
Privacy Rights Clearinghouse
Single User Access (Updated 2026-04-26)
Single User Access (Updated 2026-04-26)
One user, one snapshot. The complete database as it stands when you purchase. Your download link stays active for one year. SQLite, CSV, and Excel formats included. Commercial use permitted.
Version current at purchase
SQLite, Excel, CSV
Integrate into your products
Re-download anytime
65 Fields Per Record
| Category | What's included |
| Organization | Normalized name, type (7 categories such as MED, BSF, GOV), subtype (86 classifications such as hospital-health-system, credit-reporting-agency, data-broker), and acceptable name variants for consistent entity tracking across the database. |
| Breach | Type (7 categories), subtype (36 specific methods such as ransomware, phishing, credential-stuffing), third-party vendor name when the breach originated at a service provider, and a narrative incident summary extracted from the notification letter. |
| Impact | Total individuals affected, state residents affected, and personal information exposed classified against the 13 information categories defined by the California Consumer Privacy Act (CCPA). |
| Dates | Reported date, breach start date, breach end date. |
| Location | Street address, city, state, zip, country, and geocoded latitude/longitude coordinates for spatial analysis. |
| Corporate identifiers | Where matches exist in public registries: SEC EDGAR (CIK + ticker), GLEIF LEI, NPI, IRS EIN, IPEDS, FDIC, NCUA, and Census Bureau ID. Coverage varies by organization type and the quality of information available in source filings. |
| Breach event grouping | When the same breach generates notifications in multiple states, or a shared vendor compromise affects many organizations, those filings are linked by a stable group identifier with pre-computed event-level aggregates: combined impact totals, merged timelines, per-organization breakdowns, and vendor event identification. |
| Source documentation | Original government filing URL, archived notification letter URL, and full extracted notification letter text (SQLite format only). |
Complete field documentation (README.pdf) included with every purchase.
Used by researchers at more than 250 institutions across 26 countries. The Data Breach Chronology serves economists modeling supply chain risk, legal scholars studying enforcement gaps, security professionals tracking emerging threats, policy researchers studying patterns in data privacy, and cybersecurity platforms integrating breach intelligence into their products.
Purchases support Privacy Rights Clearinghouse's nonprofit mission. We may be able to provide fee waivers for researchers conducting unfunded academic work that advances consumer privacy. To apply, submit your request to [email protected].
Single User Access (Updated 2026-04-26)
Click image to enlarge
Single User Access (Updated 2026-04-26)
Click image to enlarge
Single User Access (Updated 2026-04-26)
Click image to enlarge
Single User Access (Updated 2026-04-26)
Click image to enlarge
Couldn't load pickup availability
Share
