

{"id":505,"date":"2009-08-26T07:31:55","date_gmt":"2009-08-26T07:31:55","guid":{"rendered":"http:\/\/www.questionpro.com\/?p=505"},"modified":"2025-08-18T01:39:32","modified_gmt":"2025-08-18T08:39:32","slug":"a-brief-teach-on-data-breach","status":"publish","type":"post","link":"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/","title":{"rendered":"A Brief Teach On Data Breach"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"401\" height=\"299\" src=\"https:\/\/www.questionpro.com\/blog\/wp-content\/uploads\/2009\/08\/istock_000009495248xsmall2.jpg?w=150\" alt=\"Access key on a laptop\" class=\"wp-image-523\" title=\"Access key on a laptop\"\/><\/figure><\/div>\n\n\n<p><em>Today\u2019s guest post comes from Robert E. Bershad, a former attorney and a B2B communications professional who writes articles about the internet<\/em> <em>and<\/em> <em>information technology. &nbsp;He may be reached at<\/em> <em><a href=\"mailto:rbershad@comcast.net\" target=\"_blank\" rel=\"noopener\">rbershad@comcast.net<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><strong>LEARN ABOUT:<\/strong> <a href=\"https:\/\/www.questionpro.com\/blog\/b2b-panel\/\">B2B Online Panels<\/a><\/em><\/p>\n\n\n\n<p><span style=\"border-collapse: separate; font-family: Georgia; font-style: normal; font-size: 13px; line-height: 19px;\"><span style=\"font-size: medium;\">Since January 2005, over 263 million electronic records have been compromised in the United States alone, according to the <\/span><a id=\"bmpg\" title=\"Privacy Rights Clearinghouse\" href=\"https:\/\/privacyrights.org\/\"><span style=\"font-size: medium;\">Privacy Rights Clearinghouse<\/span><\/a><span style=\"font-size: medium;\">. These records, many containing personally identifying information, were compromised through <\/span><em><span style=\"font-size: medium;\">data breaches<\/span><\/em><span style=\"font-size: medium;\">: a hack, a stolen laptop, a misplaced backup drive, etc. If your company collects personally identifying information and someone breaches the security of your data, then you may have to notify the people in your database. If you don\u2019t, your company could suffer millions of dollars in fines and litigation, loss of reputation, and other complications we would all prefer to do without.<\/span><\/span><\/p>\n\n\n\n<p><span style=\"border-collapse: separate; font-family: Georgia; font-style: normal; font-size: 13px; line-height: 19px;\"><span style=\"font-size: medium;\">That is the law in forty-five states and Washington, DC. These laws are called \u201cData Breach Notification Acts.\u201d Their purpose is to warn people that their personal information may have fallen into the wrong hands. And it is your responsibility to let them know.<\/span><\/span><\/p>\n\n\n\n<p><span style=\"font-size: medium;\">Of course just because there has been a breach doesn\u2019t mean someone is pouring over the personal data for malicious ends. But in some states, that doesn\u2019t matter. If you simply have a \u2018reasonable belief that identity thieves or the like are responsible, then you still have a duty to notify.<\/span><\/p>\n\n\n\n\t<div class=\"banner-section wf-section\" lang=\"\" >\n\t\t<div class=\"right-column-container\">\n\t\t\t<div class=\"bannerbg white\">\n\t\t\t\t<span class=\"h1-2\">Create memorable experiences based on real-time data, insights and advanced analysis.<\/span>\n\t\t\t\t<a href=\"#userliteForm\" data-toggle=\"modal\" class=\"button w-button\">Request Demo<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"userlite-modal modal fade\" id=\"userliteForm\" tabindex=\"-1\" role=\"dialog\" style=\"display: none;\">\n\t\t<div class=\"modal-dialog\" role=\"document\">\n\t\t\t<div class=\"modal-content\" role=\"document\">\n\t\t\t\t<div class=\"modal-body\">\n\t\t\t\t\t<div class=\"modal-header\">\n\t\t\t\t\t\t<button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\">\n\t\t\t\t\t\t\t<i class=\"material-icons\">close<\/i>\n\t\t\t\t\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"contact-us-form-wrapper contact-box\">\n\t\t\t\t\t\t<div class=\"userlite-form-wrapper\">\n\t\t\t\t\t\t\t<iframe src=\"https:\/\/www.questionpro.com\/userlite-form-blog-en.html?product=CX&amp;referralurl=https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/posts\/505&amp;lang=en&amp;cat=cx-2|market-research\" style=\"display: