Part I of this Article provides an overview of the importance of credit monitoring and of tort claims related to cybersecurity. It also discusses the duty to protect digital personal information and to disclose breaches of cybersecurity, as well as the reasons why the economic loss rule should not bar claims for the costs of credit monitoring. Part II of this Article discusses the precedent dealing with credit-monitoring damages, related business practices, class-action settlements, and judicial and administrative sanctions. Part III explores the issue of whether credit-monitoring damages are analogous to the medical-monitoring damages that many states award to victims of toxic exposure. Part IV then considers arguments against the compensa...
This article discusses the increasing importance of insurance companies in compensating victims of c...
For several years, hackers taking advantage of security holes in the information system of TJX Compa...
Despite the increasing amount of data breaches, there is no liability for parties who do not adequat...
When someone improperly accesses or discloses an individual’s personal information, the subject of t...
Data breaches are becoming a norm in modern life. Every year it seems that bigger and bigger attacks...
Established tort principles carefully applied to the contemporary problems of cybersecurity and iden...
Data breaches are becoming a norm in modern life. Every year it seems that bigger and bigger attacks...
Cybersecurity is one of the most pressing and legally difficult issues facing this country today. It...
Part I of this Note will examine the history of the Fair Credit Reporting Act, the basics of Article...
Over the past decade, the number of security breaches that have compromised business records contain...
Severe financial consequences of data breaches enforce organizations to reconsider their cybersecuri...
Every day, another hacker gains unauthorized access to information, be it credit card data from groc...
This Note discusses Pisciotta v. Old National Bancorp, a case decided by the Seventh Circuit, which ...
Recently, TJX, Inc. announced that computer hackers breached several of TJX’s databases containing t...
The lack of a clear remedy for data subjects whose private information has been compromised in data ...
This article discusses the increasing importance of insurance companies in compensating victims of c...
For several years, hackers taking advantage of security holes in the information system of TJX Compa...
Despite the increasing amount of data breaches, there is no liability for parties who do not adequat...
When someone improperly accesses or discloses an individual’s personal information, the subject of t...
Data breaches are becoming a norm in modern life. Every year it seems that bigger and bigger attacks...
Established tort principles carefully applied to the contemporary problems of cybersecurity and iden...
Data breaches are becoming a norm in modern life. Every year it seems that bigger and bigger attacks...
Cybersecurity is one of the most pressing and legally difficult issues facing this country today. It...
Part I of this Note will examine the history of the Fair Credit Reporting Act, the basics of Article...
Over the past decade, the number of security breaches that have compromised business records contain...
Severe financial consequences of data breaches enforce organizations to reconsider their cybersecuri...
Every day, another hacker gains unauthorized access to information, be it credit card data from groc...
This Note discusses Pisciotta v. Old National Bancorp, a case decided by the Seventh Circuit, which ...
Recently, TJX, Inc. announced that computer hackers breached several of TJX’s databases containing t...
The lack of a clear remedy for data subjects whose private information has been compromised in data ...
This article discusses the increasing importance of insurance companies in compensating victims of c...
For several years, hackers taking advantage of security holes in the information system of TJX Compa...
Despite the increasing amount of data breaches, there is no liability for parties who do not adequat...