text
stringlengths 0
118
|
---|
8. |
U.S. Office of Personnel Management, Office of the Inspector General, Office of Audits, Final |
Audit Report: Federal Information Security Management Act Audit FY 2014, U.S. Office of |
Personnel |
Management, |
(Nov. |
12, |
2014), |
https://www.opm.gov/our-inspector- |
general/reports/2014/federal-information-security-management-act-audit-fy-2014-4a-ci-00-14- |
016.pdf. |
9. |
David Auerbach, The OPM Breach Is a Catastrophe, Slate, (June 16, 2015), |
http://www.slate.com/articles/technology/future_tense/2015/06/opm_hack_it_s_a_catastrophe_ |
here_s_how_the_government_can_stop_the_next.html. |
10. |
Nuala O’Connor, Why the OPM Breach Is Unlike Any Other, CDT, (June 22, 2015), |
https://cdt.org/insights/why-the-opm-data-breach-is-unlike-any-other/. |
11. |
For example, Derek Bambauer argues that “disaggregation” should be a key design principle |
for data security. Disaggregation “splits information into multiple, separated data stores. The |
loss of any single store, or perhaps several of them, does not confer all of an organization’s |
information upon an attacker.” Derek E. Bambauer, Ghost in the Network, 162 U. Pa. L. Rev. |
1011, 1052 (2014). |
12. |
Kim Zetter & Andy Greenberg, Why the OPM Breach is Such a Security and Privacy Debacle, |
Wired, (June 11, 2015), available athttps://www.wired.com/2015/06/opm-breach-security- |
privacy-debacle/. |
13. |
Ellen Nakashima & Lisa Rein, Chinese Hackers Go After U.S. Workers’ Personal Data, Wash. |
Post, (July 10, 2014), http://wapo.st/1kJBCuc?tid=ss_tw. |
14. |
Id. |
15. |
See generally Jeff Kosseff, Defining Cybersecurity Law, 103 Iowa L. Rev. 985 (2018); Andrea |
M. Matwyshyn, CYBER!, 2017 BYU L. Rev. 1109 (2018); Andrea M. Matwyshyn, Hacking |
Speech: Informational Speech and the First Amendment, 107 Nw. U. L. Rev. 795, 845 n.99 |
(2013); David Thaw, The Efficacy of Cybersecurity Regulation, 30 Ga. St. U. L. Rev. 287, 291– |
92 (2014). |
16. |
David Thaw, Data Breach (Regulatory) Effects, 2015 Cardozo L. Rev. De Novo 151, 154–55 |
(2015). |
17. |
Thaw also noted that there are different cybersecurity risk profiles for at least for different kinds |
of entities ranging from military and critical infrastructure to non-sensitive private entities, not |
all of which implicate privacy concerns. Id. (“Defining the unit of analysis that a cybersecurity |
law or regulation seeks to address is critical. Approaches necessary for military environments |
may be ill-suited—or possibly even damaging—to ordinary consumer-based commercial |
environments. This Essay proposes a four-part classification for entities: (1) Military, |
intelligence, and other high-reliability or sensitive government operations; (2) Privately |
operated “critical infrastructure,” utilities, communications networks, and other infrastructure |
operated by private entities but requiring high-reliability operations or utilizing meaningful |
sensitive information; (3) Public and other government operations, which are not otherwise |
sensitive or high-reliability; (4) Non-critical/non-sensitive private entities, private entities that |
neither require high-reliability operations nor utilize meaningful amounts of sensitive |
information.”). |
18. |
Derek E. Bambauer, Privacy Versus Security, 103 J. Crim. L. & Criminology 667, 668–69 |
(2013). For additional thoughts on the difference between privacy and cybersecurity, see Justin |
(Gus) Hurwitz, Cyberensuring Security, 49 Conn. L. Rev. 1495, 1547 (2017) (“Critically, the |
task of ‘security’ is fundamentally different from that of ‘privacy.’ Security is about prohibiting |
unauthorized parties from accessing or using data or systems; privacy is about prohibiting |
authorized parties from exceeding the use of data to which they have been given access.”); Jeff |
Kosseff, Hacking Cybersecurity Law, 2020 U. Ill. L. Rev. 811, 814 (2020) (“Cybersecurity laws |
often are conflated with privacy laws, as there is significant overlap. Cybersecurity laws, |
however, must address more than just the confidentiality of personal information, and also seek |
to protect from unauthorized alteration of data and attacks such as ransomware that cause data |
or systems to become unavailable. Cybersecurity laws also must focus not just on financial |
harms, but any threats to national security or individual privacy or safety.”); Lauren Henry |
Scholz, Information Privacy and Data Security, 2015 Cardozo L. Rev. De Novo 107, 109 |
(2015) (“an institution’s interest in its own data security is not necessarily consonant with the |
information privacy interests of the individuals whose personal information is housed.”); |
Andrea M. Matwyshyn, Cyber!, 2017 B.Y.U. L. Rev. 1109, 1141 (2017) (“Unlike security, |
which focuses on properties of systems, privacy analysis uses a particular person—not a |
technical system—as the focal point of analysis. Privacy relates to the negotiated rights and |
privileges of a (usually) human person in her own information and her choice to engage in its |
selective transmission under certain terms.”). |
19. |
Jeff Kosseff, Defining Cybersecurity Law, 103 Iowa L. Rev. 985, 988–89 (2018). |
20. |
See Lauren Henry Scholz, Information Privacy and Data Security, 2015 Cardozo L. Rev. De |
Novo 107, 115 (2015) (“[I]nformation privacy and data security can be siloed into very |
different parts of professional practice.”). |
21. |
Ari Waldman, Industry Unbound (2021); Ari Ezra Waldman, Designing Without Privacy, 55 |
Hous. L. Rev. 659, 664 (2018); see also Kenneth A. Bamberger & Deirdre K. Mulligan, |
Privacy on the Ground (2015). |
22. |
Id. |
23. |
Ari Ezra Waldman, Designing Without Privacy, 55 Hous. L. Rev. 659, 664 (2018). |
24. |
Id. |
25. |
Id. |
26. |
See Daniel J. Solove, Understanding Privacy (2008); Neil Richards, Why Privacy Matters |
(2021); Lisa Austin, Enough About Me: Why Privacy is About Power, not Consent (or Harm), |
in A World Without Privacy?, (Cambridge Press, Austin Sarat, ed. 2015); Julie E. Cohen, What |
Privacy is For, 126 Harv. L. Rev. 1904 (2013); Woodrow Hartzog & Neil Richards, Privacy’s |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.