BreachExchange mailing list archives

Re: Do Breach Notification Laws Work?


From: Adam Shostack <adam () homeport org>
Date: Sun, 15 Mar 2009 09:51:19 -0400

On Thu, Mar 12, 2009 at 06:12:44PM -0400, Jeffrey Walton wrote:
| > breach notification letters as junk mail rather than acting to
| > protect their identity, experts say.
| It's unfortunate that consumer behavior is so predictable. Over
| exposure has lead to apathy in most cases. It's been an Achilles heel
| for a lot of security initiatives: browser warnings, problematic
| certificates, site redirection, etc. Users just click OK to keep
| drilling on... Many do not even take the time to read the warning
| message. Most who do read the warning do not understand it because
| security folks and programmers are the author of the warning. Mom and
| Grandpop have no idea of what is being said in most instances.

It would be great if consumer behavior were predictable, and security
people bothered to try predicting their reactions to our efforts,
rather than repeating the mistakes of the past.


| 
| On 3/12/09, security curmudgeon <jericho () attrition org> wrote:
| >
| >
| > ---------- Forwarded message ----------
| > From: Richard Forno <rforno () infowarrior org>
| >
| > Do Breach Notification Laws Work?
| > By Kim Zetter EmailMarch 09, 2009 | 9:00:00 AM
| >
| > http://blog.wired.com/27bstroke6/2009/03/experts-debate.html
| >
| > Consumers caught in a national epidemic of data spills are growing numb,
| > discarding breach notification letters as junk mail rather than acting to
| > protect their identity, experts say.
| >
| > And though most states now have laws requiring companies to warn breach
| > victims, some serious breaches are still showing up on customer credit and
| > bank statements before any official warning has been issued. It all begs
| > the question: are the notification laws working?
| >
| > This was the question that a number of speakers at the Security Breach
| > Notification seminar held in Berkeley on Friday (at right) tried to
| > answer.
| >
| > When California passed the first data breach notification law in 2003, it
| > quickly became the defacto standard for the rest of the country. A total
| > of 44 states now have breach notification laws, which vary only slightly
| > in their definitions of what constitutes a breach that requires
| > notification and what companies must do when they experience a breach.
| >
| > It's clear that the laws have made the public more aware of breaches and
| > the vulnerability of their data, and have exposed poor security practices
| > at many businesses. A 2005 study by the FBI showed that in the absence of
| > a legal requirement to report breaches, only 20 percent of firms would
| > report serious breaches to law enforcement.
| >
| > [..]
| > _______________________________________________
| > Dataloss Mailing List (dataloss () datalossdb org)
| >
| > CREDANT Technologies, a leader in data security, offers advanced data encryption solutions.
| > Protect sensitive data on desktops, laptops, smartphones and USB sticks transparently
| > across your enterprise to ensure regulatory compliance.
| > http://www.credant.com/stopdataloss
| >
| _______________________________________________
| Dataloss Mailing List (dataloss () datalossdb org)
| 
| CREDANT Technologies, a leader in data security, offers advanced data encryption solutions.
| Protect sensitive data on desktops, laptops, smartphones and USB sticks transparently 
| across your enterprise to ensure regulatory compliance.
| http://www.credant.com/stopdataloss

_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)

CREDANT Technologies, a leader in data security, offers advanced data encryption solutions.
Protect sensitive data on desktops, laptops, smartphones and USB sticks transparently 
across your enterprise to ensure regulatory compliance.
http://www.credant.com/stopdataloss


Current thread: