text
stringlengths 0
118
|
---|
Identity |
Theft |
Resource |
Center, |
Identity |
Theft: |
The |
Aftermath |
2017, |
https://www.idtheftcenter.org/images/page-docs/Aftermath_2017.pdf. |
27. |
Id. |
28. |
Id. |
29. |
Identity Theft and Identity Theft and Assumption Deterrence Act, 18 U.S.C. § 1028. |
30. |
U.S. General Accounting Office, Identity Theft: Greater Awareness and Use of Existing Data |
Are Needed, H.R. Rep. No. GAO-02-766, at 6 (2002). |
31. |
National |
Conference |
of |
State |
Legislatures, |
Identity |
Theft, |
https://www.ncsl.org/research/financial-services-and-commerce/identity-theft-state- |
statutes.aspx. |
32. |
David Lazarus, An Advocate for Readers, A Name You Can Trust, L.A. Times, (Aug. 12, 2007), |
https://www.latimes.com/archives/la-xpm-2007-aug-12-fi-lazarus12-story.html. |
33. |
John Hall, SplashData’s Top 100 Worst Passwords of 2018, SplashData, (Dec. 13, 2018), |
https://www.teamsid.com/splashdatas-top-100-worst-passwords-of-2018/. Two years later, the |
most popular passwords didn’t change much. See Top 200 most common passwords of the year |
2020, NordPass, https://nordpass.com/most-common-passwords-list/ (last accessed Mar. 17, |
2021). |
34. |
Farai Chideya, The Way We Use Social Security Numbers Is Absurd, FiveThirtyEight, (Oct. 15, |
2015), https://fivethirtyeight.com/features/the-way-we-use-social-security-numbers-is-absurd/. |
35. |
Haje Jan Kamps, Fingerprints and SSN Numbers are Usernames, Not Passwords, |
https://medium.com/@Haje/ssn-is-a-username-not-a-password-aa9b9d9f48ad. |
36. |
Daniel J. Solove, The Digital Person: Technology and Privacy for the Digital Age (2004). |
37. |
See, e.g., M. Yıldırım & I Mackie, Encouraging users to improve password security and |
memorability. Int. J. Inf. Secur. 18, 741–759 (2019). https://doi.org/10.1007/s10207-019-00429- |
y; David Thaw, Cybersecurity Stovepiping, 96 Neb. L. Rev. 339 (2017). |
38. |
Alessandro Acquisti & Ralph Gross, Predicating Social Security Numbers From Public Data, |
(July 7, 2009), https://www.pnas.org/content/106/27/10975.full. |
39. |
Tony Bradley, 5 Things All Anthem Customers Should do After the Massive Data Breach, |
PCWorld, http://www.pcworld.com/article/2880611/5-things-all-anthem-customers-should-do- |
after-the-massive-data-breach.html. |
40. |
Equifax ID Patrol, https://www.equifax.com/personal/products/identity-theft-protection/. |
41. |
Fair Credit Reporting Act, 15 U.S. Code § 1681e(b). |
42. |
Christopher Hoofnagle, Internalizing Identity Theft, 13 UCLA J. of L. & Tech. 1 (2009). |
43. |
Huggins v. Citibank, 585 S.E.2d 275 (S.C. 2003). |
44. |
Wolfe v. MBNA America Bank, 485 F. Supp. 2d 874 (W.D. Tenn. 2007). |
45. |
Daniel J. Solove & Woodrow Hartzog, The FTC and the New Common Law of Privacy, 114 |
Colum. L. Rev. 583 (2014). |
CHAPTER 7 |
1. |
Sean Gallagher, Report: Hack of Government Employee Records Discovered by Product Demo, |
Ars Technica, |
(June 11 2015), https://arstechnica.com/security/2015/06/report-hack-of- |
government-employee-records-discovered-by-product-demo/. |
2. |
United States. Cong. House. Committee on Oversight and Gov. Reform. Letter to the Hon. |
Devin Nunes, Chairman, and the Hon. Adam Schiff, Ranking Member, Permanent Select |
Committee on Intelligence—Evidence Obtained By Committee Debunks Claim That CyTech |
Was First to Discover OPM Data Breach, (May 26 2016). 114th Cong. (letter from Elijah E. |
Cummings, |
Ranking |
Member, |
U.S. |
Congress), |
https://democrats- |
oversight.house.gov/sites/democrats.oversight.house.gov/files/documents/2016-05- |
26.EEC%20to%20HPSCI%20Re.CyTech.pdf. |
3. |
Id. |
4. |
Id. |
5. |
Id. |
6. |
Jose Pagliery, OPM Hack’s Unprecedented Haul: 1.1 Million Fingerprints, CNN Tech Blog, |
(July 10, 2015), http://money.cnn.com/2015/07/10/technology/opm-hack-fingerprints/. |
7. |
Id. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.