text
stringlengths 0
118
|
---|
See |
Data |
Breaches |
in |
2005, |
https://www.privacyrights.org/data-breaches? |
title=&taxonomy_vocabulary_11_tid%5B%5D=271. |
10. |
In order of passage: Arkansas, North Dakota, Indiana, Montana, Georgia, Washington, |
Minnesota, Connecticut, Tennessee, Maine, Illinois, Nevada, Delaware, Rhode Island, |
Louisiana, New York, Puerto Rico, New Jersey, Ohio, North Carolina, Pennsylvania, Florida. |
11. |
In order of passage: Wisconsin, Utah, Idaho, Nebraska, Kansas, Colorado, Arizona, Vermont, |
Hawaii, New Hampshire, Michigan. For more information on data breach notification laws, see |
Charlotte A. Tschider, Experimenting with Privacy: Driving Efficiency Through A State- |
Informed Federal Data Breach Notification and Data Protection Law, 18 Tul. J. Tech. & Intell. |
Prop. 45 (2015). |
12. |
Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules |
Under the Health Information Technology for Economic and Clinical Health Act and the |
Genetic Information Nondiscrimination Act, 78 Fed. Reg. 5566 (Jan. 25, 2013) (codified at 45 |
CFR Parts 160 and 164), https://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf. |
13. |
See, e.g, Omri Ben-Shahar & Carl E. Schneider, The Failure of Mandated Disclosure, 150 U. |
Penn. L. Rev. 647 (2011). |
14. |
See Ala. Code § 8-38-1 et seq (“BREACH OF SECURITY or BREACH. The unauthorized |
acquisition of data in electronic form containing sensitive personally identifying information. |
Acquisition occurring over a period of time committed by the same entity constitutes one |
breach.”). |
15. |
See Whitman & Mattord, Principles of Information Security, (2018). (n.62) p.11; International |
Standardisation Organisation, ISO/IEC 27002: Code of Practice for Information Security |
Management (2005). International Telecommunications Union (ITU). ITU-TX.1205: Series X: |
Data Networks, Open System Communications and Security: Telecommunication Security: |
Overview of cybersecurity (2008). Available at https://www.itu.int/rec/T-REC-X.1205-200804. |
See also, Alaska Stat. § 45.48.010 et seq (“Unauthorized acquisition, or reasonable belief of |
unauthorized acquisition, of personal information that compromises the security, |
confidentiality, or integrity of the personal information maintained by the information |
collector.”). |
16. |
General Data Protection Regulation, Article 4(12) (“ ‘personal data breach’ means a breach of |
security leading to the accidental or unlawful destruction, loss, alteration, unauthorised |
disclosure of, or access to, personal data transmitted, stored or otherwise processed. . . .”). |
17. |
Cal. Civ. Code 17982(a). |
18. |
California Office of Privacy Protection, Reasonable Practices on Notice of Security Breach |
Involving Personal Information (Jan. 2012). |
19. |
Daniel J. Solove & Paul M. Schwartz, Information Privacy Law 949 (6th ed. 2018). |
20. |
HIPAA Breach Notification Rule, 45 C.F.R. § 164.404. |
21. |
General Data Protection Regulation, Article 33. |
22. |
General Data Protection Regulation, Article 4. |
23. |
General Data Protection Regulation, Article 33. |
24. |
California, the District of Columbia, Hawaii, Illinois, Louisiana; New Hampshire, North |
Carolina, Oregon, South Carolina, Tennessee, and Washington currently allow for a private |
right of action by consumers who have been affected by a data breach. Cal. Civ. Code § |
1798.84 (West 2009); D.C. Code Ann. § 28-3853(a) (LexisNexis Supp. 2009); Haw. Rev. Stat. § |
487N-1 et seq.; 815 Ill. Comp. Stat. 530/1 et seq.; 2018 Louisiana S.B. 361; N.H. Rev. Stat. Ann. |
§ 359-C:21(I) (2009); N.C. Gen. Stat. Ann. § 75-65 (2007); OR. Rev. State. Ann. § 646A.624 |
(West Supp. 2009); S.C. Code Ann. § 37-20-170 (Supp. 2008); Tenn. Code Ann. § 47-18-2107(h) |
(Supp. 2009); Wash. Rev. Code Ann. § 19.255.010(10)(9) (West 2007). |
25. |
Bethan Moorcraft, Are US Consumers Suffering From Data Breach Notification Fatigue?, |
Insurance |
Business, |
(June |
19, |
2019), |
https://www.insurancebusinessmag.com/us/news/cyber/are-us-consumers-suffering-from-data- |
breach-notification-fatigue-170386.aspx; Grayson Schmidt & Ames Tribune, Expert Warns of |
the Risks Posed by Data Breach Fatigue, Government Technology, (Jan. 31, 2018), |
https://www.govtech.com/security/Expert-Warns-of-the-Risks-Posed-by-Data-Breach- |
Fatigue.html. |
26. |
Deborah George, Proposed New Breach Notification Rule for the Banking Industry, JD Supra, |
(Jan. 8, 2021), https://www.jdsupra.com/legalnews/proposed-new-breach-notification-rule- |
2286096/. |
27. |
Roger A. Grimes, Wanted: Data Breach Risk Ratings, Because Not All Breaches are Equal, |
CSO, (Sept. 13, 2018), https://www.csoonline.com/article/3304286/data-risk-ratings-because- |
not-all-data-breaches-are-equal.html. |
28. |
U.S. Department of Health, Education, and Welfare, Records, Computers, and the Rights of |
Citizens: Report of the Secretary’s Advisory Comm. on Automated Personal Data Systems, 41– |
42 (1973). |
29. |
44 U.S.C. § 3541 et seq. |
30. |
HIPAA Privacy Rule, at 45 CFR § 164.530(c). See generally the HIPAA Security Rule, 45 CFR |
§ 164.306 et seq. |
31. |
§ 164.308(a)(4). |
32. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.