Data brokers: Difference between revisions
Nullpoint420 (talk | contribs) Created a theme page for Data brokers |
|||
Line 26: | Line 26: | ||
===Security vulnerabilities=== | ===Security vulnerabilities=== | ||
The consolidation of large volumes of personal data creates security risks. Data brokers become attractive targets for hackers, and breaches of these vast repositories can expose sensitive personal information of millions of consumers, leading to identity theft and other forms of fraud.<ref>{{cite web |url=https://www.brennancenter.org/our-work/research-reports/closing-data-broker-loophole |title=Closing the Data Broker Loophole |publisher=Brennan Center for Justice |access-date=2025-05-07}}</ref> | The consolidation of large volumes of personal data creates security risks. Data brokers become attractive targets for hackers, and breaches of these vast repositories can expose sensitive personal information of millions of consumers, leading to identity theft and other forms of fraud.<ref>{{cite web |url=https://www.brennancenter.org/our-work/research-reports/closing-data-broker-loophole |title=Closing the Data Broker Loophole |publisher=Brennan Center for Justice |access-date=2025-05-07}}</ref> | ||
And with the search for indemnification related to being held harmless for such breaches, it is becoming harder and harder to hold these companies accountable. | |||
==Examples of major data brokers== | ==Examples of major data brokers== |