Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
OPM Data Breach Lawsuit Tossed, Fed Plaintiffs will Appeal
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/26/2017 | 12:59:15 PM
Re: Interesting
Alas, the main reason it doesn't make sense is because reporters misreport and don't care enough to understand it themselves. (Scientists refer to this phenomenon as "Wet Roads Cause Rain".)

The law is not barring people from suing organizations who have wronged them by contributing to the compromise of their data. But if you have no actual damages to show/prove, then you generally have no remedy under the common law.

 A victim of actual identity theft or the like would have to be the plaintiff in such a case.

Does this seem draconian in the modern data age? Perhaps. But the common law doesn't concern itself with hypotheticals so much as actual damage. Maybe it's time for legislation to create a separate right of action for individuals independent of the common law, but fat chance seeing that, I suspect.

Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/26/2017 | 12:52:31 PM
Re: Interesting
That's not really the point. It's not about standing to sue.

The point is that one of the essential elements to prove a negligence case is damages. If damages cannot be proven/shown, then a negligence suit must fail as a matter of law.

And even other types of common-law actions generally won't yield favorable plaintiff results if actual damage cannot be shown.

And this will remain the case until and unless legislation gets passed giving private citizens a separate private right of action in these data-breach cases, with its own damages/award rubric that is independent of common-law actions.

(Disclaimer: This post/comment is provided for informational, educational and/or entertainment purposes only. Neither this nor other posts/comments on this website constitute legal advice or the creation, implication or confirmation of an attorney-client relationship. For actual legal advice, personally consult with an attorney licensed to practice in your jurisdiction.)
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/25/2017 | 1:55:12 PM
One real question ... Thefr of "what" exactly
If a thief takes a physical thing - car, wallet, jewelry, etc --- then that can be defined with a serial number and such and retrieved, also with a hard currency value for the loss.   DATA is somehing else and to a degree, even a license plate on our car exposes us.  This is VISIBLE stuff, not hard value stuff, so what is stealing it?  Writing down with pen and paper?  Nope.  It gets nasty when thieves break into a secure value (Equifax) and steal data which is theft from Equifax of propety under contract.   Technically, the law should probably extend Contract law to include the invidiaul whose data has been compromised.  Fine legal argument there.  But a VALUE cannot be placed on the data UNLESS probably it is USED to something else.  Then the LOSS value kicks in.  If I have a lost credit card but do NOT use it, I have not invoked a loss per se.  I have no bought anything.  What harm then is done?  Now, if I then start to buy stuff ON the stolen card, a hard dollar value can be kicked in for recovery.  

Interesting fine points indeed. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:48:12 AM
Re: Based on outcome
An actor may wait weeks or months or have to dig through the 143 million stolen from Equifax before action is indeed taken I would agree, otherwise why attack in the first place, they will eventually use it what they captured.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:46:48 AM
Re: Based on outcome
lack of evidence that attackers maliciously used the data in question but is there a statute of limitation for instances like this? This would be a good question to ask, they may not have used it yet, that does not mean they will not.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:44:51 AM
Re: Interesting
Equifax should not be allowed to continue as a business I think there should be consequence for them, we are not sue how secure other two credit status firmss network.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:43:17 AM
Re: Interesting
This is a common probelm, the judiciary does not understand technology and they consequently make idiotic rulings based on that lack of understanding. That makes sense. It would be hard to find a judge who understands the technology well enough tough.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:41:55 AM
Re: Interesting
a precedent that Equifax will surely jump on to ward off the class action suits against them. That would be my guess too. This will be a long legal battle I would guess.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:40:13 AM
Re: Information vs Money
The answer to your question is WHO was guarding the vault? Who has responsibility for the vault? I would say that is the organization itself. Data maybe in all over the network, no breach should have happened.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:38:51 AM
Re: Information vs Money
information theft is invisible if compared to car or money theft That makes sense however data/information is value to the owners of that, and stolen so there should be consequence on that.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-42258
PUBLISHED: 2021-10-22
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include ...
CVE-2020-28968
PUBLISHED: 2021-10-22
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
CVE-2020-28969
PUBLISHED: 2021-10-22
Aplioxio PDF ShapingUp 5.0.0.139 contains a buffer overflow which allows attackers to cause a denial of service (DoS) via a crafted PDF file.
CVE-2020-36485
PUBLISHED: 2021-10-22
Portable Ltd Playable v9.18 was discovered to contain an arbitrary file upload vulnerability in the filename parameter of the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted JPEG file.
CVE-2020-36486
PUBLISHED: 2021-10-22
Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling.