text
stringlengths
0
118
Breached!
Breached!
Why Data Security Law Fails and How to Improve It
DANIEL J. SOLOVE & WOODROW HARTZOG
Oxford University Press is a department of the University of Oxford. It furthers the University’s
objective of excellence in research, scholarship, and education by publishing worldwide. Oxford is a
registered trade mark of Oxford University Press in the UK and certain other countries.
Published in the United States of America by Oxford University Press 198 Madison Avenue, New
York, NY 10016, United States of America.
© Daniel J. Solove and Woodrow Hartzog 2022
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, without the prior permission in writing of Oxford
University Press, or as expressly permitted by law, by license, or under terms agreed with the
appropriate reproduction rights organization. Inquiries concerning reproduction outside the scope of
the above should be sent to the Rights Department, Oxford University Press, at the address above.
You must not circulate this work in any other form and you must impose this same condition on any
acquirer.
CIP data is on file at the Library of Congress ISBN 978–0–19–094055–3
eISBN 978–0–19–094057–7
 
To Pamela and Griffin—DJS
To Mom and Dad—WH
TABLE OF CONTENTS
1.
Introduction: Chronicle of a Breach Foretold
PART I: A BROADER UNDERSTANDING OF DATA SECURITY
2.
The Data Breach Epidemic
3.
The Failure of Data Security Law
PART II: HOLISTIC DATA SECURITY LAW
4.
The Big Picture: System and Structure
5.
Responsibility Across the Whole Data Ecosystem
6.
Reducing Harm from Data Breaches
7.
Unifying Privacy and Data Security
8.
Designing Security for Humans, the Weakest Link
9.
Conclusion: The Holistic Approach
ACKNOWLEDGMENTS
NOTES
INDEX
1
Introduction
Chronicle of a Breach Foretold
Sometimes the thing we are looking for is right in front of us and yet we
still don’t see it. A great novella by Gabriel Garcia Marquez called
Chronicle of a Death Foretold begins with the vicious fatal stabbing of the
main character. The rest of the story reveals that all the warning signs about
the murder were in plain sight yet ignored by everyone. The murder was
readily preventable—but, because of human nature, it was almost
inevitable.
The story of most data breaches follows the same pattern. We have read
about thousands of data breaches, and the moral of most of these stories
boils down to the same thing: The breaches were preventable, but people
made blunders. What is quite remarkable about these stories is that they
haven’t evolved that much in decades. The same mistakes keep happening
again and again. After so many years, and so many laws to regulate data
security, why haven’t the stories changed?
Let us begin with a classic data breach tale involving one of the largest
and most notable breaches of its time—the Target breach of 2013. The story
has many of the common themes of data breach stories, and what makes it
particularly fascinating is that it is a sinister version of a David-and-Goliath
story. Target was Goliath, and it was well-fortified. With its extensive
resources and defenses, Target was far more protected than most
organizations. Yet, it still failed. This fact should send shivers down our
spines.
In mid-December 2013, right in the middle of the holiday shopping
season, executives at Target found out some dreaded news: Target had been
hacked. It was cruel irony that the second-largest discount store chain in the
United States quite literally had a target sign on it—Target’s logo is a red
and white bullseye. The hackers hit it with an arrow straight into the center.
Executives at Target learned about the breach from Department of
Justice officials, who informed them that stolen data from Target was
appearing online and that reports of fraudulent credit card charges were
starting to pop up.1 Quite concerned, the Target executives immediately
hired a forensics firm to investigate.
What they discovered was devastating. Target’s computer system had
been infected with malware, and there had been a data breach. It wasn’t just
a small breach, or a sizeable one, or even a big one—it was a breach of epic
proportions.2 Target had the dubious distinction of having suffered the
largest retail data breach in U.S. history.3
Over the course of two weeks starting in November 2013, hackers had
stolen detailed information for about 40 million credit and debit card
accounts, as well as personal information on about 70 million Target
customers.4 The hackers had begun to sell their tremendous data haul on
black-market fraud websites.
The timing couldn’t have been worse for Target. It suffered the single
largest decline of holiday transactions since it first began reporting the
statistic.5 Target sales plummeted during a season which traditionally
accounts for 20 to 40 percent of a retailer’s annual sales.6 To stop the
bleeding, Target offered a 10 percent discount across the board.
Nevertheless, the damage was catastrophic. The company’s profits for the
holiday shopping period fell a whopping 46 percent.7
The pain was just beginning. On top of the lost profits, costs associated
with the breach topped $200 million by mid-February 2014. These costs

Dataset Card for "PrivacyTextBooks1.2"

Training dataset containing text from privacy engineering text books and papers

from the following : textbooks:

Breached! - D. Solove Information privacy law - D. Solove Privacy _ what everyone needs to know-Oxford University Press (2017) - Leslie P. Francis, John G. Francis PrivacyEngineersManifesto Protection and privacy in transitional times William Stallings - Information Privacy Engineering and Privacy by Design_ Understanding privacy threats, technologies, and regulations (6 Dec 2019, Addison-Wesley Professional)

papers / talks:

Ive got nothing to hide - D. Solove Understanding privacy - D. Solove Right to privacy - Warren / Brandeis A critical analysis of privacy by design strategies - Colesky Stanford Philosophy Review - Privacy

More Information needed

Downloads last month
34