Data Breach Chronology

Data Breach Chronology Archive (2005-2018) Available Here

Frequently Asked Questions

Q. Can I download the Data Breach Chronology Database?  

A. Yes! You may purchase the Data Breach Chronology Database here.


We are committed to maintaining and improving this project over the long term. By purchasing this data, you are funding continued development of this resource. We currently offer temporary download passes (subject to our Terms of Service) for our database and offer a substantial discount for academic use.


If you are unable to purchase for academic research or you work for a nonprofit or media outlet on a limited budget, please reach out to request a complimentary download. We are a small team and receive many requests. Therefore, we prioritize requests that align with Privacy Rights Clearinghouse's goals of increasing public understanding of privacy rights and issues and advancing accessible consumer privacy protections.


To request a complimentary download, please contact us at and describe your proposed use and affiliation. In your message, we encourage you to explain how your work has the potential to advance consumer privacy. 


Our team will respond to you as soon as possible; however, we cannot guarantee that we will be able to respond in time for any deadline. 


Q. What is the Data Breach Chronology  

A: The Data Breach Chronology is a tool designed to help advocates, policymakers, journalists and researchers better understand reported data breaches in the United States. We launched the project in 2005 in response to the widely-publicized ChoicePoint incident, and it has evolved over time from a list of manually entered breaches to a robust database and visual dashboard. 


Q. How is this project funded?  

A: This project was funded in large part thanks to The Rose Foundation for Communities and the Environment Consumer Products Fund.  We have also received funds for this project from cy pres awards and Consumer Federation of America.  

If you are interested in supporting this project, please reach out to us at


Q.  Is this a complete record of every data breach in the United States? 

No. The data is comprised of publicly available information on reported breaches and should not be considered a complete and accurate representation of every data breach in the United States. It reflects breaches reported in the United States that are made publicly available by government entities.  


Q. What are the next steps for this project?

  • Develop an updated taxonomy of breach types and business types; 

  • Further enrich the database with unique business identifiers where possible;  

  • Develop methods to better identify duplicate breach entries;  

  • Regularly update the database; and  

  • Create additional visualizations and tools to help those working to advance data privacy and security for people. 

If you are interested in getting updates on this project, join our email list here


Q. How can I get involved with this project? 

A. Thank you for your interest – there is no shortage of work that can be done to continue to improve this project, and there are many ways to join us in that endeavor! 

  • Donate your time and expertise as a data science or tableau volunteer to help us collect, clean, process, maintain, and present this resource. Contact us at with the subject line “VOLUNTEER”.
  • Apply for a legal internship to help us stay up to date on changing data security and breach notification laws.  
  • Apply to join our Data Breach Chronology advisory committee to help drive future project decisions and new features. Contact us at with the subject line “ADVISORY COMMITTEE”.
  • Donate to sustain the project.  

Data Breach Chronology Data 

Q. What data makes up the Data Breach Chronology? 

A. We collect data from publicly available, government-maintained data sources.  This includes the U.S. Department of Health and Human Services and various state Attorneys General who publish data breach notices they receive under their states’ data breach notification laws. 


Q. How far back does the data go? 

A. Our historical database has been cleaned and normalized going back to 2005. 


Q. How is the data processed to extract relevant information? 

A. We use a combination of human and AI resources to process the raw data, extract relevant information, and apply classifications including type of breach, type of organization, number of records exposed in the breach, and relevant date information.  


Q. How is AI involved in processing the data? 

A. We use a combination of manual data entry as well as OpenAI’s GPT-3.5 and GPT-4, powerful language models, to enrich our database with categories and impact information based on the information provided in the breach notification, the available training data and our own taxonomies. These inferences may be incorrect. 

If you see something that looks incorrect, please let us know by emailing and include “CORRECTION” in the subject line followed by the name of the breached business that you believe needs to be corrected. In the body of your email, please include a link to the specific reported breach and the proposed correction so we may review.  


Q. What are the labels for breach type and business type? 


Type of Breach  

  • CARD - Fraud Involving Debit and Credit Cards Not Via Hacking (skimming devices at point-of-service terminals, etc.)  

  •  HACK - Hacked by an Outside Party or Infected by Malware  

  •  INSD - Insider (employee, contractor or customer)  

  •  PHYS - Physical (paper documents that are lost, discarded or stolen)  

  •  PORT - Portable Device (lost, discarded or stolen laptop, PDA, smartphone, memory stick, CDs, hard drive, data tape, etc.)  

  •  STAT - Stationary Computer Loss (lost, inappropriately accessed, discarded or stolen computer or server not designed for mobility)  

  •  DISC - Unintended Disclosure Not Involving Hacking, Intentional Breach or Physical Loss (sensitive information posted publicly, mishandled or sent to the wrong party via publishing online, sending in an email, sending in a mailing or sending via fax)   

  •  UNKN - Unknown (not enough information about breach to know how exactly the information was exposed)  


Type of Organization:  

  • BSF - Businesses (Financial Services, Banking, Insurance Services)  

  • BSO - Businesses (Manufacturing, Technology, Communications, Other)  

  • BSR - Businesses (Retail/Merchant including Grocery Stores, Online Retailers, Restaurants)  

  • EDU - Educational Institutions (Schools, Colleges, Universities)  

  • GOV - Government & Military (State & Local Governments, Federal Agencies)  

  • MED - Healthcare and Medical Providers (Hospitals, Medical Insurance Services)  

  • NGO - Nonprofits (Charities and Religious Organizations)  

  • UNKN – Unknown 


Q. Have you considered revising the labels for breach type and business type?  

A. Yes.  We plan to address this when we secure resources for this project. 


Data Breach Chronology Dashboard 

Q. I have an idea for a new visualization, can I provide input for this project? 

A. Yes! Please let us know at and include “SUGGESTION” in the subject line.  


Q. I believe a breach has incorrect information associated with it, how can I alert you? 

A. Please email us at and include “CORRECTION” in the subject line followed by the name of the breached business that you believe needs to be corrected. In the body of your email, please include the specific reported breach and the proposed correction so we may review.



This project was created by Beth Givens, Privacy Rights Clearinghouse's founder and executive director emerita and consumer advocate Jordana Beebe. We are thankful for the contributions of Coleman Research Lab, Ahmed Eissa, Rose Foundation for Communities and the Environment, Consumer Federation of America, and everyone else who has supported the project in its various forms over the years.


Limitations and Disclaimers 

The Data Breach Chronology is based on publicly available information and should not be considered a complete and accurate representation of every data breach in the United States.  Rather, it reflects the data breaches that have been reported and made publicly available in the United States.


You should pay careful attention to the issue of duplicate reporting when making use of this data or making assertions based on this data. This version of the Data Breach Chronology does not identify when a single breach has been reported to multiple state Attorneys General. As of February 2023, there will be duplicated breaches in the database and reflected in the dashboard.


Additionally, though we have (where possible), scraped the contents of breach notification letters and include a link to the original PDF, we do not host these letters locally–and links may no longer be active.


Privacy Rights Clearinghouse makes no representations as to the accuracy of the information included in the Data Breach Chronology.