skip to main content
10.1145/1231047.1231084acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
Article

Data security breach: seeking a prescription for adequate remedy

Published:22 September 2006Publication History

ABSTRACT

Data security breaches are increasing in frequency and scope. Current law provides for remedy to the few victims who suffer immediate identity theft and catch the perpetrators. Little help is now available to those not yet tangibly victimized, whose exposed data has left them highly vulnerable to identity theft for years to come, long after the statute of limitations runs out for the initial breach. This paper examines legal issues involved in data breaches, including the damage done to breach victims and the liability of data custodians. Applicable state and federal laws are reviewed, along with representative court decisions in data breach cases. Finally, possible legal remedies for data breach victims are discussed.

References

  1. Askey v. Occidental Chem. Corp., 477 N.Y.S.2d 242, 247 (N.Y. App. Div. 1984).Google ScholarGoogle Scholar
  2. Consumers Union. (n.d.). State security freeze laws. Retrieved June 16, 2006 from http://www.consumersunion.org/campaigns//learn_more/003484indiv.htmlGoogle ScholarGoogle Scholar
  3. Cornell Law School. (n.d.). Legal Information Institute: Title 15:>Chapter 41>Subchapter iii>§1681n: Civil liability for willful noncompliance. Retrieved June 17, 2006 from http://www4.law.cornell.edu/uscode/html/uscode15/usc_sec_15_00001681---n000-.htmlGoogle ScholarGoogle Scholar
  4. Cornell Law School. (n.d.). Legal Information Institute: Title 15:>Chapter 41>Subchapter iii>§1681o: Civil liability for negligent noncompliance. Retrieved June 17, 2006 from http://www4.law.cornell.edu/uscode/html/uscode15/usc_sec_15_00001681---o000-.htmlGoogle ScholarGoogle Scholar
  5. Cornell Law School. (n.d.). Legal Information Institute: Title 15:>Chapter 41>Subchapter iii>§1681q: Obtaining information under false pretenses. Retrieved June 17, 2006 from http://www4.law.cornell.edu/uscode/html/uscode15/usc_sec_15_00001681---q000-.htmlGoogle ScholarGoogle Scholar
  6. CSO Magazine. (2005 May). The Plot Thickens. Retrieved June 24, 2006 from http://www.csoonline.com/read/050105/choicepoint_plot_35 87.htmlGoogle ScholarGoogle Scholar
  7. Electronic Privacy Information Center. (n.d.). The fair credit reporting act (FCRA) and the privacy of your credit report. Retrieved June 18, 2006 from http://www.epic.org/privacy/fcra/Google ScholarGoogle Scholar
  8. Federal Trade Commission. (2006, January 26). ChoicePoint settles data security breach charges; to pay $10 million in civil penalties, $5 million for consumer redress. Retrieved June 12, 2006 from http://www.ftc.gov/opa/2006/01/choicepoint.htmGoogle ScholarGoogle Scholar
  9. Federal Trade Commission. (n.d.) Gramm-Leach-Bliley Act, 15 USC, Subchapter I, Sec. 6801--6809, Disclosure of nonpublic personal information. Retrieved June 17, 2006 from http://www.ftc.gov/privacy/glbact/glbsub1.htmGoogle ScholarGoogle Scholar
  10. Federal Trade Commission. (n.d.) Gramm-Leach-Bliley Act, 15 USC, Subchapter I, Sec. 6805 enforcement. Retrieved June 17, 2006 from http://www.ftc.gov/privacy/glbact/glbsub1.htm#6805Google ScholarGoogle Scholar
  11. Goldfarb, Z. (2006, June 22). VA to offer credit monitoring, 1 year of service free to data-theft victims. Retrieved June 24, 2006 from http://www.washingtonpost.com/wp-dyn/content/article/2006/06/21/AR2006062101788.htmlGoogle ScholarGoogle Scholar
  12. GovTrack. (n.d.). 109th U.S. congress (2005--2006): H.R. 5464: Veterans identity protection act. Retrieved June 20, 2006 from http://www.govtrack.us/congress/bill.xpd?bill=h109-5464Google ScholarGoogle Scholar
  13. Guin v. Brazos Higher Education Service Corporation, Inc. (D. Minn. 2006) WL 288483.Google ScholarGoogle Scholar
