In this era characterized by a constant influx of new technology and innovation, there has
been a rapid emergence of accompanying problems as well, one of the major ones being Data
Breaches.
A data breach can be defined as any security incident in which unauthorized parties gain
access to sensitive or confidential information, including personal data (Social Security
numbers, bank account numbers, healthcare data) or corporate data (customer data records,
intellectual property, financial information). Millions of people are affected by data breaches
every year, and they can range in scope from a doctor accidentally looking at the wrong
patient’s chart, to a large-scale attempt to access government computers to uncover sensitive
information. Data breaches are a major security concern because sensitive data is constantly
being transmitted over the Internet. This continuous transfer of information makes it possible
for attackers in any location to attempt data breaches on almost any person or business they
choose.
There are various methods through which a data breach can occur, such as:
1. Lost or stolen credentials - The simplest way to view private data online is by using
someone else’s login credentials to sign into a service. To that end, attackers employ a
litany of strategies to get their hands on people’s logins and passwords. These include
brute force attacks and on-path attacks.
2. Lost or stolen equipment - A lost computer or smartphone that contains confidential
information can be very dangerous if it falls into the wrong hands.
3. Social engineering attacks - Social engineering involves using psychological
manipulation to trick people into handing over sensitive information. For example, an
attacker may pose as an IRS agent and call victims on the phone in an attempt to
convince them to share their bank account information.
4. Insider threats - These involve people who have access to protected information
deliberately exposing that data, often for personal gain. Examples include a restaurant
server copying customers’ credit card numbers as well as high-level government
employees selling secrets to foreign states. (Learn more about insider threats.)
5. Vulnerability exploits - Almost every company in the world uses a variety of different
software products. Because software is so complex, it often contains flaws known as
"vulnerabilities." An attacker can exploit these vulnerabilities in order to gain
unauthorized access and view or copy confidential data.
6. Malware infections - Many malicious software programs are designed to steal data or
track user activities, sending the information they gather to a server that the attacker
controls.
7. Physical point-of-sale attacks - These attacks target credit and debit card information
and most often involve the devices that scan and read these cards. For example
someone could set up a fake ATM machine or even install a scanner onto a legitimate
ATM machine in hopes of gathering card numbers and PINs.
8. Credential stuffing - After someone’s login credentials are exposed in a data breach,
an attacker may try re-using those same credentials on dozens of other platforms. If
that user logs in with the same username and password on multiple services, the
attacker may gain access to the victim’s email, social media, and/or online banking
accounts.
9. Lack of encryption - If a website that collects personal or financial data does not use
SSL/TLS encryption, anyone can monitor transmissions between the user and the
website and see that data in plaintext.
10. Misconfigured web app or server - If a website, application, or web server is not set
up properly, it may leave data exposed to anyone with an Internet connection.
Confidential data could be seen by users who accidentally stumble upon it, or by
attackers who are purposefully looking for it.1
These breaches affect all sections of society however cause quite grievous damage, especially
to the marginalized sections which include but are not limited to women, children, persons of
sexual minorities, etc.
Persons of marginalized groups have to deal with pre-existing stereotypes based on factors
that are out of their control. Under different economic conditions, and under the influence of
specific historical, cultural, legal, and religious factors, marginalization is one of the
manifestations of inequality on the basis of gender, caste, physical ability, or any other
preference or orientation. These sections are already vulnerable in society and data breaches
as well.
1
https://www.cloudflare.com/en-gb/learning/security/what-is-a-data-breach/
Cyber attacks as a result of data breaches have a distinct impact on women and members of
the LGBTQI+ community because the detrimental gender norms that restrict and constrain
their behavior in the offline world are frequently mirrored or aggravated online. What is
particularly concerning is that gender norms can lead to technology-facilitated gender-based
violence (TFGBV), which has the combined impact of deliberately injuring individuals and
groups while discouraging them from utilizing the Internet and other digital technologies. Not
only may TFGBV exacerbate the gender digital divide, but it can also escalate to physical
violence offline and have substantial psychological, social, and economic consequences for
women and LGBTQI+ people. Not limited to this, there are also various ways online that
persons belonging to such groups and communities are bullied and harassed with malicious
instruments like deepfake and hazing videos and images and whatnot. Such events impact
their day-to-day life and their interactions with the world at large, but their personal
relationships and identities as well, they are engulfed in feelings of shame, self-hatred, and
anxiety when confronted with such instances when they are threatened online and so is their
personal information.
According to mental health experts, data breaches and other cybercrimes are increasingly
inflicting damage on the psychological well-being of millions of individuals worldwide.
When victims learn of such breaches, their emotions vary from shock, fear, and
embarrassment to hopelessness and melancholy. People who have had cyber breaches and/or
assaults are more likely to suffer from depression and PTSD regularly, with the breach
serving as a traumatic event in their lives, leaving them unsure of what to do next and how to
solve the problem and limit the harm inflicted. Women and sexual minorities especially
become suspicious about various sites and companies in this age of data breaches, being
affected by malicious instruments like deep fake videos, women especially tend to lose faith
and this leads to a creation of a trust gap i.e. men and other popular groups would be more
willing to trust the sites and apps than the marginalized communities especially women. Not
just the identity but the integrity of the victims is compromised in case of data breaches.