block;\" ><\/iframe>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"demo-form-wrapper success-message-div\" style=\"display:none\">\n\t\t\t\t\t\t\t<p class=\"success-message-para\"><\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\n\n<p><span style=\"font-size: medium;\">If you don\u2019t notify quickly, then a State\u2019s Attorney General might sue you, and any number of the people in your database could also sue you. So it behooves companies who collect personally identifying information to ensure their data are secure. Encryption is key. If there is a breach, but the data is encrypted, then the laws do not require you to notice unless you have reason to believe the encryption itself was compromised.<\/span><\/p>\n\n\n\n<p><a href=\"https:\/\/www.leg.state.nv.us\/75th2009\/Bills\/SB\/SB227_EN.pdf\"><span style=\"color: #0000ff;\"><span style=\"font-size: medium;\">Nevada<\/span><\/span><\/a><span style=\"font-size: medium;\"> and <\/span><a href=\"http:\/\/www.mass.gov\/?pageID=ocaterminal&amp;L=4&amp;L0=Home&amp;L1=Consumer&amp;L2=Privacy&amp;L3=Identity+Theft&amp;sid=Eoca&amp;b=terminalcontent&amp;f=reg201cmr17&amp;csid=Eoca\"><span style=\"color: #0000ff;\"><span style=\"font-size: medium;\">Massachusetts<\/span><\/span><\/a><span style=\"font-size: medium;\"> are advancing the scope of these laws by requiring businesses to encrypt the personal information that is transferred electronically to PDAs, thumb drives, etc. California, perhaps the strictest state in the country, has provided <\/span><a href=\"http:\/\/www.oispp.ca.gov\/consumer_privacy\/pdf\/COPP_Breach_Reco_Practices_6-09.pdf\"><span style=\"color: #0000ff;\"><span style=\"font-size: medium;\">guidance<\/span><\/span><\/a><span style=\"font-size: medium;\"> on how to navigate their law.<\/span><\/p>\n\n\n\n<p><span style=\"font-size: medium;\">There is some latitude for marketing research panel companies. Most states only care about a person\u2019s social security, driver\u2019s license, and credit card numbers. That is information most if not all, <a href=\"https:\/\/www.questionpro.com\/blog\/market-research-panel\/\">marketing research panels<\/a> don\u2019t have. But some states, Arkansas and California among them, do care if healthcare information is&nbsp;involved. That kind of information is commonplace is almost every panel in the land.<\/span><\/p>\n\n\n\n<p><span style=\"font-size: medium;\">If a breach occurs, you must notify \u201cwithout unreasonable delay\u201d in some states or \u201cimmediately\u201d in other states. You can notify by mail, email, or telephone. Not the kind of call a call center would enjoy making. Suppose the number of people to contact is massive or the cost of contacting them is prohibitive. In that case, it might be okay to <\/span><span style=\"font-size: medium;\">post a<\/span><span style=\"font-size: medium;\"> conspicuous website <\/span><span style=\"font-size: medium;\">notice<\/span><span style=\"font-size: medium;\"> or alerting statewide media. Neither option is good.<\/span><\/p>\n\n\n\n<p><span style=\"font-size: medium;\">Perhaps the stickiest part of all of this is that the location of the people in your database determines which laws apply, not the location of the company victimized by the breach. For example, if a company in Massachusetts sustains a breach of data connected to Californians and Texans, then the laws of California and Texas apply to the situation. With each additional state represented in your database comes an additional set of state laws. The only states without these laws right now are Alabama, Kentucky, Mississippi, New Mexico, and South Dakota.<\/span><\/p>\n\n\n\n<p><span style=\"font-size: medium;\">Rob DiMarco, President of 416Software and author of the <\/span><em><a id=\"pcgi\" title=\"Innovation On the Run\" href=\"http:\/\/www.innovationontherun.com\/\"><span style=\"font-size: medium;\">Innovation On The Run<\/span><\/a> <\/em><span style=\"font-size: medium;\">blog<\/span><em><span style=\"font-size: medium;\">, <\/span><\/em><span style=\"font-size: medium;\">recommends considering these steps while consulting with an IT Security professional:<br><\/span><\/p>\n\n\n\n<ul>\n<li><strong><span style=\"font-size: medium;\">Collect only what you need. <\/span><\/strong><span style=\"font-size: medium;\">The best way to protect against losing sensitive data is to never store it in the first place.