Data breach notification laws

From Wikipedia, the free encyclopedia

Security breach notification laws or data breach notification laws are laws that require individuals or entities affected by a data breach, unauthorized access to data,[1] to notify their customers and other parties about the breach, as well as take specific steps to remedy the situation based on state legislature. Data breach notification laws have two main goals. The first goal is to allow individuals a chance to mitigate risks against data breaches. The second goal is to promote company incentive to strengthen data security.[2]Together, these goals work to minimize consumer harm from data breaches, including impersonation, fraud, and identity theft.[3]

Such laws have been irregularly enacted in all 50 U.S. states since 2002. Currently, all 50 states have enacted forms of data breach notification laws.[4] There is no federal data breach notification law, despite previous legislative attempts.[5] These laws were enacted in response to an escalating number of breaches of consumer databases containing personally identifiable information.[6] Similarly, multiple other countries, like the European Union General Data Protection Regulation (GDPR) and Australia's Privacy Amendment (Notifiable Data Breaches) Act 2017 (Cth), have added data breach notification laws to combat the increasing occurrences of data breaches.[7]

The rise in data breaches conducted by both countries and individuals is evident and alarming, as the number of reported data breaches has increased from 421 in 2011, to 1,091 in 2016, and 1,579 in 2017 according to the Identity Theft Resource Center (ITRC).[8][9] It has also impacted millions of people and gained increasing public awareness due to large data breaches such as the October 2017 Equifax breach that exposed almost 146 million individual's personal information.[10]

Australia[edit]

On 2018, Australia Privacy Amendment (Notifiable Data Breaches) Act 2017 went into effect.[11] This amended the Privacy Act 1988 (Cth), which had established a notification system for data breaches involving personal information that lead to harm. Now, entities with existing personal information security obligations under the Australian Privacy Act are required to notify the Office of Australian Information Commissioner (OAIC) and affected individuals of all “eligible data breaches.”[12] The amendment is coming off large data breaches experiences in Australia, such as the Yahoo hack in 2013 involving thousands of government officials and the data breach of NGO Australian Red Cross releasing 550,000 blood donor's personal information.

Criticism of the data breach notification include: the unjustified exemption of certain entities such as small businesses and the Privacy Commissioner not required to post data breaches in one permanent place to be used as data for future research. In addition, notification obligations are not consistent at a state level.[13]

China[edit]

In mid-2017, China adopted a new Cyber security Law, which included data breach notification requirements.[13]

European Union[edit]

In 1995, the EU passed the Data Protection Directive (DPD), which has recently been replaced with the 2016 General Data Protection Regulation (GDPR), a comprehensive federal data breach notification law. The GDPR offers stronger data protection laws, broader data breach notification laws, and new factors such as the right to data portability. However, certain areas of the data breach notification laws are supplemented by other data security laws.[13]

Examples of this include, the European Union implemented a breach notification law in the Directive on Privacy and Electronic Communications (E-Privacy Directive) in 2009, specific to personal data held by telecoms and Internet service providers.[14][15] This law contains some of the notification obligations for data breaches.[13]

The traffic data of the subscribers, who use voice and data via a network company, is saved from the company only for operational reasons. However, the traffic data must be deleted when they aren’t necessary anymore, in order to avoid the breaches. However, the traffic data is necessary for the creation and treatment of subscriber billing. The use of these data is available only up to the end of the period that the bill can be repaid based on the law of European Union (Article 6 - paragraphs 1-6 [16]). Regarding the marketing usage of the traffic data for the sale of additional chargeable services, they can be used from the company only if the subscriber gives his/her consent (but, the consent can be withdrawn at every time). Also, the service provider must inform the subscriber or user of the types of traffic data which are processed and of the duration of that based on the above assumptions. Processing of traffic data, in accordance with the above details, must be restricted to persons acting under the authority of providers of the public communications networks and publicly available electronic communications services handling billing or traffic management, customer enquiries, fraud detection, marketing electronic communications services or providing a value added service, and must be restricted to what is necessary for the purposes of such activities.

