This document discusses data security breaches and the legal requirements for responding to breaches. It provides statistics on data breaches in 2012, noting that most were caused by outsiders exploiting weak or stolen passwords. It discusses state data breach notification laws, regulatory updates from agencies like the FTC, and examples of enforcement actions against companies for data security issues.