&nbsp; Ask yourself if you really need to save personally-identifying information like social security numbers or if there are other, less sensitive pieces of data that will suffice<\/span><\/li>\n\n\n\n<li><strong><span style=\"font-size: medium;\">Use one-way encryption to turn identifiers into unique keys.<\/span><\/strong><span style=\"font-size: medium;\"> Social security numbers and driver license numbers are often used to track data records over time.&nbsp; Instead of storing this sensitive information, a better approach is to use a <\/span><em><span style=\"font-size: medium;\">hashing algorithm<\/span><\/em><span style=\"font-size: medium;\"> such as MD-5 or SHA-1 to transform the data into an encrypted string. This process will transform sensitive data into trackable data, but it is done in such a way that the original sensitive cannot be reconstructed.<br><\/span><\/li>\n\n\n\n<li><strong><span style=\"font-size: medium;\">Use software to create encrypted drives<\/span><\/strong><span style=\"font-size: medium;\">. Encrypting a drive protects your data in the case the drive the data is stored on is compromised.&nbsp; DiMarco recommends <\/span><span id=\"OBJ_PREFIX_DWT131\"><a href=\"http:\/\/www.truecrypt.org\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-size: medium;\">TrueCrypt<\/span><\/a><\/span><span style=\"font-size: medium;\">, a free, cross-platform tool that you can use to easily encrypt hard drives and USB flash drives. This tool will be useful when Nevada and Massachusetts (and other states that follow) begin requiring businesses <\/span><span style=\"font-size: medium;\">to encrypt personal information that is transferred electronically to PDAs, thumb drives, etc.<\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-size: medium;\">There is some movement on the federal level to enact a one-size-fits-all law for everyone to follow. That may eliminate the burden of tracking the laws in several states, but it won\u2019t stop your responsibility to protect the personally identifying data that you collect.<\/span><\/p>\n\n\n\n<p>We recommend you read <a href=\"https:\/\/www.questionpro.com\/blog\/2022-incident-statement\/\">QuestionPro Data Breach Incident\u2019s Official Statement<\/a> as a clear example of how to deal with similar situations.<\/p>\n\n\n\n<p><span style=\"font-size: medium;\">&nbsp;<\/span><\/p>\n\n\n\n<p><em><span style=\"font-size: medium;\">Disclaimer: <\/span><\/em><em><span style=\"font-size: medium;\">This post<\/span><\/em><em><span style=\"font-size: medium;\"> is not legal advice and is<\/span><\/em><em><span style=\"font-size: medium;\"> not intended as legal advice<\/span><\/em><em><span style=\"font-size: medium;\">.<\/span><\/em> <em><span style=\"font-size: medium;\">It <\/span><\/em><em><span style=\"font-size: medium;\">is intended to provide only general, non-specific le<\/span><\/em><em><span style=\"font-size: medium;\">gal information. This article does not intend to cover all the issues related to the discussed topic<\/span><\/em><em><span style=\"font-size: medium;\">.<\/span><\/em><\/p>\n\n\n\n<div><span style=\"font-size: medium;\"><span style=\"font-size: 16px;\"><em>&nbsp;<\/em><\/span><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Today\u2019s guest post comes from Robert E. Bershad, a former attorney and a B2B communications professional who writes articles about [&hellip;]<\/p>\n","protected":false},"author":128,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[170,203],"tags":[284],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Brief Teach On Data Breach | QuestionPro<\/title>\n<meta name=\"description\" content=\"Today\u2019s guest post comes from Robert E. Bershad, a former attorney and a B2B communications professional who writes articles about the internet and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Brief Teach On Data Breach | QuestionPro\" \/>\n<meta property=\"og:description\" content=\"Today\u2019s guest post comes from Robert E. Bershad, a former attorney and a B2B communications professional who writes articles about the internet and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"QuestionPro\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/questionpro\" \/>\n<meta