text
stringlengths 0
118
|
---|
theirs. Identity thieves also steal people’s identities to obtain medical care, |
and this has resulted in people losing their health insurance. There are cases |
where the police have arrested victims because their police records were |
tainted by the identity thieves. |
Ransomware attacks are rising dramatically. Ransomware works by |
encrypting files on people’s computers so that the files are unreadable and |
inaccessible. The data is held hostage. To get the data back, victims must |
pay the hackers a ransom. Ransomware is incredibly profitable for hackers. |
It is a frightening world where at any moment, all our computer files—our |
documents, our precious photos and videos, our music, our most important |
information—can be held hostage for a ransom. In 2018, the city of Atlanta, |
Georgia, spent $2.6 million to recover from a ransomware attack on the |
city’s systems that asked for the rough equivalent of about $50,000 worth of |
the electronic currency Bitcoin.20 |
Malicious hackers can readily frame people when data is compromised. |
They can put incriminating files onto people’s computers and then tip off |
law enforcement authorities.21 Hackers can also access your most private |
photos and writings and publish them to the world.22 They can take over |
your computer and use it to spam other people or to serve as a conduit |
through which to commit crimes. |
As more devices, appliances, and vehicles are hooked up to the Internet, |
physical safety is at grave risk.23 Hackers can break into our home devices. |
They can peer at our children through our baby cameras. They can snoop |
around through our home security cameras. They can listen in on us through |
our home assistant devices. They can gain control of our cars. They can also |
hack into implantable devices in our bodies, such as pacemakers or insulin |
pumps. |
As more and more of our sensitive data is maintained in vast dossiers |
about us, as our biometric information is gathered and stored—such as our |
fingerprints, eye scans, facial data, and DNA—what will the future look |
like if organizations can’t keep it secure? |
In Minority Report, a 2002 movie based upon a short story by Philip K. |
Dick, the protagonist John Anderton is on the run, being pursued |
exhaustively by the authorities. The movie is set in the future—2054— |
where the government and businesses use extensive surveillance |
technologies. To evade capture via ever-present retinal scanners, John must |
undergo an operation to replace both of his eyes. The procedure is rather |
gruesome, but it is necessary given the pervasive use of biometric |
identification in the story. |
Imagine the data breach notification letters of the future: |
We regret to inform you that we have suffered a breach, and hackers have obtained your retinal |
data, which they could use to impersonate you and gain access to accounts. To guard against |
future harm, we recommend that you immediately schedule an operation to replace your eyes. |
We are hurtling forward into a perilous future, with organizations collecting |
more data and with the consequences of its misuse becoming more dire— |
and even deadly. |
DATA SECURITY LAW’S GRAND ENTRANCE |
During the past two decades, policymakers have rushed out a body of law |
to address the worsening data security nightmare. The most significant |
development is the rise of data breach notification laws, which require |
organizations that are breached to notify regulators, affected individuals, |
and sometimes the media. Breach notification is immensely popular; every |
state in America, as well as many countries, now have these laws. |
Unfortunately, breach notification merely alerts victims that their data was |
compromised in a breach. It doesn’t cure the harm; it just informs people of |
the danger. |
Then come the class action lawsuits. Sometimes mere hours after a |
breach is made public, attorneys file lawsuits against companies on behalf |
of those whose data was compromised. Many of the suits fail. Others end |
up settling, with companies paying to save on the cost of litigating the case. |
Consumers often don’t receive any significant benefits or compensation. |
In the Target case, the consumer lawsuits for the breach settled for a |
pittance—just $10 million. The settlement was a fee paid not on the merits |
of the case but to make it go away. The Target breach affected between 70 |
and 110 million individuals, which means that the recovery amounted to |
just a few pennies per person.24 Victims did not see significant restitution as |
the settlement only applied to the reimbursement of notoriously elusive |
“documented damages” and reimbursements for “lost time,” which is often |
not given much value. |
After breaches, regulators also step in to enforce, but many times |
regulators take a pass. There are too many breaches each year, and |
regulators only have the resources to go after a small fraction of them. |
When regulators step in, their penalties often just increase the cost of the |
breach to a small or modest degree. For example, a group of state regulators |
settled with Target for $18.5 million.25 With the Target breach costs at an |
estimated $291 million, this regulatory penalty represents less than 10 |
percent of the total. Even if regulators or individual litigants were to recover |
more in penalties and damages, it’s not clear that things would be any |
different. Of course, greater monetary pain after a data breach might |
provide a stronger incentive to keep data secure, but organizations already |
face significant costs for breaches, and the additional incentive is not likely |
going to be a game changer. Target was already taking security quite |
seriously and devoting significant resources to it. Target failed not because |
of a lack of commitment to data security but because it made mistakes. |
Breaches set in motion a series of legal responses that often drag on for |
years and mire organizations in millions of dollars in expenses. By this |
time, however, it is far too late. The damage has been done, and the law |
mostly serves to heighten the expense to companies. While it is important to |
make sure that organizations internalize the risks they create, the law isn’t |
addressing all other actors that create risk. To make matters worse, the law |
often fails to help individual victims whose data was compromised in the |
breach. |
Despite data security law’s obsession with data breaches, the law doesn’t |
seem to be reducing the size, severity, or number of breaches. Data breaches |
are steadily increasing.26 The news is inundated with stories about data |
breaches that were readily preventable through rather inexpensive, non- |
cumbersome means. Why aren’t data breaches slowing down? Why doesn’t |
the law seem to be making any difference? |
THE ARGUMENT OF THIS BOOK AND A ROADMAP |
This is a book about how to improve the law’s approach to data security. |