Talk:Data breach notification laws

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Untitled[edit]

This article seems unnecessarily US-centric. It does not, for example, mention the GDPR and other laws in other countries.

It seems odd, also, that articles relating to this are marked by various groups as being of low importance. I have a feeling that different fields refer to some things with different vocabularies. The priorities of the different groups thereby seem low, but they are not taken together. In other words, I think that lots of different groups see data privacy issues as important. Might they just be talking about the issue in incompatible ways, thereby making it look as though this is a niche issue?

22:21, 31 October 2018 (UTC) — Preceding unsigned comment added by RayKiddy (talkcontribs)

Wiki Education Foundation-supported course assignment[edit]

This article was the subject of a Wiki Education Foundation-supported course assignment, between 19 September 2020 and 19 December 2020. Further details are available on the course page. Student editor(s): Nicholas100000. Peer reviewers: Jameswang323, Exploredragon, Madssnake, Plusoneplusone, Showtime oski, Hiiisparks, Lolabaylo, HanMiKC.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 08:53, 17 January 2022 (UTC)[reply]

Wiki Education Foundation-supported course assignment[edit]

This article was the subject of a Wiki Education Foundation-supported course assignment, between 17 May 2021 and 31 July 2021. Further details are available on the course page. Student editor(s): Svn38. Peer reviewers: Fsharbi.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 08:53, 17 January 2022 (UTC)[reply]

Bibliography (in progress)[edit]

  1. Bisogni, Fabio and Hadi Asghari. “More than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws.” Journal of Information Policy 10:45-82.
  2. Burdon, Mark. 2010. "Contextualizing the tensions and weaknesses of information privacy and data breach notification laws." Santa Clara Computer & High Tech. LJ 27(1): 63-129.
  3. Daly, Angela. 2018."The introduction of data breach notification legislation in Australia: A comparative view." Computer law & security review 34(3): 477-495.
  4. Ferguson III, James H. 2020. “Protecting Personal Data: A Survey of Consumer Protections Throughout North Carolina’s Identity Theft Protection Act.” Campbell Law Review. 42(7):191-214.
  5. Garcia, Flora J. 2006. "Data protection, breach notification, and the interplay between state and federal law: The experiments need more time." Fordham Intell. Prop. Media & Ent. LJ 17: 693-727.
  6. Honeywill, Sean C. 2006. "Data Security and Data Breach Notification for Financial Institutions." NC Banking Inst. 10: 269-304.
  7. Ishii, Kaori, and Taro Komukai. 2016. "A comparative legal study on data breaches in Japan, the US, and the UK." 12th IFIP International Conference on Human Choice and Computers 86-105.
  8. Joerling, Jill. 2010. Data breach notification laws: An argument for a comprehensive federal law to protect consumer data. Wash. UJL & Pol'y, 32, 467-488.
  9. Lee, Samuel. 2006. "Breach notification laws: Notification requirements and data safeguarding now apply to everyone, including entrepreneurs." Entrepreneurial Bus. LJ 1: 125-151.
  10. Needles, Sara A. 2009. “The Data Game: Learning to Love the State-Based approach to Data Breach Notification Law.” NCL Rev. 88(8):267-310.
  11. Pattanasri, Thanaphol. 2018. “Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?” QUT L. Rev. 18:268-289.
  12. Picanso, Kathryn. E. 2006. Protecting information security under a uniform data breach notification law. Fordham L. Rev., 75:355-390.
  13. Regan, Priscilla M. 2009. "Federal Security Breach Notifications: Politics and Approaches." Berkeley Tech. LJ 24: 1103-1132.
  14. Ronaldson, Nicholas. 2019. “Hacking: The Naked Age Cybercrime, Clapper Standing, and the Debate Between State and Federal Data Breach Notification Laws.” Northwestern Journal of Technology and Intellectual Property 16(4): 305-321.
  15. Sahara, Williams. 2020. "CCPA Tipping the Scales: Balancing Individual Privacy with Corporate Innovation for a Comprehensive Federal Data Protection Law," Indiana Law Review 53(1): 217-243.
  16. Sen, Ravi. 2018. “Challenges to Cybersecurity: Current State of Affairs.” Communications of the Association for Information Systems 43(2):22-38.
  17. Shaw, Abraham. 2009. "Data breach: from notification to prevention using PCI DSS." Colum. JL & Soc. Probs. 43: 517-562.
  18. Toh, Ying Lei. 2018. “Incentivizing Firms to Protect Consumer Data: Can Reputation Play a (Bigger) Role?” Working Paper 1-42.
  19. Tom, Jacqueline May. 2010. "A simple compromise: The need for a federal data breach notification law." John's L. Rev. 84: 1569-1603.
  20. Tschider, Charlotte A. 2015 "Experimenting with Privacy: Driving Efficiency Through a State-Informed Federal Data Breach Notification and Data Protection Law." Tul. J. Tech. & Intell. Prop. 18:46-78.

