Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity theft. Unfortunately, current solutions for handling these incidents are woefully inadequate. Private litigation like consumer class actions and shareholder lawsuits each face substantive legal and procedural barriers. States have their own data security and breach notification laws, but there is currently no unifying piece of legislation or strong enforcement mechanism. This Note argues that proactive solutions are required. First, a national data security law—setting minimum data security...
What happens when one’s sensitive information falls into the wrong hands? With the twenty-first cent...
Identity theft is real, it’s here, and consumers need protection. Over the past five years hackers h...
Digital connections permeate our lives—and so do data breaches. Given that we must be online for bas...
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the p...
(Excerpt) This Note argues that current law is inadequate to protect consumers in light of the preva...
Every time we swipe our debit cards, pay our bills online, or sign up for a service like Netflix, we...
In the modern digitized and networked world, personal identifying information has quickly become a c...
Data breaches are becoming a norm in modern life. Every year it seems that bigger and bigger attacks...
The lack of a clear remedy for data subjects whose private information has been compromised in data ...
Data breaches are becoming a norm in modern life. Every year it seems that bigger and bigger attacks...
Over the past decade, the number of security breaches that have compromised business records contain...
As the number of data breaches continues to rise in the United States, so does the amount of data br...
(Excerpt) This Note argues that a strict federal data breach notification law would not only appease...
This book chapter was originally written for a conference on privacy and security at Stanford Law Sc...
Data is the pollution problem of the information age, and protecting privacy is the environmental ch...
What happens when one’s sensitive information falls into the wrong hands? With the twenty-first cent...
Identity theft is real, it’s here, and consumers need protection. Over the past five years hackers h...
Digital connections permeate our lives—and so do data breaches. Given that we must be online for bas...
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the p...
(Excerpt) This Note argues that current law is inadequate to protect consumers in light of the preva...
Every time we swipe our debit cards, pay our bills online, or sign up for a service like Netflix, we...
In the modern digitized and networked world, personal identifying information has quickly become a c...
Data breaches are becoming a norm in modern life. Every year it seems that bigger and bigger attacks...
The lack of a clear remedy for data subjects whose private information has been compromised in data ...
Data breaches are becoming a norm in modern life. Every year it seems that bigger and bigger attacks...
Over the past decade, the number of security breaches that have compromised business records contain...
As the number of data breaches continues to rise in the United States, so does the amount of data br...
(Excerpt) This Note argues that a strict federal data breach notification law would not only appease...
This book chapter was originally written for a conference on privacy and security at Stanford Law Sc...
Data is the pollution problem of the information age, and protecting privacy is the environmental ch...
What happens when one’s sensitive information falls into the wrong hands? With the twenty-first cent...
Identity theft is real, it’s here, and consumers need protection. Over the past five years hackers h...
Digital connections permeate our lives—and so do data breaches. Given that we must be online for bas...