Paper records, passports and grants, medical information, biometric personal information, and encrypted and deidentified information are all considered Personally identifiable information, which in most states allows you to access one’s finances and identity. The information shows that most breaches come from hackers and an unidentified source. Researchers should use this information to study the code the hackers are using by financing a team of high-level white hackers to show the organizations the back doors left open. Researchers could also use the information to study unknown breaches and determine the problem’s source. More than 50 percent of issues will be resolved just off these two alone.
Data Breach Chronology. Data Breach Chronology | Privacy Rights Clearinghouse. (n.d.). https://privacyrights.org/data-breaches