Women, sexual minorities, scheduled castes, and scheduled tribes are often the most severe
victims with online platforms being made a tool to spread hatred and misinformation about
these groups and cause communal discord throughout the society. The problem of data
breaches adds fuel to the already burning fire of vulnerability of such marginalized groups.
In the digital age, where data has become a valuable commodity, the effects of data breaches
on marginalized groups have become a growing concern. It is crucial for businesses and
organizations to consider the legal and ethical implications of handling sensitive data,
especially when it comes to protecting the information of marginalized groups. In addition to
legal requirements such as data protection laws and regulations, there is a moral obligation to
ensure that data breaches do not disproportionately affect already vulnerable communities.
Implementing robust security measures and conducting regular audits can help mitigate the
risk of data breaches and uphold the ethical responsibilities of safeguarding sensitive
information. Moreover, fostering a culture of transparency and accountability within an
organization can also contribute to addressing the legal and ethical dimensions of data
protection in the digital age.
Prevention measures are the first line of defense against data breaches and are particularly
crucial in protecting marginalized groups. Organizations must prioritize robust cybersecurity
protocols, beginning with encryption to safeguard data in transit and at rest. Firewalls,
intrusion detection systems, and anti-malware software form the backbone of a
comprehensive security infrastructure, helping to fend off potential attacks.2
Regular security audits and vulnerability assessments are essential practices. These audits can
identify weaknesses in an organization's cybersecurity posture, allowing for timely
interventions. Furthermore, access controls should be stringent, ensuring that only authorized
personnel have access to sensitive information. This minimizes the risk of internal threats,
which can be as damaging as external attacks.
Employee training is another critical component. Regular training sessions can help
employees recognize phishing attempts, social engineering tactics, and other common
methods used by attackers. A well-informed workforce acts as an additional layer of defense.
Incorporating advanced security measures such as two-factor authentication (2FA) and
biometric verification significantly enhances protection. 3 These methods make it more
difficult for unauthorized users to gain access to systems and data.
Governments and regulatory bodies play a pivotal role by enforcing strict data protection
laws. Regulations like the General Data Protection Regulation (GDPR) in Europe set high
standards for data security and impose heavy penalties for non-compliance, incentivizing
organizations to prioritize data protection.
Transparency in data collection and usage policies is also critical. Organizations should
clearly communicate to individuals how their data is being used, stored, and protected. This
2
Ponemon Institute. (2021). Cost of a Data Breach Report 2021. Retrieved from
https://www.ibm.com/security/data-breach
3
Cyber Civil Rights Initiative. (2021). Technology-Facilitated Gender-Based Violence. Retrieved from
https://www.cybercivilrights.org/
transparency builds trust and allows individuals to make informed decisions about sharing
their information.4
In the event of a data breach, robust support systems are vital, especially for marginalized
communities. Immediate, clear communication is crucial for notifying affected individuals,
detailing compromised information, and advising on protective measures. Providing access to
credit monitoring and identity theft protection helps mitigate financial harm by alerting
individuals to suspicious activity. Community-based support, including legal assistance and
counseling from non-profits, aids victims in navigating post-breach challenges and managing
stress.5 Public awareness campaigns educate marginalized groups on data security,
empowering them to recognize threats and protect their information, thus reducing the overall
impact of breaches.
In conclusion, data breaches are a significant threat in our digital world, disproportionately
impacting marginalized groups already burdened with societal and economic challenges.
These breaches can lead to financial losses, identity theft, and severe psychological distress,
exacerbating the vulnerabilities of women, LGBTQ+ individuals, and economically
disadvantaged communities.6 The consequences include increased exposure to technology-
facilitated gender-based violence and a loss of trust in digital platforms, further entrenching
existing inequalities.
Addressing data breaches requires a multifaceted approach. Organizations must prioritize
robust cybersecurity measures like encryption, regular security audits, and advanced
authentication methods. Employee training on cyber threat recognition is crucial, and
governments must enforce stringent data protection laws to ensure compliance.
In the event of a breach, timely and transparent communication is essential. Providing access
to credit monitoring, identity theft protection, and community-based support, such as legal
assistance and counselling, can help mitigate the impact. Public awareness campaigns are
also vital for educating marginalized groups on data security.
By fostering a culture of transparency, accountability, and proactive protection, we can create
a more secure and equitable digital environment for all.
4
American Psychological Association. (2019). The Psychological Impact of Data Breaches. Retrieved from
https://www.apa.org/
5
Federal Trade Commission. (2021). _Identity Theft Protection and Credit Monitoring_. Retrieved from
https://www.consumer.ftc.gov/features/feature-0014-identity-theft
6
National Network to End Domestic Violence. (2019). Resources for Victims of Technology Abuse. Retrieved
from https://www.techsafety.org/