Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
OPM Data Breach Lawsuit Tossed, Fed Plaintiffs will Appeal
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/26/2017 | 12:59:15 PM
Re: Interesting
Alas, the main reason it doesn't make sense is because reporters misreport and don't care enough to understand it themselves. (Scientists refer to this phenomenon as "Wet Roads Cause Rain".)

The law is not barring people from suing organizations who have wronged them by contributing to the compromise of their data. But if you have no actual damages to show/prove, then you generally have no remedy under the common law.

 A victim of actual identity theft or the like would have to be the plaintiff in such a case.

Does this seem draconian in the modern data age? Perhaps. But the common law doesn't concern itself with hypotheticals so much as actual damage. Maybe it's time for legislation to create a separate right of action for individuals independent of the common law, but fat chance seeing that, I suspect.

Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/26/2017 | 12:52:31 PM
Re: Interesting
That's not really the point. It's not about standing to sue.

The point is that one of the essential elements to prove a negligence case is damages. If damages cannot be proven/shown, then a negligence suit must fail as a matter of law.

And even other types of common-law actions generally won't yield favorable plaintiff results if actual damage cannot be shown.

And this will remain the case until and unless legislation gets passed giving private citizens a separate private right of action in these data-breach cases, with its own damages/award rubric that is independent of common-law actions.

(Disclaimer: This post/comment is provided for informational, educational and/or entertainment purposes only. Neither this nor other posts/comments on this website constitute legal advice or the creation, implication or confirmation of an attorney-client relationship. For actual legal advice, personally consult with an attorney licensed to practice in your jurisdiction.)
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/25/2017 | 1:55:12 PM
One real question ... Thefr of "what" exactly
If a thief takes a physical thing - car, wallet, jewelry, etc --- then that can be defined with a serial number and such and retrieved, also with a hard currency value for the loss.   DATA is somehing else and to a degree, even a license plate on our car exposes us.  This is VISIBLE stuff, not hard value stuff, so what is stealing it?  Writing down with pen and paper?  Nope.  It gets nasty when thieves break into a secure value (Equifax) and steal data which is theft from Equifax of propety under contract.   Technically, the law should probably extend Contract law to include the invidiaul whose data has been compromised.  Fine legal argument there.  But a VALUE cannot be placed on the data UNLESS probably it is USED to something else.  Then the LOSS value kicks in.  If I have a lost credit card but do NOT use it, I have not invoked a loss per se.  I have no bought anything.  What harm then is done?  Now, if I then start to buy stuff ON the stolen card, a hard dollar value can be kicked in for recovery.  

Interesting fine points indeed. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:48:12 AM
Re: Based on outcome
An actor may wait weeks or months or have to dig through the 143 million stolen from Equifax before action is indeed taken I would agree, otherwise why attack in the first place, they will eventually use it what they captured.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:46:48 AM
Re: Based on outcome
lack of evidence that attackers maliciously used the data in question but is there a statute of limitation for instances like this? This would be a good question to ask, they may not have used it yet, that does not mean they will not.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:44:51 AM
Re: Interesting
Equifax should not be allowed to continue as a business I think there should be consequence for them, we are not sue how secure other two credit status firmss network.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:43:17 AM
Re: Interesting
This is a common probelm, the judiciary does not understand technology and they consequently make idiotic rulings based on that lack of understanding. That makes sense. It would be hard to find a judge who understands the technology well enough tough.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:41:55 AM
Re: Interesting
a precedent that Equifax will surely jump on to ward off the class action suits against them. That would be my guess too. This will be a long legal battle I would guess.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:40:13 AM
Re: Information vs Money
The answer to your question is WHO was guarding the vault? Who has responsibility for the vault? I would say that is the organization itself. Data maybe in all over the network, no breach should have happened.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/25/2017 | 11:38:51 AM
Re: Information vs Money
information theft is invisible if compared to car or money theft That makes sense however data/information is value to the owners of that, and stolen so there should be consequence on that.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10696
PUBLISHED: 2020-03-31
A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.
CVE-2020-5344
PUBLISHED: 2020-03-31
Dell EMC iDRAC7, iDRAC8 and iDRAC9 versions prior to 2.65.65.65, 2.70.70.70, 4.00.00.00 contain a stack-based buffer overflow vulnerability. An unauthenticated remote attacker may exploit this vulnerability to crash the affected process or execute arbitrary code on the system by sending specially cr...
CVE-2020-5292
PUBLISHED: 2020-03-31
Leantime before versions 2.0.15 and 2.1-beta3 has a SQL Injection vulnerability. The impact is high. Malicious users/attackers can execute arbitrary SQL queries negatively affecting the confidentiality, integrity, and availability of the site. Attackers can exfiltrate data like the users' and admini...
CVE-2020-7009
PUBLISHED: 2020-03-31
Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys. An attacker who is able to generate an API key can perform a series of steps that result in an API key being generated with elevated privileges.
CVE-2019-13495
PUBLISHED: 2020-03-31
In firmware version 4.50 of Zyxel XGS2210-52HP, multiple stored cross-site scripting (XSS) issues allows remote authenticated users to inject arbitrary web script via an rpSys.html Name or Location field.