This article examines the problems associated with data security breaches from two different, but not mutually exclusive, perspectives. The first part of the article examines the need for notification in the event of a data security breach and proposes an amendment of the Personal Information Protection and Electronic Document Act (PIPEDA) to create a legal, or statutory, obligation in Canada to compel disclosure or notification of data security breaches. My recommendations are based on the examination of legislation from other legal jurisdictions, highlighting, where necessary, the shortcomings of the legislation, which ought to be taken into consideration in amending PIPEDA or in drafting a model data security breach notification legislat...
The lack of a clear remedy for data subjects whose private information has been compromised in data ...
Attorneys increasingly are confronting the significant ethical issues raised when a data-security...
In response to evolving cybersecurity challenges, global spending on information security has grown ...
This Note sheds light on the major legal issues surrounding the numerous data breaches that plague o...
Public and private sector organisations are now able to capture and utilise data on a vast scale, th...
As the number of data breaches continues to rise in the United States, so does the amount of data br...
Digital connections permeate our lives—and so do data breaches. Given that we must be online for bas...
(Excerpt) This Note argues that current law is inadequate to protect consumers in light of the preva...
This book chapter was originally written for a conference on privacy and security at Stanford Law Sc...
Digital connections permeate our lives—and so do data breaches. Given that we must be online for bas...
In the modern digitized and networked world, personal identifying information has quickly become a c...
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the p...
Every day, another hacker gains unauthorized access to information, be it credit card data from groc...
The topic of data breaches, protection of information and data security salient to business and crim...
Established tort principles carefully applied to the contemporary problems of cybersecurity and iden...
The lack of a clear remedy for data subjects whose private information has been compromised in data ...
Attorneys increasingly are confronting the significant ethical issues raised when a data-security...
In response to evolving cybersecurity challenges, global spending on information security has grown ...
This Note sheds light on the major legal issues surrounding the numerous data breaches that plague o...
Public and private sector organisations are now able to capture and utilise data on a vast scale, th...
As the number of data breaches continues to rise in the United States, so does the amount of data br...
Digital connections permeate our lives—and so do data breaches. Given that we must be online for bas...
(Excerpt) This Note argues that current law is inadequate to protect consumers in light of the preva...
This book chapter was originally written for a conference on privacy and security at Stanford Law Sc...
Digital connections permeate our lives—and so do data breaches. Given that we must be online for bas...
In the modern digitized and networked world, personal identifying information has quickly become a c...
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the p...
Every day, another hacker gains unauthorized access to information, be it credit card data from groc...
The topic of data breaches, protection of information and data security salient to business and crim...
Established tort principles carefully applied to the contemporary problems of cybersecurity and iden...
The lack of a clear remedy for data subjects whose private information has been compromised in data ...
Attorneys increasingly are confronting the significant ethical issues raised when a data-security...
In response to evolving cybersecurity challenges, global spending on information security has grown ...