This report answers some frequently asked questions about the Target (store) data breach, including what is known to have happened in the breach, and what costs may result. It also examines some of the broader issues common to data breaches, including how the payment system works, how cybersecurity costs are shared and allocated within the payment system, who bears the losses in such breaches more generally, what emerging cybersecurity technologies may help prevent them, and what role the government could play in encouraging their adoption, as well as some of the legislation that the 113th Congress has introduced to deal with these issues
In the past decade, the world has experienced numerous severe and impactful data breaches, without i...
Security breach notification laws or data breach notification laws are laws that require an entity t...
The breach of payment card systems at the Home Depot in 2014 resulted in the theft of a wealth of in...
This report answers some frequently asked questions about the Target and selected other data breache...
The protection of data, particularly data that can be used to identify individuals, has become an is...
This report describes the common elements of several data security and breach notification bills tha...
In recent times the breach of security systems or cyber-attacks leading to unauthorized acquisitions...
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the p...
In response to evolving cybersecurity challenges, global spending on information security has grown ...
(Excerpt) This Note argues that a strict federal data breach notification law would not only appease...
Abstract – Despite heightened awareness, large scale data breaches continue to occur and pose signif...
This report analyzes the incentives for companies to share information about cybersecurity breaches ...
Every time we swipe our debit cards, pay our bills online, or sign up for a service like Netflix, we...
While the discussion about a federal law on data breach notification is ongoing and a rash of large,...
This report discusses the core areas addressed in federal legislation, including the scope of covera...
In the past decade, the world has experienced numerous severe and impactful data breaches, without i...
Security breach notification laws or data breach notification laws are laws that require an entity t...
The breach of payment card systems at the Home Depot in 2014 resulted in the theft of a wealth of in...
This report answers some frequently asked questions about the Target and selected other data breache...
The protection of data, particularly data that can be used to identify individuals, has become an is...
This report describes the common elements of several data security and breach notification bills tha...
In recent times the breach of security systems or cyber-attacks leading to unauthorized acquisitions...
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the p...
In response to evolving cybersecurity challenges, global spending on information security has grown ...
(Excerpt) This Note argues that a strict federal data breach notification law would not only appease...
Abstract – Despite heightened awareness, large scale data breaches continue to occur and pose signif...
This report analyzes the incentives for companies to share information about cybersecurity breaches ...
Every time we swipe our debit cards, pay our bills online, or sign up for a service like Netflix, we...
While the discussion about a federal law on data breach notification is ongoing and a rash of large,...
This report discusses the core areas addressed in federal legislation, including the scope of covera...
In the past decade, the world has experienced numerous severe and impactful data breaches, without i...
Security breach notification laws or data breach notification laws are laws that require an entity t...
The breach of payment card systems at the Home Depot in 2014 resulted in the theft of a wealth of in...