Editorial accuracy
Source and Corrections Policy
Explains how Breached sources breach records, attributes claims, corrects errors, and handles takedown or dispute requests.
- Updated
- May 7, 2026
- Footer
- Required
- Intake
- Optional
Source hierarchy
- Prefer official company notices, regulator postings, SEC filings, court records, state attorney general notices, and primary security-research publications.
- Use news, social posts, and third-party databases as supporting sources when primary sources are unavailable or delayed.
- Attribute material claims to the source that supports them.
What Breached summarizes
Breached may summarize the company name, report date, source URL, affected-count estimates, exposed-data categories, severity, and plain-English impact. Breached does not republish stolen datasets or victim lists.
Corrections
- Correct factual errors when reliable evidence shows that a breach page is wrong or materially incomplete.
- Use qualifying language such as reportedly or according to when a claim depends on a source that is not final.
- Keep enough notes to explain what changed and why.
Disputes
A company or source owner may request correction, clarification, attribution changes, or removal review. Breached evaluates the request against the cited sources, public-interest value, legal risk, and user safety.