The telecom spokesperson said it's their understanding that the insider collected the PII by "photographing computer screens where the personal information was displayed." While he went on to say that "such methods make data theft very hard to detect" that statement is not true. There are second-generation proactive analytics that can detect data theft by photographing computer screens.
"[the telecom] spokesperson said the information was collected by photographing computer screens where the personal information was displayed."This insider data theft was another case where law enforcement discovered the privacy breach, not the organization holding the PII. Organizations seeking to proactively detect identity theft and data privacy breaches, before third parties do, can utilize on-demand analytics services.
- The Star Phoenix
Learn how to proactively detect identity theft and unauthorized breaches of data privacy, even by authorized users - with no hardware and no on-site software.Sources:
(a) http://www.thestarphoenix.com/touch/story.html?id=11383587 - www.TheStarPhoenix.com, 09/23/2015