property=\"article:published_time\" content=\"2009-08-26T07:31:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T08:39:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.questionpro.com\/blog\/wp-content\/uploads\/2009\/08\/istock_000009495248xsmall2.jpg?w=150\" \/>\n<meta name=\"author\" content=\"Ivana Taylor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@questionpro\" \/>\n<meta name=\"twitter:site\" content=\"@questionpro\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ivana Taylor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/\"},\"author\":{\"name\":\"Ivana Taylor\",\"@id\":\"https:\/\/www.questionpro.com\/blog\/#\/schema\/person\/5a547e9ba0ad62a9ffa6f12466a7a244\"},\"headline\":\"A Brief Teach On Data Breach\",\"datePublished\":\"2009-08-26T07:31:55+00:00\",\"dateModified\":\"2025-08-18T08:39:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/\"},\"wordCount\":935,\"publisher\":{\"@id\":\"https:\/\/www.questionpro.com\/blog\/#organization\"},\"keywords\":[\"Best Practice\"],\"articleSection\":[\"CX\",\"Market Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/\",\"url\":\"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/\",\"name\":\"A Brief Teach On Data Breach | QuestionPro\",\"isPartOf\":{\"@id\":\"https:\/\/www.questionpro.com\/blog\/#website\"},\"datePublished\":\"2009-08-26T07:31:55+00:00\",\"dateModified\":\"2025-08-18T08:39:32+00:00\",\"description\":\"Today\u2019s guest post comes from Robert E. Bershad, a former attorney and a B2B communications professional who writes articles about the internet and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.questionpro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Market Research\",\"item\":\"https:\/\/www.questionpro.com\/blog\/category\/market-research\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Brief Teach On Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.questionpro.com\/blog\/#website\",\"url\":\"https:\/\/www.questionpro.com\/blog\/\",\"name\":\"QuestionPro\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.questionpro.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.questionpro.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.questionpro.com\/blog\/#organization\",\"name\":\"QuestionPro\",\"url\":\"https:\/\/www.questionpro.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.questionpro.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.questionpro.com\/blog\/wp-content\/uploads\/2022\/10\/questionpro-logo.svg\",\"contentUrl\":\"https:\/\/www.questionpro.com\/blog\/wp-content\/uploads\/2022\/10\/questionpro-logo.svg\",\"caption\":\"QuestionPro\"},\"image\":{\"@id\":\"https:\/\/www.questionpro.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/questionpro\",\"https:\/\/twitter.com\/questionpro\",\"https:\/\/www.linkedin.com\/company\/questionpro\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.questionpro.com\/blog\/#\/schema\/person\/5a547e9ba0ad62a9ffa6f12466a7a244\",\"name\":\"Ivana Taylor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.questionpro.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d23fe73ba92b9a95ce057e280755df6b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d23fe73ba92b9a95ce057e280755df6b?s=96&d=mm&r=g\",\"caption\":\"Ivana Taylor\"},\"description\":\"Ivana Taylor provides DIY Marketing advice, marketing trends and marketing how-to tips and strategies for small business owners and CEOs.\",\"url\":\"https:\/\/www.questionpro.com\/blog\/author\/thirdforce\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Brief Teach On Data Breach | QuestionPro","description":"Today\u2019s guest post comes from Robert E. Bershad, a former attorney and a B2B communications professional who writes articles about the internet and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"A Brief Teach On Data Breach | QuestionPro","og_description":"Today\u2019s guest post comes from Robert E. Bershad, a former attorney and a B2B communications professional who writes articles about the internet and","og_url":"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/","og_site_name":"QuestionPro","article_publisher":"https:\/\/www.facebook.com\/questionpro","article_published_time":"2009-08-26T07:31:55+00:00","article_modified_time":"2025-08-18T08:39:32+00:00","og_image":[{"url":"https:\/\/www.questionpro.com\/blog\/wp-content\/uploads\/2009\/08\/istock_000009495248xsmall2.jpg?w=150"}],"author":"Ivana