text
stringlengths 0
118
|
---|
what the typical letter says: It begins by saying that the organization regrets |
to inform you that your data was lost or stolen or improperly accessed, |
describes the type of data involved, briefly relays what is known about the |
incident, provides a phone number hotline to call for more information, and |
often offers one year of free credit monitoring. And that’s it, even if you get |
that much. |
The organization sending these letters hope that after a quick groan, you |
will throw the letter in the trash and move on with your day. Indeed, the |
costs for organizations are lower if fewer people call the hotline or request |
credit monitoring, so the letters are written to avoid making people feel |
uneasy or alarmed. |
Breach notification is now a basic part of the canon for data security law. |
That lone California law sparked a trend that has launched billions of |
letters. If there’s an undisputed winner in all this, it’s the post office. |
Variations in Breach Notification Laws |
Although breach notification laws all have some form of notification in |
common, the laws are far from uniform, and their approaches have evolved |
over the years. |
Breach notification laws differ significantly on how they define a “data |
breach”—the type of incident that triggers notification. Generally speaking, |
most states define a breach either as any unauthorized access to personal |
information or as acquisition of personal information.14 Many states adopt |
some form of a harm requirement along the lines of the “CIA” security triad |
(intrusions that compromise the confidentiality, integrity, or availability of |
personal data).15 However, enough ambiguity remains in many definitions |
of a security breach that it is not fully clear if a breach occurs merely when |
unauthorized people gain access to a data storage system or whether the |
data must be exposed to significant risk (even if harm has not yet |
occurrred).16 |
California’s breach law requires that personal data be “reasonably |
believed” to have been “acquired” by an unauthorized party.17 According to |
guidance by the California Office of Privacy Protection, factors to |
demonstrate acquisition of personal data include indications that the data is |
“in the physical possession and control of an unauthorized person” or “has |
been downloaded or copied” or “was used by an unauthorized person.”18 |
Many U.S. states have followed this approach and define a breach as |
involving the acquisition of personal data. |
The problem with requiring the acquisition of data is that sometimes |
unauthorized people look at data yet do not copy it. The goal might have |
been just to learn information. But many laws do not consider such actions |
to be a breach. Frequently, all that can be known is that a hacker broke in |
and improperly accessed the data; whether the hacker copied it or used it is |
unknown. Nor is it known what the hacker might do in the future. In other |
words, the hacker could have acquired the data, but it is quite difficult to |
know for sure. |
Other notification laws require notification only if here is a “misuse” of |
personal data or a reasonable likelihood of misuse.19 HIPAA’s breach |
notification standard requires notification when there is a risk greater than a |
“low risk” that information is “compromised.”20 The EU’s General Data |
Protection Regulation (GDPR) requires notification whenever data has been |
improperly accessed, destroyed, lost, or altered that will “result in a risk to |
the rights and freedoms of natural persons.”21 |
Another way that notification laws vary is in how they define “personal |
information.” Notification is required only for breaches involving personal |
information. In the U.S., most states define personal information as an |
individual’s first name or first initial and last name in combination with an |
additional data element, such as a Social Security Number, driver’s license |
number, or financial account information with the applicable PIN or access |
code for same. Recently, however, many states have amended their statute’s |
definition of personal information to include additional data elements, such |
as biometric health information, username, email address, and password. |
In the EU, the GDPR has a broader concept of personal information. |
Using the term “personal data,” the GDPR’s definition encompasses “any |
information relating to an identified or identifiable natural person.” |
Personal data is “identifiable” when it is possible to identify people directly |
or indirectly” from the information.22 The GDPR’s definition is much more |
sensible compared to the way many U.S. notification laws have defined |
personal information. There are many instances under U.S. laws where |
information can be linked to people and can be used to cause them harm yet |
don’t fall under the statutory definitions of personal information. |
Once a notification law is triggered—by a type of incident affecting |
personal information—the laws further vary in how quickly they require |
notification. Many laws mandate notification “without delay” or “as soon as |
practicable.” In the United States, a sizeable minority of states (about 40 |
percent) have timelines. Florida and Ohio were the first states to mandate a |
maximum time (45 days) between the identification of a breach and |
notification of the affected parties. Both laws were passed in 2005. In 2006, |
Wisconsin and Colorado set time limits of 45 days and 30 days, |
respectively. |
Before 2014, only these four states had set time limits. But then, in 2014 |
and over the next few years, 14 more states added timelines ranging from |
15 to 90 days, with most still mandating 45 days. Recently, timelines have |
been shrinking. The GDPR, for example, requires notification of the |
authorities within 72 hours after discovering the breach.23 |
Notification laws also diverge in who can sue following a violation of |
the law. In the U.S., 10 states and the District of Columbia explicitly allow |
for a private right of action in their laws.24 Most states lack a private right |
of action. |
Problems with Breach Notification Laws |
Breach notification laws are quite popular, but do they work well? In at |
least one way, they do. Breach notification laws have added much greater |
transparency to data breaches. The increased transparency has been |
tremendously important, shedding much-needed light on the extensiveness |
of the data breach epidemic and the inadequacy of the data security of many |
organizations. They also at least provide a reputational incentive to |
encourage executives to invest some resources into avoiding data breaches. |
Unfortunately, in many other respects, breach notification falls short. |
Breach notification laws ultimately do not require good security; they |
merely require organizations to provide information about data breaches. |
INADEQUATE PROTECTION OF CONSUMERS |
Subsets and Splits