text
stringlengths 0
118
|
---|
Our goal is to reorient the way the law addresses actors who create and |
participate in systems that leave personal information vulnerable to |
exposure and misuse. |
Our book is not about cybersecurity in the broadest sense of the term, |
which applies to all forms of security with systems that use the Internet.27 |
Instead, our focus is on data security, a significant piece of the |
cybersecurity pie that involves personal data. Data security law is largely |
part of privacy, data protection, and consumer protection frameworks like |
the Federal Trade Commission’s (FTC) enforcement of rules against |
deceptive and unfair trade practices, the European Union’s General Data |
Protection Regulation (GDPR), statutes that govern entities using personal |
data like the Health Insurance Portability and Accountability Act (HIPAA), |
and the law of torts that provides a remedy for negligent data practices.28 |
Although there is a lot of overlap between optimal regulation for data |
security and cybersecurity, there are important differences. The risk |
thresholds, threat modeling, actors affected, and type and magnitude of |
harm can differ when personal data is involved rather than when supply |
chains, machinery, or infrastructure are involved. It thus makes sense in |
some contexts to treat data security as unique from other areas of |
cybersecurity, and the law does so. Data security law emerges more from |
privacy law than cybersecurity law. |
Unfortunately, data security law currently exists in an awkward space |
between cybersecurity and privacy. Being in this space has been a detriment |
to data security law, which has often failed to incorporate the strengths of |
both cybersecurity and privacy. Laws addressing privacy issues often |
include data security as part of their framework. Because the legislative lens |
is on privacy, legislators typically focus on the individual. Breach |
notification dominates data security law. The security rules are often vague |
and sparse. In contrast, cybersecurity law frequently includes more robust |
security rules based on systems-focused security frameworks. |
In a cruelly ironic way, data security law also fails to draw strengths |
from privacy law. Data security remains quite siloed from privacy. When it |
is part of privacy laws, data security is often cabined to narrow sections. |
Data security law has not fully incorporated privacy law’s evolving |
recognition about designing to accommodate human behavior and |
protecting human values beyond confidentiality. To make matters worse, |
the protections in privacy law often fall short in ways that are bad for data |
security. |
The fact that data security is often part of the fabric of privacy law is a |
missed opportunity. Lawmakers could draw from privacy law’s toolbox to |
bring a richer and more nuanced approach to securing personal data. Yet so |
far, they have not. |
In this book, we hope to bring data security law out of this “no man’s |
land” to better reflect the overlapping wisdom of privacy and cybersecurity. |
Because we focus mainly on personal data, we largely leave to others more |
general critical cybersecurity issues such as infrastructure security, |
industrial espionage, cyberwarfare, computer crime, trade secrets and |
proprietary data, and the nuanced debates surrounding the market for and |
disclosure of security vulnerabilities.29 Of course, these issues overlap with |
data security problems.30 But in this book we are examining the data |
security piece of the pie. |
We also are not seeking to critique the established strategies |
technologists have developed to protect information. Nor are we proposing |
new technological approaches to the field of cybersecurity. Rather, as legal |
scholars, we are drawing from existing security knowledge that the law |
often fails to embrace. Because we are not technology experts, we will not |
delve too deeply into technical specifics of data security. Instead, our goal is |
to develop principles and theories that can guide the law for the foreseeable |
future. In this book, we propose a general approach lawmakers and judges |
can take to improve the security of personal data, and we outline a broad set |
of principles to bring coherence and consistency to a body of law that for |
too long has been focusing in the wrong direction. |
Our argument is built around one overarching point: To improve the |
rules |
for |
securing |
personal |
information, |
policymakers |
must |
counterintuitively shift the law’s focus beyond data breaches. Too much of |
the current law of data security places the breach at the center of |
everything. Turning data security law into the “law of breaches” has the |
effect of over-emphasizing the conduct of the breached entities while |
ignoring the other actors and factors that contributed to the breach. We |
present an alternative, broader vision of data security policy in three areas: |
accountability, redress, and technological design. |
It is tempting to say to organizations: “Come on, just be more secure!” |
But data security is notoriously complicated and needs a great deal of |
calibration. Ironically, some attempts by lawmakers and industry to add |
more security can actually make systems more vulnerable.31 Security |
measures come with difficult costs and tradeoffs, so the choice of which |
ones to use and how many is quite challenging. |
Data security is a delicate dance between technology and people. The |
ideal amount of data security is not necessarily to be as secure as possible |
and avoid a breach at all costs. In most cases, it is a poor policy choice for |
an organization to have the strongest possible security because the tradeoffs |
are too significant. It is easy to underappreciate the costs of many security |
measures because costs are often thought of in monetary terms. But the |
biggest costs of many security measures are that they can reduce |
functionality, make things inefficient and inconvenient, and be difficult and |
time-consuming. |
One of the challenges with data security is that there are no absolute |
answers, as we are dealing with a continuum of risk and an ongoing cat- |
and-mouse game between attackers and defenders. Policy choices depend |
upon not only an assessment of risk but also an assessment of the costs of |
addressing those risks. A complicated balancing must take place. |
Current data security rules fail to address risk effectively. In many |
circumstances, the law penalizes breaches with little regard to |
considerations of risk and balance. Other times, the law levies no penalty |