text
stringlengths
0
118
Identity
Theft
Resource
Center,
Identity
Theft:
The
Aftermath
2017,
https://www.idtheftcenter.org/images/page-docs/Aftermath_2017.pdf.
27.
Id.
28.
Id.
29.
Identity Theft and Identity Theft and Assumption Deterrence Act, 18 U.S.C. § 1028.
30.
U.S. General Accounting Office, Identity Theft: Greater Awareness and Use of Existing Data
Are Needed, H.R. Rep. No. GAO-02-766, at 6 (2002).
31.
National
Conference
of
State
Legislatures,
Identity
Theft,
https://www.ncsl.org/research/financial-services-and-commerce/identity-theft-state-
statutes.aspx.
32.
David Lazarus, An Advocate for Readers, A Name You Can Trust, L.A. Times, (Aug. 12, 2007),
https://www.latimes.com/archives/la-xpm-2007-aug-12-fi-lazarus12-story.html.
33.
John Hall, SplashData’s Top 100 Worst Passwords of 2018, SplashData, (Dec. 13, 2018),
https://www.teamsid.com/splashdatas-top-100-worst-passwords-of-2018/. Two years later, the
most popular passwords didn’t change much. See Top 200 most common passwords of the year
2020, NordPass, https://nordpass.com/most-common-passwords-list/ (last accessed Mar. 17,
2021).
34.
Farai Chideya, The Way We Use Social Security Numbers Is Absurd, FiveThirtyEight, (Oct. 15,
2015), https://fivethirtyeight.com/features/the-way-we-use-social-security-numbers-is-absurd/.
35.
Haje Jan Kamps, Fingerprints and SSN Numbers are Usernames, Not Passwords,
https://medium.com/@Haje/ssn-is-a-username-not-a-password-aa9b9d9f48ad.
36.
Daniel J. Solove, The Digital Person: Technology and Privacy for the Digital Age (2004).
37.
See, e.g., M. Yıldırım & I Mackie, Encouraging users to improve password security and
memorability. Int. J. Inf. Secur. 18, 741–759 (2019). https://doi.org/10.1007/s10207-019-00429-
y; David Thaw, Cybersecurity Stovepiping, 96 Neb. L. Rev. 339 (2017).
38.
Alessandro Acquisti & Ralph Gross, Predicating Social Security Numbers From Public Data,
(July 7, 2009), https://www.pnas.org/content/106/27/10975.full.
39.
Tony Bradley, 5 Things All Anthem Customers Should do After the Massive Data Breach,
PCWorld, http://www.pcworld.com/article/2880611/5-things-all-anthem-customers-should-do-
after-the-massive-data-breach.html.
40.
Equifax ID Patrol, https://www.equifax.com/personal/products/identity-theft-protection/.
41.
Fair Credit Reporting Act, 15 U.S. Code § 1681e(b).
42.
Christopher Hoofnagle, Internalizing Identity Theft, 13 UCLA J. of L. & Tech. 1 (2009).
43.
Huggins v. Citibank, 585 S.E.2d 275 (S.C. 2003).
44.
Wolfe v. MBNA America Bank, 485 F. Supp. 2d 874 (W.D. Tenn. 2007).
45.
Daniel J. Solove & Woodrow Hartzog, The FTC and the New Common Law of Privacy, 114
Colum. L. Rev. 583 (2014).
CHAPTER 7
1.
Sean Gallagher, Report: Hack of Government Employee Records Discovered by Product Demo,
Ars Technica,
(June 11 2015), https://arstechnica.com/security/2015/06/report-hack-of-
government-employee-records-discovered-by-product-demo/.
2.
United States. Cong. House. Committee on Oversight and Gov. Reform. Letter to the Hon.
Devin Nunes, Chairman, and the Hon. Adam Schiff, Ranking Member, Permanent Select
Committee on Intelligence—Evidence Obtained By Committee Debunks Claim That CyTech
Was First to Discover OPM Data Breach, (May 26 2016). 114th Cong. (letter from Elijah E.
Cummings,
Ranking
Member,
U.S.
Congress),
https://democrats-
oversight.house.gov/sites/democrats.oversight.house.gov/files/documents/2016-05-
26.EEC%20to%20HPSCI%20Re.CyTech.pdf.
3.
Id.
4.
Id.
5.
Id.
6.
Jose Pagliery, OPM Hack’s Unprecedented Haul: 1.1 Million Fingerprints, CNN Tech Blog,
(July 10, 2015), http://money.cnn.com/2015/07/10/technology/opm-hack-fingerprints/.
7.
Id.