Notification of data security breaches

被引:3
|
作者
Schwartz, Paul M.
Janger, Edward J.
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Brooklyn Law Sch, Brooklyn, NY USA
关键词
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
The law increasingly requires private companies to disclose information for the benefit of consumers. The latest examples of such regulation are state and federal laws that require companies to notify individuals of data security incidents involving their personal information. These laws, proposed in the wake of highly publicized data spills, seek to punish the breached entity and to protect consumers by requiring the entity to notify its customers about the security breach. There are competing approaches, however; to how the law is to mandate release of information about data leaks. This Article finds that the current statutes' focus on reputational sanction is incomplete. An important function of breach notification is mitigation of harm after a data leak. This function requires a multi-institutional coordinated response of the kind that is absent from current policy proposals. This Article advocates creation of a coordinated response architecture and develops the elements of such an approach. Central to this architecture is a coordinated response agent (CRA) that oversees steps for automatic consumer protection and heightens mitigation. This Article also proposes a bifurcated notice scheme that lets firms know that the CRA is watching and is scrutinizing their decision whether or not to disclose information about a breach to the affected individuals. Moreover, the CRA will set in motion automatic protective measures on behalf of the breached consumers. Finally, the CRA will regulate the content of notification messages to reflect the nature of the data breach.
引用
收藏
页码:913 / 984
页数:72
相关论文
共 50 条
  • [1] Medical data breaches: Notification delayed is notification denied
    Kierkegaard, Patrick
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (02) : 163 - 183
  • [2] Data Security: Data Breaches
    Cooper, Deborah L.
    [J]. PROCEEDINGS OF THE 2015 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE, 2015,
  • [3] Notification of data breaches in Australia: Implications for airlines
    von Nessen, Paul
    Heilbronn, Gary
    [J]. AUSTRALIAN BUSINESS LAW REVIEW, 2009, 37 (06): : 387 - 398
  • [4] Aftermaths of data security breaches continue
    不详
    [J]. COMPUTERS & SECURITY, 2006, 25 (08) : 561 - 561
  • [5] Aftermath of data security breaches continues
    不详
    [J]. COMPUTERS & SECURITY, 2006, 25 (07) : 481 - 481
  • [6] Earnings Management in Firms with Data Security Breaches
    Xu, Howard
    Guo, Savannah
    Haislip, Jacob Z.
    Pinsker, Robert E.
    [J]. JOURNAL OF INFORMATION SYSTEMS, 2019, 33 (03) : 267 - 284
  • [7] Market Price Effects of Data Security Breaches
    Morse, Edward A.
    Raval, Vasant
    Wingender, John R., Jr.
    [J]. INFORMATION SECURITY JOURNAL, 2011, 20 (06): : 263 - 273
  • [8] An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws
    Bisogni, Fabio
    Asghari, Hadi
    [J]. JOURNAL OF INFORMATION POLICY, 2020, 10 : 45 - 82
  • [9] Security breaches threaten personal and financial data
    Schultz, E
    [J]. COMPUTERS & SECURITY, 2004, 23 (04) : 269 - 270
  • [10] Ascribing responsibility for online security and data breaches
    Carre, Jessica Rose
    Curtis, Shelby R.
    Jones, Daniel Nelson
    [J]. MANAGERIAL AUDITING JOURNAL, 2018, 33 (04) : 436 - 446