This must embody approximate knowledge about the breach, including the categories of information and quantity of individuals compromised because of the incident, and the categories and approximate numbers of non-public information information involved. The latter takes under consideration how there can be multiple sets of information regarding just a single […]