Notification of data security breaches

被引:3
|
作者
Schwartz, Paul M.
Janger, Edward J.
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Brooklyn Law Sch, Brooklyn, NY USA
关键词
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
The law increasingly requires private companies to disclose information for the benefit of consumers. The latest examples of such regulation are state and federal laws that require companies to notify individuals of data security incidents involving their personal information. These laws, proposed in the wake of highly publicized data spills, seek to punish the breached entity and to protect consumers by requiring the entity to notify its customers about the security breach. There are competing approaches, however; to how the law is to mandate release of information about data leaks. This Article finds that the current statutes' focus on reputational sanction is incomplete. An important function of breach notification is mitigation of harm after a data leak. This function requires a multi-institutional coordinated response of the kind that is absent from current policy proposals. This Article advocates creation of a coordinated response architecture and develops the elements of such an approach. Central to this architecture is a coordinated response agent (CRA) that oversees steps for automatic consumer protection and heightens mitigation. This Article also proposes a bifurcated notice scheme that lets firms know that the CRA is watching and is scrutinizing their decision whether or not to disclose information about a breach to the affected individuals. Moreover, the CRA will set in motion automatic protective measures on behalf of the breached consumers. Finally, the CRA will regulate the content of notification messages to reflect the nature of the data breach.
引用
收藏
页码:913 / 984
页数:72
相关论文
共 50 条
  • [41] Opportunities and challenges in tracing security breaches
    Gertz, M
    [J]. INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS V, 2003, 124 : 223 - 226
  • [42] Protecting information security under a uniform data breach notification law
    Picanso, Kathryn E.
    [J]. FORDHAM LAW REVIEW, 2006, 75 (01) : 355 - 390
  • [43] Error management in service security breaches
    Wei, Wei
    Zhang, Lu
    Hua, Nan
    [J]. JOURNAL OF SERVICES MARKETING, 2019, 31 (07) : 783 - 797
  • [44] Are data breaches the new norm? Exploring data breach trends, consumer sentiment, and responses to security invasions
    Markos, Ereni
    Pena, Priscilla
    Labrecque, Lauren I.
    Swani, Kunal
    [J]. JOURNAL OF CONSUMER AFFAIRS, 2023, 57 (03) : 1089 - 1119
  • [45] Dodging Data Breaches
    Sloane, Barry
    [J]. FORBES, 2011, 188 (01): : 45 - 45
  • [46] Security Maintenance Mediation: a technology for preventing unintended security breaches
    King, R
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (01): : 49 - 60
  • [47] The Roles of IT Strategies and Security Investments in Reducing Organizational Security Breaches
    Li, He
    Yoo, Sungjin
    Kettinger, William J.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2021, 38 (01) : 222 - 245
  • [48] Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey
    Yeng, Prosper Kandabongee
    Yang, Bian
    Snekkenes, Einar Arthur
    [J]. PHEALTH 2019, 2019, 261 : 239 - 245
  • [49] Disclosure of security breaches becomes Californian law
    不详
    [J]. COMPUTERS & SECURITY, 2003, 22 (01) : 5 - 5
  • [50] Modelling and analysing cognitive causes of security breaches
    Ruksenas, Rimvydas
    Curzon, Paul
    Blandford, Ann
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2008, 4 (02) : 143 - 160