{"id":294,"date":"2023-09-16T00:21:44","date_gmt":"2023-09-16T00:21:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/lxxle002\/?p=294"},"modified":"2023-09-16T00:21:44","modified_gmt":"2023-09-16T00:21:44","slug":"how-researchers-might-use-privacyrights-org","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/lxxle002\/2023\/09\/16\/how-researchers-might-use-privacyrights-org\/","title":{"rendered":"How Researchers Might Use PrivacyRights.org"},"content":{"rendered":"\n<p>Privacyrights.org\/data-breaches was a tool that I didn\u2019t even know existed until today. As stated on their about page, \u201cPrivacy Rights Clearinghouse is a nonprofit organization focused on increasing access to information, policy discussions and meaningful rights so that data privacy can be a reality for everyone\u201d. They record data breaches from all the way back until 2005. They can break down each incident by state, date, breach type and even give a summary of what happened. While scrolling through breaches with the most reported records impacted, I saw that in 2006 the United States Department of Veterans Affairs had a physical breach that had personal information of about 26.5 million people. As a veteran that uses the VA, information like this is alarming. Researchers can use this database in a multitude of ways. They can break down what years were most affected. What states are most vulnerable to particular types of attacks? What major corporations have a history of data breaches and what don\u2019t? Depending on the research they can target fortune 500 companies or even our national government. Knowledge is power and this website provides a lot of it.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacyrights.org\/data-breaches was a tool that I didn\u2019t even know existed until today. As stated on their about page, \u201cPrivacy Rights Clearinghouse is a nonprofit organization focused on increasing access to information, policy discussions and meaningful rights so that data privacy can be a reality for everyone\u201d. They record data breaches from all the way back&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/lxxle002\/2023\/09\/16\/how-researchers-might-use-privacyrights-org\/\">Read More<\/a><\/div>\n","protected":false},"author":27287,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/lxxle002\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/lxxle002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/lxxle002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lxxle002\/wp-json\/wp\/v2\/users\/27287"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lxxle002\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/lxxle002\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/lxxle002\/wp-json\/wp\/v2\/posts\/294\/revisions\/295"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/lxxle002\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lxxle002\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lxxle002\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}