text
stringlengths
0
118
like New York’s Cybersecurity Requirements for Financial Services Companies and state
breach notification and data security safeguards rules. For scholarship on data protection and
cybersecurity, see, e.g., Daniel J. Solove & Woodrow Hartzog, The FTC and the New Common
Law of Privacy, 114 Columb. L. Rev. 583 (2014); Woodrow Hartzog and Daniel J. Solove, The
Scope and Potential of FTC Data Protection, 83 Geo. Wash. L. Rev. 2230 (2015); Bill
McGeveran, The Duty of Data Security, 103 Minn. L. Rev. 1135 (2019); Andrea M.
Matwyshyn, Privacy, the Hacker Way, 87 S. Cal. L. Rev. 1 (2013); David Thaw, Cybersecurity
Stovepiping, 96 Neb. L. Rev. 339 (2017); David Thaw, Data Breach (Regulatory) Effects, 2015
Cardozo L. Rev. De Novo 151; David Thaw, The Efficacy of Cybersecurity Regulation, 30 Ga.
St. U. L. Rev. 287 (2014); Derek E. Bambauer, Privacy Versus Security, 103 J. Crim. L. &
Criminology 667 (2013); Derek E. Bambauer, Conundrum, 96 Minn. L. Rev. 584, 585 (2011);
Derek E. Bambauer, Ghost in the Network, 162 U. Pa. L. Rev. 1011, 1012 (2014); Derek E.
Bambauer, Schrödinger’s Cybersecurity, 48 U.C. Davis L. Rev. 791 (2015); Lauren Henry
Scholz, Information Privacy and Data Security, 2015 Cardozo L. Rev. De Novo 107 (2015);
David W. Opderbeck, Cybersecurity, Data Breaches, and the Economic Loss Doctrine in the
Payment Card Industry, 75 Md. L. Rev. 935 (2016); Rebecca Crootof, International
Cybertorts: Expanding State Accountability in Cyberspace, 103 Cornell L. Rev. 565 (2018).
29.
Several scholars have noted the inherent complexity of the term cybersecurity itself. See Jeff
Kosseff, Defining Cybersecurity Law, 103 Iowa L. Rev. 985 (2018); Andrea M. Matwyshyn,
Hacking Speech: Informational Speech and the First Amendment, 107 Nw. U. L. Rev. 795, 845
n.99 (2013) (“Referring to all of information security, particularly in private sector contexts, as
‘cybersecurity’ is technically incorrect. ‘Cyber’ has traditionally referred to Internet-only
phenomena. Information security is not solely an Internet phenomenon. Information security
questions involve both computer security and physical security.”); Andrea M. Matwyshyn,
CYBER!, 2017 BYU L. Rev. 1109 (2018); David Thaw, The Efficacy of Cybersecurity
Regulation, 30 Ga. St. U. L. Rev. 287, 291–292 (2014) (“Cybersecurity and cyber-attack are
increasingly common terms in public discourse, but there is surprising disagreement as to what
precisely they refer. The terms are too-often used broadly to include all of electronic crimes,
military action, domestic guard/homeland security activities, corporate risk management,
financial security, and a wide spectrum of other activities related to computers, the Internet,
privacy, and other similar topics. I do not suggest the term is misapplied to any of these topics,
but rather that more precise terms would be helpful.”).
30.
See Andrea M. Matwyshyn, CYBER!, 2017 BYU L. Rev. 1109, 1121 (2018) (“[E]ffective
security requires vigilant coordination across institutional and legal silos wherever the
particular vulnerable code has been deployed. In other words, technologically speaking, we
need to fix all the vulnerable systems in both the public and the private sector because the
compromise of either could potentially lead to compromise of both.”).
31.
For example, in this book we will explore how password complexity requirements did not serve
their intended purpose and likely facilitated some breaches. For a robust exploration of how
password complexity requirements went so badly, see David Thaw, Cybersecurity Stovepiping,
96 Neb. L. Rev. 339 (2017).
32.
See also Deirdre K. Mulligan & Fred Schneider, Doctrine for Cybersecurity, 140 Daedalus 70
(2011) (advocating for a regulatory approach to cybersecurity modeled after public health);
Elaine Sedenberg & Deirdre K. Mulligan, Public Health as a Model for Cybersecurity
Information Sharing, 30 Berkeley Tech. L. J. 1687 (2015); Adam Shostack, We Need a
Discipline of Cyber Public Health, Adam Shostack & Friends, (Nov. 13, 2020),
https://adam.shostack.org/blog/2020/11/we-need-a-discipline-of-cyber-public-health/.
33.
Wendy Parmet, Populations, Public Health, and the Law 192 (2009) (“effective preparedness
depends on a wide array of laws that promote and protect population health not only in
emergencies but also in the calm periods between the storms. In this regard, health law plays an
important and often overlooked role. It helps shape the health care system, influencing whether
that system has the capacity to respond to the challenges posed by a pandemic or other
emergency, or whether it lacks essential attributes, such as resiliency and redundancy, leaving it
overly dependent upon emergency measures. . . .”).
CHAPTER 2
1.
Juliana De Groot, The History of Data Breaches, Data Insider, (Jan. 3, 2019),
https://digitalguardian.com/blog/history-data-breaches.
2.
Privacy Rights Clearinghouse, Data Breaches, https://www.privacyrights.org/data-breaches.
3.
See infra Chapter 3.
4.
Tony Martin-Vegue, Will the Real “Year of the Data Breach” Please Stand Up, HackerNoon,
(Jan. 4, 2018), https://hackernoon.com/will-the-real-year-of-the-data- breach-please-stand-up-
744ab6f63615.
5.
Top
10
Most
Visible
Changes
Since
2005,
SC
Magazine,
(Dec.
15,
2006),
https://www.scmagazine.com/home/security-news/it-security-reboot-2006-the-years-top-news/.
6.
Mark Jewellap, Record Number of Data Breaches in 2007, Assoc. Press, (Dec. 30, 2007),
http://www.nbcnews.com/id/22420774/ns/technology_and_science-security/ t/record-number-
data-breaches/#.XVx6uOhKg60.
7.
Ellen Messmer, Details Emerging on Hannaford Data Breach, Network World, (Mar. 28,
2008),
https://www.networkworld.com/article/2284998/details-emerging-on-hannaford-data-
breach.html.
8.
Mark Jewell, T.J. Maxx Theft Believed Largest Hack Ever, NBC News, (Mar. 30, 2007),
http://www.nbcnews.com/id/17871485/ns/technology_and_science-security/
t/tj-maxx-theft-
believed-largest-hack-ever/#.XWC8zehKg60.
9.