When protected, sensitive or confidential data is accessed or used by someone without authority, this is a data breach. This can involve any kind of data such as personal health, financial, or business related. Not all data breaches result from hacking into a computer. One can breach data simply by peering over someones shoulder at the computer screen when they shouldnt be. It can also be elaborately planned: A companys new employee may actually be working for an extensive crime ring to steal data from the inside. Needless to say, a data breach can lead to identity theft (among many