Data breach notification obligations are included in the new Directive on security of network and information systems (NIS Directive). This creates notification requirements on essential services and digital service providers. Among these include immediately notifying the authorities or computer security incident response teams (CSIRTS) if they experience a significant data breach.

Similar to US concerns for a state-by-state approach creating increased costs and difficulty complying with all the state laws, the EU's various breach notification requirements in different laws creates concern.[13]

Japan[edit]

In 2015, Japan amended the Act on the Protection of Personal Information (APPI) to combat massive data leaks. Specifically, the massive Benesse Corporation data leak in 2014 where nearly 29 million pieces of private customer information was leaked and sold. This includes new penal sanctions on illegal transaction, however, there is no specific provision dealing with data breach notification in the APPI. Instead, the Policies Concerning the Protection of Personal Information, in accordance with the APPI, creates a policy that encourages business operators to disclose data breaches voluntarily.[17]

Kaori Ishii and Taro Komukai have theorized that the Japanese culture offers a potential explanation for why there is no specific data breach notification law to encourage companies to strengthen data security. The Japanese general public and mass media, in particularly, condemn leaks. Consequently, data leaks quickly result in losing customer trust, brand value, and ultimately profits. An example of this include, after a 2004 data leak, Softbank swiftly lost 107 billion yen and Benesse Corporation lost 940,000 customers after the data leak. This has resulted in compliance with disclosing data leaks in accordance with the policy.[17]

While proving the Japanese culture makes specific data breach notification laws necessary is difficult to objectively prove, what has been shown is that companies that experience data breach do experience both financial and reputation harm.[18][19]

New Zealand[edit]

New Zealand’s Privacy Act 2020 came into force on December 1, 2020, replacing the 1993 act. The act makes notification of privacy breaches mandatory.[20] Organisations receiving and collecting data will now have to report any privacy breach they believe has caused, or is likely to cause, serious harm.

United States[edit]

Data Breach Notification Laws have been enacted in all 50 states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands.[6] As of August 2021, attempts to pass a federal data breach notification law have been unsuccessful.[21]

The 50 States[edit]

The first such law, the California data security breach notification law,[22] was enacted in 2002 and became effective on July 1, 2003.[23] The bill was enacted in reaction to the fear of identity theft and fraud.[8][24] As related in the bill statement, law requires "a state agency, or a person or business that conducts business in California, that owns or licenses computerized data that includes personal information, as defined, to disclose in specified ways, any breach of the security of the data, as defined, to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person." In addition, the law permits delayed notification "if a law enforcement agency determines that it would impede a criminal investigation." The law also requires any entity that licenses such information to notify the owner or licensee of the information of any breach of the security of the data.

In general, most state laws follow the basic tenets of California's original law: Companies must immediately disclose a data breach to customers, usually in writing.[25] California has since broadened its law to include compromised medical and health insurance information.[26] Where bills differ most is at what level the breach must be reported to the state Attorney General (usually when it affects 500 or 1000 individuals or more). Some states like California publish these data breach notifications on their oag.gov websites. Breaches must be reported if "sensitive personally identifying information has been acquired or is reasonably believed to have been acquired by an unauthorized person, and is reasonably likely to cause substantial harm to the individuals to whom the information relates."[27] This leaves room for some interpretation (will it cause substantial harm?); but breaches of encrypted data need not be reported. Nor must it be reported if data has been obtained or viewed by unauthorized individuals as long as there is no reason to believe they will use the data in harmful ways.

The National Conference of State Legislatures maintains a list of enacted and proposed security breach notification laws.[6]

Some of the state differences in data breach notification laws include thresholds of harm suffered from data breaches, the need to notify certain law enforcement or consumer credit agencies, broader definitions of personal information, and differences in penalties for non-compliance.[13]

Federal Data Breach Notification Law History[edit]

As of August 2021, there is no federal data breach notification law. The first proposed federal data breach notification law was introduced to Congress in 2003, but it never exited the Judiciary Committee.[5] Similarly, a number of bills that would establish a national standard for data security breach notification have been introduced in the U.S. Congress, but none passed in the 109th Congress.[28] In fact, in 2007, three federal data breach notification laws were proposed, but none passed Congress.[5] In his 2015 State of the Union speech, President Obama proposed new legislation to create a national data breach standard that would establish a 30-day notification requirement from the discovery of a breach.[29] This led to President Obama's 2015 Personal Data Notification & Protection Act (PDNPA) proposal. This would have created federal notification guidelines and standards, but it never came out of committee.[5]

Chlotia Garrison and Clovia Hamilton theorized that a potential reason for the inability to pass a federal law on data breach notifications is states' rights. As of now, all 50 states have varying data breach notification laws. Some are restrictive, while others are broad.[5] While there is not a comprehensive federal law on data breach notifications, some federal laws require notifications of data breaches in certain circumstances. Some notable examples include: the Federal Trade Commission Act (FTC Act), the Financial Services Modernization Act (Gramm-Leach-Bliley Act), and the Health Insurance Portability and Accountability Act (HIPAA).[13]

Debate over federal or state data breach notification laws[edit]

Most scholars, like Angela Daly, advocate for federal data breach notification laws emphasize the problem with having varying forms of data breach notification laws. That is, companies are forced to comply with multiple state data breach notification laws. This creates increased difficulty to comply with the laws and the costs. In addition, scholars have argued that a state-by-state approach has created the problem of uncompensated victims and inadequate incentives to persuade companies and governments to invest in data security.[13]

Advocates of a state-by-state approach to data breach notification laws emphasize increased efficiency, increased incentives to have the local governments increase data security, limited federal funding available due to multiple projects, and lastly states are able to quickly adapt and pass laws to constantly evolving data breach technologies.[10] In 2018, a majority of state attorneys general opposed a proposed federal data breach notification law that would preempt state laws.[30]

Impact[edit]

Data breaches occur because of technical issues like bad code to economic issues causing competing firm to not cooperate with each other to tackle data security.[31] In response, data breach notification laws attempt to prevent harm to companies and the public.

Criminal impact[edit]

A serious harm of data breaches is identity theft. Identity theft can harm individuals when their personal data is stolen and is used by another party to create financial harm such as withdrawing their money, non financially such as fraudulently claiming their health benefits, and pretending to be them and committing crimes.[32] Based on data collected from 2002 to 2009 from the U.S. Federal Trade Commission, the use of data breach notification has helped to decrease identity theft by 6.1 percent.[33]

Economic impact[edit]

Overall, data breach notifications leads to decreasing market value, evident in publicly traded companies experiencing a decrease in market valuation.[34][35] Other costs include loss of consumer confidence and trust in the company, loss of business, decreased productivity, and exposure to third-party liability.[35] Notably, the type of data that is leaked from the breach has varying economic impact. A data breach that leaks sensitive data experiences harsher economic repercussions.[36]

Victim response[edit]

Most federal data breach lawsuits share certain characteristics. These include a plaintiff seeking relief from the loss of an identity theft, emotional distress, future losses, and increased risk of future harm; the majority of litigation are private class actions; the defendants are usually large firms or businesses; a mix of common law and statutory causes of action; and lastly most cases settle or are dismissed.[37]

References[edit]

  1. ^ Sen, Ravi; Borle, Sharad (2015-04-03). "Estimating the Contextual Risk of Data Breach: An Empirical Approach". Journal of Management Information Systems. 32 (2): 314–341. doi:10.1080/07421222.2015.1063315. ISSN 0742-1222. S2CID 2311182.
  2. ^ Bisogni, Fabio (2016). "Proving Limits of State Data Breach Notification Laws: Is a Federal Law the Most Adequate Solution?". Journal of Information Policy. 6: 154–205. doi:10.5325/jinfopoli.6.2016.0154. ISSN 2158-3897. JSTOR 10.5325/jinfopoli.6.2016.0154.
  3. ^ Acquisti, Alessandro; Friedman, Allan; Telang, Rahul (2006). "Is there a cost to privacy breaches? An event study". ICIS 2006 Proceeding.
  4. ^ Murciano-Goroff, Raviv (2019). "Do Data Breach Disclosure Laws Increase Firms; Investment in Securing their Digital Infrastructure?". Workshop on the Economics of Information Security: 1–39.
  5. ^ a b c d e Garrison, Chlotia; Hamilton, Clovia (2019-01-02). "A comparative analysis of the EU GDPR to the US's breach notifications" (PDF). Information & Communications Technology Law. 28 (1): 99–114. doi:10.1080/13600834.2019.1571473. hdl:10535/10737. ISSN 1360-0834. S2CID 86668452.
  6. ^ a b c "Security Breach Notification Laws". National Conference of State Legislatures. Retrieved 27 January 2019.
  7. ^ "What is GDPR, the EU's new data protection law?". GDPR.eu. 2018-11-07. Retrieved 2021-10-25.
  8. ^ a b Bisogni, Fabio; Asghari, Hadi (2020). "More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws". Journal of Information Policy. 10: 45–82. doi:10.5325/jinfopoli.10.2020.0045. ISSN 2381-5892. JSTOR 10.5325/jinfopoli.10.2020.0045. S2CID 226623656.
  9. ^ Romanosky, Sasha; Boudreaux, Benjamin (2020-08-26). "Private-Sector Attribution of Cyber Incidents: Benefits and Risks to the U.S. Government". International Journal of Intelligence and CounterIntelligence. 34 (3): 463–493. doi:10.1080/08850607.2020.1783877. ISSN 0885-0607. S2CID 235636491.
  10. ^ a b Ronaldson, Nicholas (2019-05-01). "HACKING: THE NAKED AGE CYBERCRIME, CLAPPER & STANDING, AND THE DEBATE BETWEEN STATE AND FEDERAL DATA BREACH NOTIFICATION LAWS". Northwestern Journal of Technology and Intellectual Property. 16 (4): 305. ISSN 1549-8271.
  11. ^ AG. "Privacy Amendment (Notifiable Data Breaches) Act 2017". www.legislation.gov.au. Retrieved 2023-10-29.
  12. ^ Green, Paul. "Australia's mandatory Data Breach Notification laws: Are You Ready?". Business Aspect. Retrieved 30 November 2020.
  13. ^ a b c d e f g h Daly, Angela (2018). "The introduction of data breach notification legislation in Australia: A comparative view". Computer Law & Security Review. 34 (3): 477–495. doi:10.1016/j.clsr.2018.01.005. ISSN 0267-3649. S2CID 67358435.
  14. ^ "Amendment of Article 4 lit 3-5 of Directive 2002/58/EC (E-Privacy Directive) by Article 2 lit 4 c) of Directive 2009/136/EC". Retrieved 27 January 2019.
  15. ^ "New specific rules for consumers when telecoms personal data is lost or stolen in EU". Digital Single Market. 5 November 2016. Retrieved 11 May 2016.
  16. ^ "EUR-Lex - 32002L0058 - EN - EUR-Lex". eur-lex.europa.eu. Retrieved 27 January 2019.
  17. ^ a b Ishii, Kaori; Komukai, Taro (2016-09-07). "A Comparative Legal Study on Data Breaches in Japan, the U.S., and the U.K.". Technology and Intimacy: Choice or Coercion. IFIP Advances in Information and Communication Technology. Vol. AICT-474. pp. 86–105. doi:10.1007/978-3-319-44805-3_8. ISBN 978-3-319-44804-6. S2CID 41459415.
  18. ^ Honeywill, Sean (2006-03-01). "Data Security and Data Breach Notification for Financial Institutions". North Carolina Banking Institute. 10 (1): 269.
  19. ^ Lending, Claire; Minnick, Kristina; Schorno, Patrick J. (2018-04-02). "Corporate Governance, Social Responsibility, and Data Breaches". Financial Review. 53 (2): 413–455. doi:10.1111/fire.12160. ISSN 0732-8516.
  20. ^ "Transitioning from Privacy Act 1993 to Privacy Act 2020". Retrieved 29 November 2020.
  21. ^ Voss, W. Gregory; Houser, Kimberly A. (2019-05-20). "Personal Data and the GDPR: Providing a Competitive Advantage for U.S. Companies". American Business Law Journal. 56 (2): 287–344. doi:10.1111/ablj.12139. ISSN 0002-7766. S2CID 182271514.
  22. ^ SB 1386, Cal. Civ. Code 1798.82 and 1798.29.
  23. ^ SB 1386 Senate Bill Archived 2007-06-13 at the Wayback Machine
  24. ^ Burdon, Mark; Lane, Bill; von Nessen, Paul (2010). "The mandatory notification of data breaches: Issues arising for Australian and EU legal developments". Computer Law & Security Review. 26 (2): 115–129. doi:10.1016/j.clsr.2010.01.006. ISSN 0267-3649.
  25. ^ Scott Berinato (12 February 2008). "CSO Disclosure Series - Data Breach Notification Laws, State By State". CSO Online. Retrieved 11 May 2016.
  26. ^ "AB 1298 Assembly Bill - CHAPTERED". Retrieved 11 May 2016.
  27. ^ https://www.bakerlaw.com/files/uploads/documents/data%20breach%20documents/state_data_breach_statute_form.pdf [bare URL PDF]
  28. ^ "RSA Blogs". RSA.com. Retrieved 27 January 2019.
  29. ^ "The Personal Data Notification & Protection Act" (PDF). Obamawhitehouse.archives.gov. Retrieved 4 May 2018.
  30. ^ Soroka, Saranna (April 8, 2018). "Coalition of 32 State AGs Outline Opposition to Federal Preemption of State Data Breach Notification Laws". JOLT Digest. Retrieved 26 August 2021.
  31. ^ Sen, Ravi (2018). "Challenges to Cybersecurity: Current State of Affairs". Communications of the Association for Information Systems: 22–44. doi:10.17705/1cais.04302. ISSN 1529-3181.
  32. ^ White, Michael D.; Fisher, Christopher (2008). "Assessing Our Knowledge of Identity Theft". Criminal Justice Policy Review. 19 (1): 3–24. doi:10.1177/0887403407306297. ISSN 0887-4034. S2CID 144958696.
  33. ^ Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro (2011). "Do data breach disclosure laws reduce identity theft?". Journal of Policy Analysis and Management. 30 (2): 256–286. doi:10.1002/pam.20567. ISSN 0276-8739.
  34. ^ Gatzlaff, Kevin M.; McCullough, Kathleen A. (2010). "The Effect of Data Breaches on Shareholder Wealth". Risk Management and Insurance Review. 13 (1): 61–83. doi:10.1111/j.1540-6296.2010.01178.x. ISSN 1098-1616. S2CID 153592982.
  35. ^ a b Cavusoglu, Huseyin; Mishra, Birendra; Raghunathan, Srinivasan (2004). "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers". International Journal of Electronic Commerce. 9 (1): 70–104. doi:10.1080/10864415.2004.11044320. ISSN 1086-4415. S2CID 10753015.
  36. ^ Campbell, Katherine; Gordon, Lawrence A.; Loeb, Martin P.; Zhou, Lei (2003). "The economic cost of publicly announced information security breaches: empirical evidence from the stock market" (PDF). Journal of Computer Security. 11 (3): 431–448. doi:10.3233/JCS-2003-11308.
  37. ^ Romanosky, Sasha; Hoffman, David; Acquisti, Alessandro (2014-01-17). "Empirical Analysis of Data Breach Litigation". Journal of Empirical Legal Studies. 11 (1): 74–104. doi:10.1111/jels.12035. ISSN 1740-1453. S2CID 155714280.

Further reading[edit]

  • Solove, Daniel J.; Hartzog, Woodrow (2022). Breached!: Why Data Security Law Fails and How to Improve it. Oxford University Press. ISBN 978-0-19-094057-7.

External links[edit]