Policy center · Public docs
BreachedPolicies
Policy center
Editorial accuracy

Source and Corrections Policy

Explains how Breached sources breach records, attributes claims, corrects errors, and handles takedown or dispute requests.

Updated
May 7, 2026
Footer
Required
Intake
Optional

Source hierarchy

  • Prefer official company notices, regulator postings, SEC filings, court records, state attorney general notices, and primary security-research publications.
  • Use news, social posts, and third-party databases as supporting sources when primary sources are unavailable or delayed.
  • Attribute material claims to the source that supports them.

What Breached summarizes

Breached may summarize the company name, report date, source URL, affected-count estimates, exposed-data categories, severity, and plain-English impact. Breached does not republish stolen datasets or victim lists.

Corrections

  • Correct factual errors when reliable evidence shows that a breach page is wrong or materially incomplete.
  • Use qualifying language such as reportedly or according to when a claim depends on a source that is not final.
  • Keep enough notes to explain what changed and why.

Disputes

A company or source owner may request correction, clarification, attribution changes, or removal review. Breached evaluates the request against the cited sources, public-interest value, legal risk, and user safety.