Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Privacy: Do We Need a National Data Breach Disclosure Law?
Threaded  |  Newest First  |  Oldest First
Gregrudy
50%
50%
Gregrudy,
User Rank: Apprentice
3/27/2018 | 12:36:58 PM
Victim Shaming
Maybe it's time that we return to criminalizing the criminal instead of the victim.   We parade the victims of targeted and sophisticated breach vectors, by professional actors, in front of the public court of opinion, and post their company profiles all over the "wall of shame."    And then we make additional laws, to further punish the victims of crime, while ignoring the hackers.   Is it because it's easier?   Easier to go after the victim and blame them for what they could have/should have/might have done differently.   

I have no intention of downplaying the severity of a public sector breach.  It's a big stinking deal.  But I am not okay with the complete lack of any outcry in going after the bad actors who are perpetuating and effecting these crimes against the public.    Yes, we need to do more to protect the data and privacy.  But we need to make the main thing the main thing.  Hacking is already illiegal.   Let's go after that first.  
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/28/2018 | 7:03:59 PM
Re: Victim Shaming
Maybe it's time that we return to criminalizing the criminal instead of the victim This is a good point to raise. Holding the criminal responsible is the way to go.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/28/2018 | 7:06:21 PM
Re: Victim Shaming
Easier to go after the victim and blame them for what they could have/should have/might have done differently. This make sense, at the same time when it comes to security it is everybodys responsibility.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/28/2018 | 7:09:35 PM
Re: Victim Shaming
Yes, we need to do more to protect the data and privacy. I agree. There is a shared responsibility everybody needs to pay attention and do their parts, and then there is criminals we need to go after.
DallasBishoff
50%
50%
DallasBishoff,
User Rank: Author
3/28/2018 | 9:00:13 PM
Re: Victim Shaming
It is important to note that most people who provide their privacy information to a third party are doing so for the purpose of receiving a service, or participating in a collective social forum. Many organizations cannot provide the service to an individual without collecting personal information. For instance, any transaction that involves a credit card payment. In that regard, there is no basis for "victim sharing." The individual has done nothing more than picked a service provider. Unfortunately, sometimes these types of data sets are compromised. 

Now, if you are referring to an independent vendor with a data set that includes privacy data, many of them are already very sensitive to the reputation risk associated with a data breach. In a breach, they too are a victim, noting that a compromise may involve a criminal act. However, not all breach scenarios involve criminal acts. There is a long history of data disclosures that are a result of simple human error - an access control mechanism was not implemented properly, and the ability to freely discover and access the data was both possible, and actually occurred. 

In summary, victim shaming is not going to make the landscape better. Problems are solved through addressing the root cause, and not symptomatic attributes. However, thank you for your thoughts. As the author of the article, I hope that you benefited from the perspective presented.

 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/30/2018 | 6:42:18 PM
Re: Victim Shaming
@Dallas: On this "victim shaming", I'm going to suggest that in some cases it's well deserved. Facebook deserves it now and deserved it in 2012 because of how they have disrespected users and their data for so long. Uber deserves it too, for similar reasons. The healthcare industry DEFINITELY deserves it because they are lagging behind so much -- and because people don't have as much choice about their healthcare providers or insurance carriers. And it's a huge motivator for e-commerce -- because they know that the brand damage will simply cause people to move to another platform (unlike with, say, a bank; people aren't going to en masse move investment accounts and mortgages and credit cards because of a little breach -- especially considering the consumer protections in financial services).
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/28/2018 | 6:47:09 PM
Law?
Do we need another law? If everybody plays within the law things would not be this messy.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/28/2018 | 6:49:16 PM
identities
The fact that our identities can be misused makes them a potential liability, as well, creating the legal basis for harm, neglect, and damages. Agree with this. Personal data radioactive, you can not dump it anywhere you want.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/28/2018 | 6:50:48 PM
Web
Modern consumers need more confidence in how their identities are used and managed on the Web That makes sense, web was the main source posing risks to privacy.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/30/2018 | 6:36:55 PM
Re: Web
Sure, but we ALREADY HAVE numerous state laws here. Federal law on data-breach notification specifically isn't going to add any meaningfully significant privacy protections (unless there was to be a severe cracking down, with far stricter requirements and shorter deadlines than even the strictest states require -- which would have its own drawbacks) except to further confuse compliance officers and confound compliance efforts -- the cost of which get passed on to customers, meaning that these companies now need to sell even MORE user data.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/28/2018 | 6:52:25 PM
privacy
the US does not have a national privacy management standard, per se, and certainly there is no uniform breach notification law. This is really surprising for me.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/28/2018 | 6:55:43 PM
PII
We have healthcare laws that address privacy, but only when the privacy data is protected health information, a form of PII. PII may apply outside of healthcare as far as I understood, for healthcare there is PHI protection.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/28/2018 | 6:59:10 PM
Two seconds
In the US, an identity is compromised every two seconds. This is really very scary to hear. There has to be a better way to manage security of our indentity
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/28/2018 | 7:02:29 PM
Standard
They contend a federal standard would simplify compliance and make the threshold for disclosure clear to businesses and consumers alike. This may be good to get early notification when there is a breach, if you remember yahoo, they reported it 4 years later.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/30/2018 | 6:33:37 PM
Let's leave it alone.
I understand the concerns, but at this point, it doesn't matter much. Almost all the states have their own laws here, and the strictest states (effectively MA, CA, and -- where PCI-DSS is concerned -- MN, NV, and WA) effectively create "floors" for national/regional organizations. To put federal law/regulation on top of this all would seriously muck things up even more for compliance efforts, IMHO.



(Disclaimer: This post is provided for informational, educational and/or entertainment purposes only. Neither this nor other posts here constitute legal advice or the creation, implication or confirmation of an attorney-client relationship. For actual legal advice, personally consult with an attorney licensed to practice in your jurisdiction.)


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5604
PUBLISHED: 2020-07-09
Android App 'Mercari' (Japan version) prior to version 3.52.0 allows arbitrary method execution of a Java object by a remoto attacker via a Man-In-The-Middle attack by using Java Reflection API of JavaScript code on WebView.
CVE-2020-5974
PUBLISHED: 2020-07-08
NVIDIA JetPack SDK, version 4.2 and 4.3, contains a vulnerability in its installation scripts in which permissions are incorrectly set on certain directories, which can lead to escalation of privileges.
CVE-2020-15072
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An error-based SQL Injection vulnerability exists via the Import Administrators section.
CVE-2020-15073
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An XSS vulnerability occurs within the Import Administrators section via upload of an edited text document. This also affects the Subscriber Lists section.
CVE-2020-2034
PUBLISHED: 2020-07-08
An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect...