text
stringlengths 0
118
|
---|
Daniel J. Solove & Danielle Keats Citron, Risk and Anxiety: A Theory of Data Breach Harms, |
96 Tex. L. Rev. 737 (2018). |
58. |
In re Barnes & Noble Pin Pad Litig., No. 12–cv–8617, 2013 WL 4759588, at *5 (N.D. Ill. Sept. |
3, 2013). |
59. |
Daniel J. Solove & Danielle Keats Citron, Risk and Anxiety: A Theory of Data Breach Harms, |
96 Tex. L. Rev. 737, 767–773 (2018). |
60. |
Id. |
61. |
Id. at 42. |
62. |
Id. |
63. |
Reilly v. Ceridian Corp., 664 F.3d 38 (3d Cir. 2011). |
64. |
Clapper v. Amnesty International USA, 133 S. Ct. 1138 (2013). |
65. |
In re Sci. Applications Int’l Corp. (SAIC) Backup Tape Data Theft Litig., 45 F.Supp.3d 14 |
(D.D.C. 2014). |
66. |
Id. |
67. |
Id. |
68. |
Remijas v. Neiman Marcus Group, 794 F.3d 688, 695 (7th Cir. 2015). |
69. |
Id. |
70. |
See Spokeo, Inc. v. Robins, 136 S. Ct. 1540, 1549-50 (2016). |
71. |
In re Ashley Madison Customer DataSec. Breach Litig., MDL No. 2669 (E.D. Mo. Nov. 20, |
2017). |
72. |
In re Anthem, Inc. Data Breach Litig., No. 15-02617 (N.D. Cal. prelim. approval June 23, |
2017). |
CHAPTER 4 |
1. |
For the original in-depth reporting of this story, see Lorenzo Franceschi-Bicchierai, The SIM |
Hackers, (July 17, 2018), https://motherboard.vice.com/en_us/article/vbqax3/hackers-sim- |
swapping-steal-phone-numbers-instagram-bitcoin/. |
2. |
Id. |
3. |
Id. |
4. |
Bruce |
Schneier, |
Sim |
Hijacking, |
Schneier |
on |
Security, |
(Jan |
21, |
2020), |
https://www.schneier.com/blog/archives/2020/01/sim_hijacking.html. |
5. |
See Derek E. Bambauer, Ghost in the Network, 162 U. Pa. L. Rev. 1011, 1012 (2014) (arguing |
that that because successful attacks are unavoidable, cybersecurity should focus on mitigating |
breaches rather than preventing them); Deirdre K. Mulligan & Fred B. Schneider, Doctrine for |
Cybersecurity, Daedalus, Fall 2011, at 70 (“[A]bsolute cybersecurity is worthwhile but unlikely |
ever to be achieved. For systems that incorporate humans as users and operators, we would |
need some way to prevent social engineering and intentional insider-malfeasance. Prevention, |
here, requires overcoming the frailty of humans, which is likely to involve more than |
technology.”). |
6. |
Guido Calabresi, The Gift of the Evil Deity, in Ideals, Beliefs, and Attitudes in the Law(1985). |
7. |
See Ido Kilovalty, Legally Cognizable Manipulation, 34 Berkeley Tech. L. J. (2019). |
8. |
For more information on the misguided attempt to force a particular kind of password |
complexity, see Thaw, Stovepiping, supra. |
9. |
See, e.g., C. Herley and P. C. v. Oorschot, SoK: Science, Security and the Elusive Goal of |
Security as a Scientific Pursuit, 2017 IEEE Symposium on Security and Privacy (SP), San Jose, |
CA, |
2017, |
pp. |
99–120, |
http://ieeexplore.ieee.org/stamp/stamp.jsp? |
tp=&arnumber=7958573&isnumber=7958557. |
10. |
See, e.g., Cybersecurity Requirements for Financial Services Companies, 23 CRR-NY § 500.2 |
(“Each covered entity shall maintain a cybersecurity program designed to protect the |
confidentiality, integrity and availability of the covered entity’s information systems.”); Jeff |
Kosseff, Defining Cybersecurity Law, 103 Iowa L. Rev. 985, 988–989 (2018). |
11. |
Take |
your |
Free |
Cybersecurity |
Self-Assessment, |
Microsoft, |
https://www.microsoft.com/cyberassessment/en (“Our Certified Microsoft Cybersecurity |
Experts collaborated to create a personalized Cybersecurity Healthcheck covering more than 20 |
security points in 4 of our key Cybersecurity categories.”) (last accessed December 15, 2020). |
12. |
Good |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.