Planning for Windows 10 End of Support: What You Need to Know
As October 14, 2025, approaches, businesses need to prepare for the end of support for Windows 10. Microsoft has announced that after this date, they...
What does Oregon law require you to do, and who are you required to notify? What happens if you don’t notify anyone?
Enacted in 2007, Oregon’s data breach notification law requires businesses and state agencies to notify any Oregon consumer whose personal information was subject to a breach of security. If a breach effected more than 250 Oregon consumers, the law also requires that a sample copy of a breach notice sent must also be provided to the Oregon Attorney General.
The Oregon Department of Justice defines breach of security as an unauthorized acquisition of computerized data that materially compromises the security, confidentiality, or integrity of personal information that a person maintains or possesses.
Requirements:
Personal information (PI) includes an Oregonian’s first name or first initial and last name in combination with any one or more of the following data elements:
Businesses must invest in security and be ready to respond if a breach occurs. Part of your preparedness program should be staying current on data breach legislation at the state level. Mintz is a useful online resource to review Data Breach Notification Laws by state.
Image Courtesy of Mintz
Data security breach notifications sent to the Oregon Attorney General’s Office are available for review here.
Teknologize has clients throughout the Pacific Northwest with offices located in the Tri-Cities and Yakima, Washington 509.396.6640 and Bend, Oregon 541.848.6072.
As October 14, 2025, approaches, businesses need to prepare for the end of support for Windows 10. Microsoft has announced that after this date, they...
Imagine the sudden chaos when 8.5 million Windows devices - spanning industries like airlines, banking, and healthcare - began displaying the dreaded...
In today's digital landscape, many businesses operate under the assumption that their IT networks are secure because everything seems to be running...