Taylor","twitter_card":"summary_large_image","twitter_creator":"@questionpro","twitter_site":"@questionpro","twitter_misc":{"Written by":"Ivana Taylor","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/#article","isPartOf":{"@id":"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/"},"author":{"name":"Ivana Taylor","@id":"https:\/\/www.questionpro.com\/blog\/#\/schema\/person\/5a547e9ba0ad62a9ffa6f12466a7a244"},"headline":"A Brief Teach On Data Breach","datePublished":"2009-08-26T07:31:55+00:00","dateModified":"2025-08-18T08:39:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/"},"wordCount":935,"publisher":{"@id":"https:\/\/www.questionpro.com\/blog\/#organization"},"keywords":["Best Practice"],"articleSection":["CX","Market Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/","url":"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/","name":"A Brief Teach On Data Breach | QuestionPro","isPartOf":{"@id":"https:\/\/www.questionpro.com\/blog\/#website"},"datePublished":"2009-08-26T07:31:55+00:00","dateModified":"2025-08-18T08:39:32+00:00","description":"Today\u2019s guest post comes from Robert E. Bershad, a former attorney and a B2B communications professional who writes articles about the internet and","breadcrumb":{"@id":"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.questionpro.com\/blog\/a-brief-teach-on-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.questionpro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Market Research","item":"https:\/\/www.questionpro.com\/blog\/category\/market-research\/"},{"@type":"ListItem","position":3,"name":"A Brief Teach On Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.questionpro.com\/blog\/#website","url":"https:\/\/www.questionpro.com\/blog\/","name":"QuestionPro","description":"","publisher":{"@id":"https:\/\/www.questionpro.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.questionpro.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.questionpro.com\/blog\/#organization","name":"QuestionPro","url":"https:\/\/www.questionpro.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.questionpro.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.questionpro.com\/blog\/wp-content\/uploads\/2022\/10\/questionpro-logo.svg","contentUrl":"https:\/\/www.questionpro.com\/blog\/wp-content\/uploads\/2022\/10\/questionpro-logo.svg","caption":"QuestionPro"},"image":{"@id":"https:\/\/www.questionpro.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/questionpro","https:\/\/twitter.com\/questionpro","https:\/\/www.linkedin.com\/company\/questionpro\/"]},{"@type":"Person","@id":"https:\/\/www.questionpro.com\/blog\/#\/schema\/person\/5a547e9ba0ad62a9ffa6f12466a7a244","name":"Ivana Taylor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.questionpro.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d23fe73ba92b9a95ce057e280755df6b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d23fe73ba92b9a95ce057e280755df6b?s=96&d=mm&r=g","caption":"Ivana Taylor"},"description":"Ivana Taylor provides DIY Marketing advice, marketing trends and marketing how-to tips and strategies for small business owners and CEOs.","url":"https:\/\/www.questionpro.com\/blog\/author\/thirdforce\/"}]}},"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Ivana Taylor","author_link":"https:\/\/www.questionpro.com\/blog\/author\/thirdforce\/"},"_links":{"self":[{"href":"https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/posts\/505"}],"collection":[{"href":"https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/users\/128"}],"replies":[{"embeddable":true,"href":"https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/comments?post=505"}],"version-history":[{"count":4,"href":"https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/posts\/505\/revisions"}],"predecessor-version":[{"id":1034873,"href":"https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/posts\/505\/revisions\/1034873"}],"wp:attachment":[{"href":"https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/media?parent=505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/categories?post=505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.questionpro.com\/blog\/wp-json\/wp\/v2\/tags?post=505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}