A nationwide breach notification law must preempt state and local laws so businesses and consumers understand what disclosures are expected regardless of when or where breaches occur. Data breach notification should be appropriate, reasonable, relevant and timely. Federal data breach notification requirements should be comprehensive and apply to every entity that maintains or transmits sensitive information, not just retailers.
  • 13. Industries are held to different standardsı  Merchants have multiple tiers of data security standards. These include Payment Card Industry standards for all merchants accepting payment cards, as well as specific state standards to protect sensitive information. The Federal Trade Commission also enforces federal standards that require all merchants to have reasonable data security protections. Other breached entities just need to follow industry- specific guidance.  
  • 14. Cover all entities involved in data breachı A data breach notification law should cover the entire payments system from card companies to telecommunications firms without exception or exemption. Arbitrary timeframes or industry-specific requirements that cover only certain entities should not be established. *The information on this slide was updated to reflect a 2015 report.