Before I started covering cybersecurity, I thought the term ‘breach’ had a single meaning — that an attacker stole data from a computer system. I also thought all the different versions of the word meant the same thing.

However, I’ve since learned the nuances and differences between a breach, a data breach and a data privacy breach. The difference is important. Classifying a breach poorly can result in unknowingly breaking a law or not complying with regulations.

Privacy regulations, such as the General Data Protection Regulation (GDPR) or state-specific laws, specify how an organization must respond to a privacy breach. Not complying correctly can mean fines and more negative publicity. According to Gartner, the personal data of 65% of the world’s population will be protected by modern privacy regulations by 2023, which is a major increase from 10% in 2020.

Breach, Data Breach or Data Privacy Breach?

Compliance with data privacy regulations hinges on correctly understanding the terms.

The general term ‘breach’ or security breach means that someone who is not authorized to access a computer system has done so. However, it only refers to the act of accessing systems, not really stealing data.

In a data breach, information has been accessed — and likely stolen — from the systems that were breached.

In a data privacy breach, the personal information that was accessed is Personally Identifiable Information (PII). Department of Homeland Security defines PII as any information that permits the identity of a person to be directly or indirectly inferred. That includes any information that is linked or linkable to that person. Examples include sensitive financial and personal information. It might be social security information, bank account numbers, personal health data or credit card information.

Companies that face a data privacy breach must follow all relevant privacy rules that protect each person’s information that was stolen. For example, if a single customer resides in the European Union, the company must follow the reporting protocol outlined by the GDPR. Many companies offer identity theft protection, a free credit report and credit monitoring to consumers who faced a data privacy breach.

Just to be a little more confusing, the media and consumers often use the term data breach to refer to both data privacy breaches and general data breaches. However, from a privacy regulation perspective, the distinction matters. If an attacker accesses proprietary company data, such as information on an upcoming product, that’s a data breach. On the other hand, if they steal employee social security numbers, the incident is a data privacy breach.

Read the Report

Breaches Involve Lengthy Recovery and Costly Fines

One of the biggest keys to reducing the damage after a data privacy breach is the speed of response. To respond to data subject access requests (DSARs), many organizations use automation such as a SOAR solution. With this tech, companies improve teamwork and speed up their response through automation. Most importantly, these platforms ensure repeatable and consistent processes. These are often a challenge during times of high stress after a breach.

Many organizations assume that after they follow their response protocols the worst of the breach’s effects are behind them. But the SEC may still find the victim at fault and levy hefty fines. First American Financial Corporation was fined $487,616 related to a vulnerability that exposed sensitive customer information. The impact was even greater for Pearson plc, a London-based publishing company that agreed to pay $1 million to settle charges that it misled investors about a 2018 cyber intrusion. The data privacy breach involved millions of student records. It included dates of birth and email addresses. The organization did not have adequate disclosure controls and processes in place.

In addition to fines, the non-business impact of a breach can be significant. The IBM 2022 Cost of a Data Breach reports that lost business costs average $1.42 million in customer churn, downtime and new business acquisition costs. Other costs include detection and escalation ($1.44 million), post-breach response ($1.14 million) and notification costs ($270,000).

Preventing Privacy Breaches

Organizations need strong privacy policies, processes and tools to manage data privacy and reduce vulnerabilities. By correctly identifying and using specific rules for handling sensitive data, you can manage data better. This is especially important for those using hybrid cloud environments since they must ensure that each environment meets standards.

In some cases, separate teams handle privacy and security. Cybersecurity workers focus on protecting the data. The privacy team works on data policies, such as collection, storage and removal. However, security and privacy, in terms of both practice and regulations, intertwine. By making sure the two work together, organizations can both reduce their risk of breach and improve their response if a privacy breach occurs.

The IBM 2021 Cost of a Data Breach named zero trust one of the most effective ways to reduce the cost of a breach. Companies with mature zero trust processes reported breaches costing $1.76 million less per breach than those without zero trust. The principles and strategies of a zero trust framework reduce both the vulnerability to and the impact of a breach. For example, multi-factor authentication reduces the likelihood of unauthorized access and Identify & Access Management (IAM) reduces that access to an insider attack. In addition, microsegmentation limits the damage of a breach because attackers can access only a very small portion of the network and data.

Many experts say it’s not a matter of if an organization will face a data privacy breach, but when it will happen. Reducing vulnerabilities is the first step to data privacy breach preparation. Be prepared for how to respond to a breach. That way, you can limit and reduce both the cost and reputational damage.

More from Data Protection

The Importance of Modern-Day Data Security Platforms

Data is the backbone of businesses and companies everywhere. Data can range from intellectual property to critical business plans to personal health information or even money itself. At the end of the day, businesses are looking to grow revenue, innovate, and operationalize but to do that, they must ensure that they leverage their data first because of how important and valuable it is to their organization. No matter the industry, the need to protect sensitive and personal data should be…

Meeting Today’s Complex Data Privacy Challenges

Pop quiz: Who is responsible for compliance and data privacy in an organization? Is it a) the security department, b) the IT department, c) the legal department, d) the compliance group or e) all of the above? If you answered "all of the above," you are well-versed in the complex world of compliance and data privacy! While compliance is a complex topic, the patchwork of regulations imposed by countries, regions, states and industries further compounds it. This complexity has turned…

The Digital World is Changing Fast: Data Discovery Can Help

The rise in digital technology is creating opportunities for individuals and organizations to achieve unprecedented success. It’s also creating new challenges, particularly in protecting sensitive personal and financial information. Personally identifiable information (PII) is trivial to manage. It’s often spread across multiple locations and formats and can be challenging to find and classify. Organizations need a modern data discovery and classification solution to identify sensitive data across physical, virtual and public clouds. The Current State of Sensitive Data Discovery and…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…