  14. Helms, M., Lundberg, F., & Mathews, C. (1996). Encyclopedia of georgia law. Norcross, GA: The Harrison Company. p. 26.Google ScholarGoogle Scholar
  15. Huggins v. Citibank, N.A., 355 S.C. 329, 585 S.E.2d 275 (2003).Google ScholarGoogle Scholar
  16. Library of Congress. (n.d.). Financial data protection act of 2005, S 2169. Retrieved June 26, 2006 from http://thomas.loc.gov/cgi-bin/bdquery/z?d109:SN02169:@@@L&summ2=m&Google ScholarGoogle Scholar
  17. Library of Congress. (n.d.). The data accountability and trust act, H.R. 4127. Retrieved June 26, 2006 from http://thomas.loc.gov/cgi-bin/bdquery/D?d109:2:./temp/~bdDzQS:@@@L&summ2=m&|/bss/d109query.html|Google ScholarGoogle Scholar
  18. Library of Congress. (n.d.). The notification of risk to personal data act, S 115. Retrieved June 26, 2006 from http://thomas.loc.gov/cgi-bin/bdquery/D?d109:8:./temp/~bdXK5m:@@@L&summ2=m&|/bss/109search.html|Google ScholarGoogle Scholar
  19. Miller, R. & Cross, F. (2005). The legal and e-commerce environment today: business in its ethical, regulatory and international setting (4th ed.). Mason, OH: Thomson/South-Western,. p. 249.Google ScholarGoogle Scholar
  20. People v. Ware, No. H025167, 2003 WL 22120898, (Cal. Ct. App. Sept. 11, 2003).Google ScholarGoogle Scholar
  21. Perkins, Coie, LLC. (2006, June 5) Security breach notification chart. Retrieved June 18, 2006 from http://www.perkinscoie.com/statebreachchart/chart.pdfGoogle ScholarGoogle Scholar
  22. Potter v. Firestone Tire & Rubber Co., 863 P.2d 795, 821 (Cal. 1993).Google ScholarGoogle Scholar
  23. Privacy Rights Clearinghouse. (2006, June 23). A chronology of data breaches reported since the choicepoint incident. Retrieved June 23, 2006 from http://www.privacyrights.org/ar/ChronDataBreaches.htmGoogle ScholarGoogle Scholar
  24. Public Interest Research Group In Michigan. (n.d.). Policing privacy: Michigan law enforcement officers on the challenges of tackling identity theft. Retrieved June 22, 2006 from http://pirgim.org/reports/policingprivacy04.pdfGoogle ScholarGoogle Scholar
  25. Redland Soccer Club, Inc. v. Dept. of the Army, 696 A.2d 137, 145 (Pa. 1997).Google ScholarGoogle Scholar
  26. Spangler, T. (2006, June 26). Data security: ChoicePoint's lessons learned. Retrieved June 26, 2006 from http://www.baselinemag.com/article2/0,1540,1981646,00.aspGoogle ScholarGoogle Scholar
  27. Stollenwerk v. Tri-West Healthcare Alliance, No. 03-0185PHXSRB, 2005 WL 2465906, (D. Ariz. Sept. 6, 2005).Google ScholarGoogle Scholar
  28. United States Department of Health and Human Services. (n.d.). P.L. 104-191, Health insurance portability and accountability act of 1996. Retrieved June 11, 2006 from http://aspe.hhs.gov/admnsimp/pl104191.htmGoogle ScholarGoogle Scholar
  29. United States Senate Committee on the Judiciary. (2005, May 13). Testimony of The Honorable William H. Sorrell, Attorney General, State of Vermont. Securing electronic personal data: striking a balance between privacy and commercial and governmental use. Retrieved June 18, 2006 from http://judiciary.senate.gov/testimony.cfm?id=1437&wit_id=729Google ScholarGoogle Scholar

Index Terms

  1. Data security breach: seeking a prescription for adequate remedy

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              InfoSecCD '06: Proceedings of the 3rd annual conference on Information security curriculum development
              September 2006
              206 pages
              ISBN:1595934375
              DOI:10.1145/1231047

              Copyright © 2006 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 22 September 2006

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate18of23submissions,78%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader