DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

No consensus on notifying victims of data breaches, but I have a few thoughts

Posted on March 9, 2014 by Dissent

Eric Tucker of Associated Press reports:

The data breach at Target Corp. that exposed millions of credit card numbers has focused attention on the patchwork of state consumer notification laws and renewed a push for a single national standard.

Most states have laws that require retailers to disclose data breaches, but the laws vary wildly. Consumers in one state might learn immediately that their personal information had been exposed, but that might not happen in another state, and notification requirements for businesses depend on where compares are located.

Attorney General Eric Holder has joined the call for a nationwide notification standard, but divisions persist, making a consensus questionable this year.

“We’re stuck with the state-by-state approach unless some compromise gets done at the federal level,” said Peter Swire, a privacy expert at Georgia Tech and a former White House privacy official.

Despite general agreement on the value of a national standard, there are obstacles to a straightforward compromise:

—Consumer groups don’t want to weaken existing protections in states with the strongest laws.

—Retailers want laws that are less burdensome to comply with and say too much notification could cause consumers to tune out the problem.

—Congress is trying to figure out how a federal standard should be enforced and what the threshold should be before notification requirements kick in.

Read more on Yahoo! News

One compromise might be to not require businesses to notify consumers directly in low-risk situations, but have them notify states – and require states to post breach notices on a public website consumers can check. Or in the alternative, have a large federal website that updates with submitted breach reports on a weekly basis. The following types of information would make for a helpful table/entry: name of entity, address, number of consumers affected, types of information involved, nature of breach, date of incident, date of discovery, any vendor/business associate involved, whether credit monitoring services are being offered, and contact phone numbers/email addresses for consumers to use to contact entity if they have questions.

And as part of any federal law, law enforcement agencies that discover a breach should be required to notify the breached entity (although they should be able to require delayed notification by the entity to protect any investigation).


Related:

  • Something Old and Something New: The False Claims Act and Cybersecurity
  • "Louvre" as a password, outdated software, impossible updates… Ten years of IT security breaches at the world's leading museum
  • Canadian woman stuck since 2021 in Mauritius after passport withheld
  • ‘People have had to move house’: Inside the British Library, two years on from devastating cyber attack
  • Two years after an audit highlighted significant concerns, North Salem Central School District leaves sensitive student data at risk
  • Landmark civil penalty of AU$5.8 million issued under Australia’s Privacy Act
Category: Breach LawsCommentaries and AnalysesFederal

Post navigation

← AU: Asylum seeker data breach triggers court battles
Experian Lapse Allowed ID Theft Service Access to 200M Consumer Records – Krebs →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • From bad to worse: Doctor Alliance hacked again by same threat actor
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.