text
stringlengths 0
118
|
---|
Professor Chris Hoofnagle illustrates that the same phenomenon is |
happening with identity theft. Companies grant credit carelessly because it |
is cheap to do so. Much of the losses are sloughed off on victims because |
the companies aren’t forced to internalize them.42 |
Identity theft often happens because companies let it happen. It is an |
economic decision. Companies want to make it quick and easy for people to |
obtain credit. |
For example, you might be standing in the check-out line of a store with |
some expensive merchandise. The checkout clerk says: “Do you want to |
apply for our store credit card and receive 10 percent off?” |
You are in a hurry. “How long will this take?” you ask. “I don’t have a |
lot of time.” |
“It’s super-fast and easy,” the clerk says. “Just fill out this short |
application, and we can have your account created in less than a minute. |
And you’ll get 10 percent off.” Because the application process is so quick, |
you say “Sure.” |
But what if the application process took a lot longer? You might not |
have time to wait around. You might not want to fill out a long form and |
answer many questions. |
This is a calculated business risk decision by companies. They know that |
their quick and easy process can be exploited by fraudsters. Fraud will cost |
them, but they will reap far more rewards by getting more people to sign up |
for the card. |
But there’s a cost that credit issuers aren’t taking into account—the cost |
to victims of identity theft. The victims are often not their customers. These |
victims are the people whose identities are stolen to create fake accounts. |
Hoofnagle provides data from the credit applications of six identity theft |
victims to show how obvious incorrect data often isn’t flagged. |
Applications had the wrong address, wrong phone number, or wrong date of |
birth. Some contained multiple mistakes. One even had the victim’s name |
misspelled. These red flags in the credit applications could readily have |
been identified and investigated to discover the fraud. But they were |
ignored. |
Identity theft is a product of deliberate carelessness. The reason so much |
identity theft occurs is because it is cheaper to expose people to the risk of |
identity theft than to exercise more care in vetting credit applications. |
Courts and legislatures are also to blame because they fail to adequately |
recognize the harm of identity theft (or data breaches) and will not make |
companies internalize the full costs. The companies do their cost–benefit |
analysis and conclude that they can expose people to the risk of identity |
theft because many costs are external. |
In one of the most egregious cases, Huggins v. Citibank, several banks |
negligently issued credit cards in Kenneth Huggins’ name to an identity |
thief without investigating the accuracy of the credit card application. The |
thief racked up hefty charges, which were falsely attributed to Huggins. |
Huggins was “hounded by collection agencies” and spent much time trying |
to repair the damage. He was only partially able to clean up the mess.43 |
Huggins sued the banks. The banks didn’t argue that they acted carefully |
and properly. Instead, they claimed the case should be dismissed because |
Huggins wasn’t their customer. The court began by noting that it was |
“greatly concerned about the rampant growth of identity theft and financial |
fraud in this country.” The court further noted that “we are certain that some |
identity theft could be prevented if credit card issuers carefully scrutinized |
credit card applications.” However, the court then concluded that it would |
“decline to recognize a legal duty of care between credit card issuers and |
those individuals whose identities may be stolen. The relationship, if any, |
between credit card issuers and potential victims of identity theft is far too |
attenuated to rise to the level of a duty between them. Even though it is |
foreseeable that injury may arise by the negligent issuance of a credit card, |
foreseeability alone does not give rise to a duty.” In sum, the court |
concluded that “there is no duty on the part of credit card issuers to protect |
potential victims of identity.” |
To translate the legalese, this case means that companies can make a ton |
of money by being very careless in issuing credit cards, and they don’t have |
to do anything to protect people who might be harmed by their carelessness. |
If courts and legislatures were to better recognize harm and force |
companies to internalize it, then we would see an end to the sloppy |
practices that allow so much identity theft to occur. Until that time, |
companies can be just like Ford with the Pinto. |
Other courts have taken differing views.44 But as a general matter, far |
too often courts aren’t holding companies responsible. Because of this, |
identity thieves can readily open fraudulent accounts in people’s names by |
supplying just a few pieces of information, which they can readily obtain |
from a data breach. |
TAKING THE STING OUT OF DATA BREACHES |
Data breaches cause far too much needless harm. The law can lessen or stop |
much of this harm. As we discussed earlier, we can’t stop all data breaches. |
Not only is this an unrealistic goal, but it is undesirable. The obsession with |
stopping all breaches has worsened the problem. We can reduce the number |
of breaches, but we are going to have to live with some of them. |
There’s another way to help the problem, though. We can take much of |
the sting out of data breaches. They need not be so harmful to individuals or |
so costly to organizations. If SSNs weren’t used as passwords, for example, |
then the SSN would just be a number and nothing more. A data breach of |
SSNs wouldn’t cause harm. |
The law should ban the use of SSNs to authenticate identity. Congress |
could pass such a law, but it hasn’t done so, despite one of us proposing the |
idea at a Congressional hearing back in 2005. |
However, no new law needs to be passed for change to occur. The law |
currently has ample tools to stop the use of SSNs as passwords. The FTC |
could use its enforcement power under several laws to halt the misuse of |
SSNs for authentication purposes. The general standard for data security for |
FTC enforcement is “reasonable” security. This standard is used in the |
Gramm-Leach-Bliley Act (GLBA) of 1999, a law that regulates financial |
institutions. The FTC’s broadest authority to enforce for reasonable data |
security is under Section 5 of the FTC Act. For the past 25 years, the FTC |
has enforced against unreasonable data security as a violation of the FTC |
Act’s prohibition of “unfair or deceptive acts or practices in or affecting |
commerce.”45 |
The misuse of SSNs as passwords is unreasonable. No security expert |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.