Data Breaches

Privacy Rights Clearinghouse brings together publicly reported data breach notifications from across U.S. government agencies into a single, searchable database. Explore our interactive visualizations or purchase the full dataset. Have questions? Check our FAQ below.

Breach Chronology Statistics - Sept 9, 2025 - 75,365 Data Breach Notifications Tracked; 36,594 Unique Breach Events; 9.38 BILLION Individuals impacted

Tracking Two Decades of Data Breaches in the U.S.

Data breaches have exposed the personal information of hundreds of millions of people across the U.S., affecting individuals, businesses, and entire industries - and in many cases many times over. The Data Breach Chronology compiles more than 75,000 reported breaches since 2005 using publicly available notifications exclusively from government sources. While reporting requirements vary by state and disclosure practices differ, this database offers the most comprehensive view available of who was breached, how it happened, and what data was compromised. It captures breach types, along with affected organizations, compromised information, and reporting timelines. By downloading the database, you gain structured, standardized access to fragmented public records, enabling research, risk analysis, policy development, and investigative reporting based on the best data currently available.

Breach Chronology Statistics - Sept 9, 2025 - 75,365 Data Breach Notifications Tracked; 36,594 Unique Breach Events; 9.38 BILLION Individuals impacted

The Scale of U.S. Data Breaches

The first data breach notification law in the country was passed in California in 2002, but it took until 2018 for the rest of the country to fully catch up - and the level of coverage still varies considerably across the country. Today, while every state requires breach reporting, only 14 make these reports publicly available.

Which States Report Breach Data?

Categorising Breaches

The Data Breach Chronology analyzes each notification across multiple dimensions, including the type of organization affected—from BSF for financial services to MED for healthcare providers—and the method of breach—such as HACK for cyber attacks or PORT for portable device breaches. The high number of "UNKN" classifications reflects a common challenge in breach reporting: notifications often lack sufficient detail to determine an organization's primary function or the specific method of breach. For complete descriptions of our classification system, see our FAQ.

How?

Who?

Where Are Data Breaches Occurring?

Data breaches affect organizations and individuals across every state in the U.S. This map shows reported breaches by state (darker red indicating higher numbers) and some of the most concentrated zipcodes, by the number of breach incidents in the area and the number of individuals impacted. Tracking the true geographic scope of data breaches remains especially challenging - in most cases, neither notification letters nor agency reports reveal where breaches actually occurred. Even in our massive database we can only pinpoint specific locations for a small fraction of incidents.

When Are Breaches Reported?

The Data Breach Chronology tracks both when breaches occurred and when they were reported, offering insight into reporting trends, delays, and practices across the U.S. While breach dates are not always disclosed, the database captures them whenever available, allowing you to compare incident timelines against reporting activity for deeper analysis.

Breach Notifications and Unique Breach Events

We connect individual breach notifications to the unique incidents they describe, revealing how a single event can ripple across states and years as new details emerge. By structuring fragmented, publicly reported data into one searchable resource, the database provides insight into trends, timelines, and the true scale of breaches nationwide.

What Data Are Breaches Exposing?

Reporting agencies rarely specify what data was exposed in a breach, and when they do, the details are often buried deep in notification letters. The Data Breach Chronology extracts and organizes these fragments wherever possible, structuring them into categories defined by the California Consumer Privacy Act (CCPA). This standardization makes it easier to analyze patterns across tens of thousands of breach events and understand what types of personal, financial, and sensitive data are most often compromised.”

Power Your Research With the Data Breach Chronology

You can download the database and support this project with your purchase.

Try a sample in your preferred format:

See our README for documentation.

We offer flexible pricing options for individual researchers and organizations, with substantial academic discounts. Choose from individual researcher access for personal projects, or a multi-user license for classroom and organisational access for teams. Annual subscriptions include ongoing access to monthly database updates and new features.

If you're conducting academic research with limited institutional funding, working with a nonprofit, or are a media outlet operating on a limited budget, and your work directly advances privacy protection, we offer limited complimentary access. Please contact us at databreachchronology@privacyrights.org with detailed information about your funding situation, research project, and how your work aligns with our mission of advancing consumer privacy protections. We typically respond within 3-5 business days.

Who Uses The Data Breach Chronology?

Researchers worldwide rely on Privacy Rights Clearinghouse data to advance digital security and privacy protection. Each point below represents a university or research institution using our data breach research.Thanks to community-funded access, each purchase directly supports our mission and provides access to nearly two additional researchers for every supporter who contributes. This sustainable model keeps the database accessible to educators, advocates, journalists, and research institutions everywhere.

Frequently Asked Questions