text
stringlengths 0
118
|
---|
A main purported goal of breach notification is to help protect consumers, |
but it is not clear that the laws achieve this purpose. Recall the Target |
breach that we discussed earlier. Under the law of most states, Target was |
required to individually notify affected customers. Target sent out a letter |
from its CEO that stated, in part: |
Target learned in mid-December that criminals forced their way into our systems and took guest |
information, including debit and credit card data. Late last week, as part of our ongoing |
investigation, we learned that additional information, including name, mailing address, phone |
number or email address, was also taken. I am writing to make you aware that your name, |
mailing address, phone number or email address may have been taken during the intrusion. |
People are affected by so many breaches, and they receive letters like this |
all the time. The letters say little to help people assess their risk, and there is |
often not much people can do except to keep a more watchful eye on their |
credit, change their passwords, and hope that nothing bad happens to them |
in the future. |
People also experience “breach notification fatigue.” Receiving |
countless notices becomes tiresome, making some people throw up their |
hands and think that all is hopeless.25 People might not respond with as |
much concern or take protective steps after receiving so many breach |
notifications. |
Notification timelines are getting shorter as a way to make laws tougher. |
The GDPR requires companies to send notifications without “undue delay” |
but not later than 72 hours after becoming aware of the breach. The Federal |
Deposit Insurance Corporation (FDIC) has proposed a 36-hour time |
frame.26 But shorter timelines aren’t always beneficial. In the initial days |
following a breach, not enough is known about the nature, size, and scope |
of the data breach to report details accurately. Too much attention is placed |
on how to make the notification and not enough on figuring out what went |
wrong and how to stop the bleeding. |
States and countries are racing to create the shortest possible reporting |
and notification deadlines. Reporting often occurs too soon to provide |
accurate, meaningful information. |
Even when people do receive a notice, there often isn’t much they can |
do about the breach. People can change their passwords and keep an eye on |
their credit card transactions, but they can’t change their fingerprints, and |
Social Security Numbers are very difficult to change. |
UNPRODUCTIVE INCREASE IN THE COSTS OF A BREACH |
A byproduct of breach notification is that it increases the costs and pain of a |
breach. Reporting a breach to all the different regulators involved is a |
cumbersome and complicated task—and it’s very expensive. A myriad of |
different deadlines and requirements must be met—and often in a very short |
period of time. |
Notification letters are quite costly to send, especially for large breaches |
involving tens of millions of people. Breach notification in essence works |
like a strict liability fine, as it involves costs regardless of whether an |
organization was at fault for a breach. Organizations must pay costs to |
notify based on the size of the breach not based on how careless they were. |
Lawmakers often aim to deter careless conduct by making fault the |
trigger for liability. The idea is to increase costs for those acting carelessly. |
Because the costs of notification are not based upon a company’s fault, |
however, notification rules impose the same costs on everyone. Those who |
have strong security must face the same costs as those who have poor |
security.27 This is a lost opportunity to incentivize better data security. Of |
course, other laws can penalize fault, such as private litigation, but as we |
will discuss later, this type of law isn’t working very well either. |
When California first conceived of breach notification, few knew the full |
scope of our data vulnerability. The breach notification law was a critical |
intervention at the right time. But our understanding of the problem has |
evolved over time and so too must our rules. Breach notification provides |
valuable transparency and some reputational incentives to invest in |
meaningful data safeguards, but it achieves these goals at a tremendously |
high expense, siphoning resources and money from other measures to |
address security. Breach notification is also problematic when policymakers |
view it as the primary response to data breaches. Breach notification is |
being asked to do far more than it is capable of. It provides transparency, |
but it doesn’t provide prevention, protection, or a fix. |
Too much money and resources are spent on notification with not |
enough being achieved. There are ways to provide transparency at a |
fraction of the time and cost. For example, lawmakers might remove the |
requirement for notifying individuals about a data breach in lieu of more |
robust public disclosure requirements that ensure high visibility of a breach |
in the media and by regulators. Although breach notification produces light, |
it also generates a lot of unnecessary heat. Resources could be better |
allocated to other security measures that would help improve data security. |
Figure 3.1 |
SECURITY SAFEGUARDS LAWS |
A second type of data security law is what we refer to as security |
safeguards laws. These types of laws existed long before breach |
notification laws. They are the workhorse of data security law. |
Safeguards laws differ from breach notification laws because safeguards |
laws involve administrative, physical, and technical data security standards. |
Breach notification is mainly about providing information about data |
breaches. |
Security safeguards were incorporated into many of the privacy laws of |
the 1970s, 1980s, and 1990s. It is important to note that security was often |
dealt with in privacy laws rather than separate security laws. These days, |
things have changed, and legislatures often pass independent security laws. |
The reason why security was included in privacy laws traces back to the |
original set of Fair Information Practice Principles (FIPPs), which have |
formed the backbone of most data privacy laws. The FIPPs were famously |
articulated in the 1973 Report by the U.S. Department of Health, Education, |
and Welfare (HEW). The report, Records, Computers, and the Rights of |
Citizens, was an early attempt to address the rights and responsibilities |
associated with keeping data about individuals. The report recommended |
the passage of a code of FIPPs, which have been highly influential in |
shaping countless privacy laws. Among the FIPPs was the following: “Any |
organization creating, maintaining, using, or disseminating records of |
identifiable personal data must assure the reliability of the data for their |
intended use and must take reasonable precautions to prevent misuse of the |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.