text
stringlengths
0
118
them to do anything with data on their own. But that can come at a cost
because these control measures can be oppressive and counterproductive,
changing the culture of an organization and making it too rigid, less free,
and less trusting.
Good data security involves determining the appropriate level of risk.
How much risk is appropriate? There is no one right answer to this
question. Thoughtful data security decisions involve judgments about
balancing many considerations. Data security is much more complicated,
nuanced, and creative than merely checking items off a list. Although
lawmakers often treat data security as a science with objective correct
answers, it is much more of an art.9
Recall that the main goals of cybersecurity are most commonly
conceptualized as protecting the “confidentiality, integrity, and availability”
of data—the CIA triad.10 While these values are useful as specific goals for
policies and practices, they don’t capture all of the dimensions of managing
the risks involved with personal data. There is much more to data protection
than maintaining confidentiality, such as addressing how personal data is
shared, used, and stored.
If data security is thought of primarily in terms of risk management, it
means the goals of confidentiality, integrity, and availability must be
consistently balanced against the goals of information systems and the
societal goals like market participation, self-expression, socialization,
public health, and even democratic self-governance.
Here is where data security law can go astray. At the organizational
level, over-enforcement against breached companies can skew risk
management. At the systems level, notification requirements and safeguard
rules don’t address the need to allocate and calibrate responsibility for
protection across groups of actors who contribute to insecurity. A different
approach is needed.
A NEW ROLE FOR DATA SECURITY LAW
Although the current law is not adequately addressing the challenge of data
security, there is an important role for the law to play. But lawmakers must
take a fundamentally different approach. Currently, the law operates
primarily by worsening the consequences of a breach. The hope is that
intensifying the pain of breaches will deter breaches by making
organizations take more steps to avoid them. But extreme deterrence is the
wrong goal. As we discussed above, the goal is to encourage optimal risk
management, not to avoid breaches at all costs. Because organizations that
suffer breaches are not the only cause of the breaches or the only actors that
can affect the risk, the law should facilitate a better management of the risk
across the entire data ecosystem.
Data security law should take on the role of promoting structural change
in the data ecosystem. The law should establish who is responsible for
what. It should set up the right incentives; it should help shape the system in
which everything operates. The key to the law’s success is to look beyond
the breach to the whole data ecosystem. As we will discuss later, data
breaches are the product of many actors in the data ecosystem, and the law
currently only focuses on a fraction of them.
An Analogy to Public Health
Data security could learn a great deal by looking through the lens of public
health. The two fields actually use similar terms and concepts. Data security
professionals speak to the “health” of their network.11 They refer to
mapping and monitoring their data flows as good “data hygiene.”12
“Viruses” threaten both public health and the security of networks and data.
The language of health in these settings is both appropriate and
underappreciated by law and policy makers. The Oxford English Dictionary
defines health as “soundness of body; that condition in which its functions
are duly and efficiently discharged.”13 If we consider data networks as a
body that must function efficiently, then lawmakers might benefit from an
alternative approach to data security law and policy that looks beyond the
health of individuals (in our case, data holders) and addresses the health of
an entire populous. The field of public health looks at “the health of the
population as a whole, especially as monitored, regulated, and promoted by
the state (by provision of sanitation, vaccination, etc.).”14 As Wendy Parmet
notes: “[I]nfectious epidemics show that the health of an individual
depends, to a great degree, on the health of others. . . . An individuals’ risk
of becoming ill depended in uncertain ways on the steps that the community
took and the environment and conditions in which the individual lived.”15
The key lesson from public health is interdependency—we have to focus on
the whole system, not play whack-a-mole with specific individuals.
Similar to combating disease epidemics, addressing the data security
epidemic requires collective action. The security of our data largely
depends on factors that are outside of our control and even significantly
outside the control of the organizations that are responsible for storing it
securely. Our approach here is inspired by Deirdre Mulligan and Fred
Schneider’s conceptualization of cybersecurity as a public good.16 The
scholars noted that “Public health and cybersecurity both aim to achieve a
positive state (health or security) in a loosely affiliated but highly
interdependent network.”17 Adam Shostack has also articulated a vision of
“cyber public health” that would support public health equivalents of
institutions and practices for cybersecurity.18 “Security experts rarely give
advice on the level of ‘wash your hands’,” Shostack notes. “Their advice is
rarely consistent with other experts, or the public. People are naturally
confused and give up.” He further argues that unlike in public health, where
public health institutions provide useful statistics and guidance, there are
“few equivalents in the world of cybersecurity.”19
Another important feature of looking at data security from a health and
wellness perspective is that, just like illnesses are inevitable, so too are
security breaches. Derek Bambauer has argued that “focusing efforts
principally on preventing cyberattacks is misguided: perfect security is
impossible, and even attaining good security is extraordinarily difficult.
Instead, cybersecurity regulation should concentrate on mitigating the
damage that successful attacks cause.”20
The Who, What, When, and How of Data Security Law
Data security law jumps in at the wrong time, is not looking to all the
responsible actors, is not addressing the practices that most lead to poor
security, and is not working in the right way. It is failing in four key
dimensions—who, what, when, and how.
WHO
The law loves to pummel the breached organization. Of course, this is an