text
stringlengths
0
118
Netflix, 19
NHS (National Health Service) data breach, 71–72
NIST (National Institute of Standards and Technology) 800-53, 51, 161
NSA (National Security Agency), 103
Obama, Barack, 100, 151, 152
Oberdorf v. Amazon, 92
O’Connor, Nuala, 130
OECD Privacy Guidelines, 136
Office of Personnel Management data breach. See OPM data breach
OIG (Inspector General Office), 129–30
Olstead, Renee, 166
1Password password manager, 183–84
Online Trust Alliance (OTA), 29, 34
OPM (Office of Personnel Management) data breach, 128–31
Central Personnel Data File, 129
CyTech Services and, 128–29
e-QIP system, 129
fingerprint data, 129
Inspector General Office, 129–30
KeyPoint Government Solutions and, 129
Opperman v. Path, 91–92
OTA (Online Trust Alliance), 29, 34
β€œPanama Papers” breach, 26
Parmet, Wendy, 76
Pascal, Amy, 151, 152
password managers, 183–84
passwords
default factory passwords, 85
failure of, 164–67
human bandwidth problem and, 167–70
I Love My Password Book!, 169
Moneyball β€œhack,” 139–40
Password Minder, 169
password recovery questions, 171–72
The Personal Internet Address & Password Log Book, 169
SSNs as, 120–21, 126–27
worst passwords list, 119–20, 168
personal data security law. See also breach notification laws
breach notification laws, 37, 38–47
Dorn VAMC data breach, 35–37
failure of, 60–61
overview, 37–38
private litigation, 37, 54–60
security safeguards laws, 37, 47–54
phishing attacks, 174–75
Evernote, 104–5
role in data breaches, 33
platforms, online, 90–93
Podesta, John, 26–27
Premera Blue Cross, 25
privacy and data security, 13–14
accountability and, 148–49
Ashley Madison, 146–47
BlueKai, 146
cybersecurity, 131–32
data mapping, 156–57
data minimization, 146–47, 156
data protection, 132
defined, 131–32
hacking, 140–42
integration of, 196–97
Moneyball β€œhack,” 139–40
OPM breach, 128–31
ransomware, 153–55
relationship between, 132–33
schism between, 133–37
Sony Pictures data breach, 150–53
surveillance tools, 147–48
weak privacy, 142–46
Privacy Rights Clearinghouse, 28
private litigation
defined, 37
failure to help victims, 59–60
increase in data breach lawsuits, 54–55
β€œlegally cognizable harm,” 55–59
proactive approach, data security law, 192–93
Project Shield, 84
public health analogy, 76–77
ransomware attacks, 25, 26, 28
backing up files as protection against, 153–54
defined, 23–24
double-extortion model, 154–55
prescription drug abuse database of Virginia, 20
Symantec report on, 25
WannaCry, 103–4
reactive approach, data security law, 193
Reddit, 85–86, 150, 154
reducing harm of breaches, 195
Reilly v. Ceridian Corp, 56
Remijas v. Neiman Marcus Group, 58
responsibility and accountability
amplifiers, 83, 93–99
collective responsibility, 109–10
compromised data due to lack of, 148–49
designers, 83–89
digital technology exceptionalism, 106–9
distributors, 83, 89–93
exploiters, 83, 103–4
facilitators, 83, 99–103
miseducators, 83, 104–6