text
stringlengths 0
118
|
---|
like New York’s Cybersecurity Requirements for Financial Services Companies and state |
breach notification and data security safeguards rules. For scholarship on data protection and |
cybersecurity, see, e.g., Daniel J. Solove & Woodrow Hartzog, The FTC and the New Common |
Law of Privacy, 114 Columb. L. Rev. 583 (2014); Woodrow Hartzog and Daniel J. Solove, The |
Scope and Potential of FTC Data Protection, 83 Geo. Wash. L. Rev. 2230 (2015); Bill |
McGeveran, The Duty of Data Security, 103 Minn. L. Rev. 1135 (2019); Andrea M. |
Matwyshyn, Privacy, the Hacker Way, 87 S. Cal. L. Rev. 1 (2013); David Thaw, Cybersecurity |
Stovepiping, 96 Neb. L. Rev. 339 (2017); David Thaw, Data Breach (Regulatory) Effects, 2015 |
Cardozo L. Rev. De Novo 151; David Thaw, The Efficacy of Cybersecurity Regulation, 30 Ga. |
St. U. L. Rev. 287 (2014); Derek E. Bambauer, Privacy Versus Security, 103 J. Crim. L. & |
Criminology 667 (2013); Derek E. Bambauer, Conundrum, 96 Minn. L. Rev. 584, 585 (2011); |
Derek E. Bambauer, Ghost in the Network, 162 U. Pa. L. Rev. 1011, 1012 (2014); Derek E. |
Bambauer, Schrödinger’s Cybersecurity, 48 U.C. Davis L. Rev. 791 (2015); Lauren Henry |
Scholz, Information Privacy and Data Security, 2015 Cardozo L. Rev. De Novo 107 (2015); |
David W. Opderbeck, Cybersecurity, Data Breaches, and the Economic Loss Doctrine in the |
Payment Card Industry, 75 Md. L. Rev. 935 (2016); Rebecca Crootof, International |
Cybertorts: Expanding State Accountability in Cyberspace, 103 Cornell L. Rev. 565 (2018). |
29. |
Several scholars have noted the inherent complexity of the term cybersecurity itself. See Jeff |
Kosseff, Defining Cybersecurity Law, 103 Iowa L. Rev. 985 (2018); Andrea M. Matwyshyn, |
Hacking Speech: Informational Speech and the First Amendment, 107 Nw. U. L. Rev. 795, 845 |
n.99 (2013) (“Referring to all of information security, particularly in private sector contexts, as |
‘cybersecurity’ is technically incorrect. ‘Cyber’ has traditionally referred to Internet-only |
phenomena. Information security is not solely an Internet phenomenon. Information security |
questions involve both computer security and physical security.”); Andrea M. Matwyshyn, |
CYBER!, 2017 BYU L. Rev. 1109 (2018); David Thaw, The Efficacy of Cybersecurity |
Regulation, 30 Ga. St. U. L. Rev. 287, 291–292 (2014) (“Cybersecurity and cyber-attack are |
increasingly common terms in public discourse, but there is surprising disagreement as to what |
precisely they refer. The terms are too-often used broadly to include all of electronic crimes, |
military action, domestic guard/homeland security activities, corporate risk management, |
financial security, and a wide spectrum of other activities related to computers, the Internet, |
privacy, and other similar topics. I do not suggest the term is misapplied to any of these topics, |
but rather that more precise terms would be helpful.”). |
30. |
See Andrea M. Matwyshyn, CYBER!, 2017 BYU L. Rev. 1109, 1121 (2018) (“[E]ffective |
security requires vigilant coordination across institutional and legal silos wherever the |
particular vulnerable code has been deployed. In other words, technologically speaking, we |
need to fix all the vulnerable systems in both the public and the private sector because the |
compromise of either could potentially lead to compromise of both.”). |
31. |
For example, in this book we will explore how password complexity requirements did not serve |
their intended purpose and likely facilitated some breaches. For a robust exploration of how |
password complexity requirements went so badly, see David Thaw, Cybersecurity Stovepiping, |
96 Neb. L. Rev. 339 (2017). |
32. |
See also Deirdre K. Mulligan & Fred Schneider, Doctrine for Cybersecurity, 140 Daedalus 70 |
(2011) (advocating for a regulatory approach to cybersecurity modeled after public health); |
Elaine Sedenberg & Deirdre K. Mulligan, Public Health as a Model for Cybersecurity |
Information Sharing, 30 Berkeley Tech. L. J. 1687 (2015); Adam Shostack, We Need a |
Discipline of Cyber Public Health, Adam Shostack & Friends, (Nov. 13, 2020), |
https://adam.shostack.org/blog/2020/11/we-need-a-discipline-of-cyber-public-health/. |
33. |
Wendy Parmet, Populations, Public Health, and the Law 192 (2009) (“effective preparedness |
depends on a wide array of laws that promote and protect population health not only in |
emergencies but also in the calm periods between the storms. In this regard, health law plays an |
important and often overlooked role. It helps shape the health care system, influencing whether |
that system has the capacity to respond to the challenges posed by a pandemic or other |
emergency, or whether it lacks essential attributes, such as resiliency and redundancy, leaving it |
overly dependent upon emergency measures. . . .”). |
CHAPTER 2 |
1. |
Juliana De Groot, The History of Data Breaches, Data Insider, (Jan. 3, 2019), |
https://digitalguardian.com/blog/history-data-breaches. |
2. |
Privacy Rights Clearinghouse, Data Breaches, https://www.privacyrights.org/data-breaches. |
3. |
See infra Chapter 3. |
4. |
Tony Martin-Vegue, Will the Real “Year of the Data Breach” Please Stand Up, HackerNoon, |
(Jan. 4, 2018), https://hackernoon.com/will-the-real-year-of-the-data- breach-please-stand-up- |
744ab6f63615. |
5. |
Top |
10 |
Most |
Visible |
Changes |
Since |
2005, |
SC |
Magazine, |
(Dec. |
15, |
2006), |
https://www.scmagazine.com/home/security-news/it-security-reboot-2006-the-years-top-news/. |
6. |
Mark Jewellap, Record Number of Data Breaches in 2007, Assoc. Press, (Dec. 30, 2007), |
http://www.nbcnews.com/id/22420774/ns/technology_and_science-security/ t/record-number- |
data-breaches/#.XVx6uOhKg60. |
7. |
Ellen Messmer, Details Emerging on Hannaford Data Breach, Network World, (Mar. 28, |
2008), |
https://www.networkworld.com/article/2284998/details-emerging-on-hannaford-data- |
breach.html. |
8. |
Mark Jewell, T.J. Maxx Theft Believed Largest Hack Ever, NBC News, (Mar. 30, 2007), |
http://www.nbcnews.com/id/17871485/ns/technology_and_science-security/ |
t/tj-maxx-theft- |
believed-largest-hack-ever/#.XWC8zehKg60. |
9. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.