Less than 15 pages, but still useful articles:

  1. Karunakaran, Sowmya, Kurt Thomas, Elie Bursztein, and Oxana Comanescu. 2018. “Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data.” Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018).: 217-234
  2. Romanosky, Sasha. 2016. “Examining the Costs and Causes of Cyber Incidents.” Journal of Cybersecurity 2(2):121-135
  3. Thomas Kurt, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelly, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Savar Patel, Dan Boneh, and Elie Bursztein. 2019. “Protecting accounts from credential Studding with Password Breach Alerting.” 28th {USENIX} Security Symposium ({USENIX} Security 19).: 1556-1571
  4. Ford, Janet C., Barbara Jo White, and Kristin M. White. 2015. "AFTER THE DATA BREACH: NOTIFICATION LAWS AND MORE." Issues in Information Systems 16(4):86-93.
  5. Greenleaf, Graham. 2011."Taiwan revises its Data Protection Act." Privacy Laws & Business International Report 108: 2010-2011.
  6. Ritchey, Katherine, et al. 2013."Global Privacy and Data Security Developments-2013." Bus. Law. 69: 245-254
  7. Song, Dong Hyun, and Chang Yong Son. 2017. "Mismanagement of personally identifiable information and the reaction of interested parties to safeguarding privacy in South Korea." University of Boras, Sweden 22(4).
  8. Greenleaf, Graham, and Whon-il Park. 2014 "South Korea's innovations in data privacy principles: Asian comparisons." Computer Law & Security Review 30(5): 492-505.
  9. Greenleaf, Graham. 2018 "The Legal and Business Risks of Inconsistencies and Gaps in Coverage in Asian Data Protection Laws." Session II Materials, Asian Business Law Institute (ABLI) Data Privacy Forum, Singapore. 7: 1-4.
  10. Rich, Cynthia. 2014. “A Look at New Trends: Privacy Laws in East, Central, and South Asia and the Pacific.” Privacy and security law report. No. 13. Law Report 1-14.
  11. Goel, Sanjay, and Hany A. Shawky. "The impact of federal and state notification laws on security breach announcements." Communications of the Association for Information Systems 34(1):37-46.
  12. Zou, Yixin, Shawn Danino, Kaiwen Sun, and Florian Schaub. 2019. “You Might Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications.” Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems.:1-14.
  13. Park, Sangchul. 2019. "Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records." International Review of Law and Economics 58:132-145.
  14. Thomas, Kurt, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, and Elie Bursztein. 2017. “Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.” Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: 1421-1434.
  15. Maurushat, Alana.2009. "Data Breach Notification Law Across the World from California to Australia." Privacy Law and Business International 1-5.

Nicholas100000 (talk) 02:02, 18 October 2020 (UTC)[reply]

Requested move 24 March 2024[edit]

The following is a closed discussion of a requested move. Please do not modify it. Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a move review after discussing it on the closer's talk page. No further edits should be made to this discussion.

The result of the move request was: moved. – robertsky (talk) 01:52, 2 April 2024 (UTC)[reply]


Security breach notification lawsData breach notification laws – More common per Google Scholar results (see below) and consistent with the main article, data breach. This article already defines its scope as restricted to data breaches. Buidhe paid (talk) 20:33, 24 March 2024 (UTC)[reply]

I think this is best thought of not in terms of which term is more common, but in terms of what the actual scope of the article is - a data breach is a type of security breach, not a synonym for one (note security breach redirects to security). But the scope of this article is about laws specifically governing notifications of data breahces, not other types of security breaches, so support * Pppery * it has begun... 15:50, 25 March 2024 (UTC)[reply]
The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.