Knowledge

Talk:Data breach notification laws

Source đź“ť

361: 336: 252: 231: 133: 262: 77: 53: 518: 437: 22: 167: 449: 681:
Thomas, Kurt, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, and Elie Bursztein. 2017. “Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.” Proceedings of
404:
It seems odd, also, that articles relating to this are marked by various groups as being of low importance. I have a feeling that different fields refer to some things with different vocabularies. The priorities of the different groups thereby seem low, but they are not taken together. In other
643:
Thomas Kurt, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelly, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Savar Patel, Dan Boneh, and Elie Bursztein. 2019. “Protecting accounts from credential Studding with Password Breach Alerting.” 28th {USENIX} Security Symposium
677:
Park, Sangchul. 2019. "Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records." International Review of Law and Economics
673:
Zou, Yixin, Shawn Danino, Kaiwen Sun, and Florian Schaub. 2019. “You Might Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications.” Proceedings of the 2019 CHI Conference on Human Factors in Computing
636:
Karunakaran, Sowmya, Kurt Thomas, Elie Bursztein, and Oxana Comanescu. 2018. “Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data.” Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018).:
530: 609:
Ronaldson, Nicholas. 2019. “Hacking: The Naked Age Cybercrime, Clapper Standing, and the Debate Between State and Federal Data Breach Notification Laws.” Northwestern Journal of Technology and Intellectual Property 16(4):
663:
Greenleaf, Graham. 2018 "The Legal and Business Risks of Inconsistencies and Gaps in Coverage in Asian Data Protection Laws." Session II Materials, Asian Business Law Institute (ABLI) Data Privacy Forum, Singapore. 7:
570:
Bisogni, Fabio and Hadi Asghari. “More than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws.” Journal of Information Policy 10:45-82.
797:
I think this is best thought of not in terms of which term is more common, but in terms of what the actual scope of the article is - a data breach is a type of security breach, not a synonym for one (note
656:
Song, Dong Hyun, and Chang Yong Son. 2017. "Mismanagement of personally identifiable information and the reaction of interested parties to safeguarding privacy in South Korea." University of Boras, Sweden
405:
words, I think that lots of different groups see data privacy issues as important. Might they just be talking about the issue in incompatible ways, thereby making it look as though this is a niche issue?
628:
Tschider, Charlotte A. 2015 "Experimenting with Privacy: Driving Efficiency Through a State-Informed Federal Data Breach Notification and Data Protection Law." Tul. J. Tech. & Intell. Prop. 18:46-78.
582:
Garcia, Flora J. 2006. "Data protection, breach notification, and the interplay between state and federal law: The experiments need more time." Fordham Intell. Prop. Media & Ent. LJ 17: 693-727.
670:
Goel, Sanjay, and Hany A. Shawky. "The impact of federal and state notification laws on security breach announcements." Communications of the Association for Information Systems 34(1):37-46.
613:
Sahara, Williams. 2020. "CCPA Tipping the Scales: Balancing Individual Privacy with Corporate Innovation for a Comprehensive Federal Data Protection Law," Indiana Law Review 53(1): 217-243.
851: 588:
Ishii, Kaori, and Taro Komukai. 2016. "A comparative legal study on data breaches in Japan, the US, and the UK." 12th IFIP International Conference on Human Choice and Computers 86-105.
579:
Ferguson III, James H. 2020. “Protecting Personal Data: A Survey of Consumer Protections Throughout North Carolina’s Identity Theft Protection Act.” Campbell Law Review. 42(7):191-214.
573:
Burdon, Mark. 2010. "Contextualizing the tensions and weaknesses of information privacy and data breach notification laws." Santa Clara Computer & High Tech. LJ 27(1): 63-129.
594:
Lee, Samuel. 2006. "Breach notification laws: Notification requirements and data safeguarding now apply to everyone, including entrepreneurs." Entrepreneurial Bus. LJ 1: 125-151.
511: 430: 558: 123: 660:
Greenleaf, Graham, and Whon-il Park. 2014 "South Korea's innovations in data privacy principles: Asian comparisons." Computer Law & Security Review 30(5): 492-505.
505: 667:
Rich, Cynthia. 2014. “A Look at New Trends: Privacy Laws in East, Central, and South Asia and the Pacific.” Privacy and security law report. No. 13. Law Report 1-14.
198: 576:
Daly, Angela. 2018."The introduction of data breach notification legislation in Australia: A comparative view." Computer law & security review 34(3): 477-495.
846: 117: 591:
Joerling, Jill. 2010. Data breach notification laws: An argument for a comprehensive federal law to protect consumer data. Wash. UJL & Pol'y, 32, 467-488.
647:
Ford, Janet C., Barbara Jo White, and Kristin M. White. 2015. "AFTER THE DATA BREACH: NOTIFICATION LAWS AND MORE." Issues in Information Systems 16(4):86-93.
600:
Pattanasri, Thanaphol. 2018. “Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?” QUT L. Rev. 18:268-289.
345: 778: 774: 697: 685:
Maurushat, Alana.2009. "Data Breach Notification Law Across the World from California to Australia." Privacy Law and Business International 1-5.
616:
Sen, Ravi. 2018. “Challenges to Cybersecurity: Current State of Affairs.” Communications of the Association for Information Systems 43(2):22-38.
379: 861: 841: 806:). But the scope of this article is about laws specifically governing notifications of data breahces, not other types of security breaches, so 314: 93: 597:
Needles, Sara A. 2009. “The Data Game: Learning to Love the State-Based approach to Data Breach Notification Law.” NCL Rev. 88(8):267-310.
720:
Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a
767: 603:
Picanso, Kathryn. E. 2006. Protecting information security under a uniform data breach notification law. Fordham L. Rev., 75:355-390.
546: 493: 790: 741: 625:
Tom, Jacqueline May. 2010. "A simple compromise: The need for a federal data breach notification law." John's L. Rev. 84: 1569-1603.
650:
Greenleaf, Graham. 2011."Taiwan revises its Data Protection Act." Privacy Laws & Business International Report 108: 2010-2011.
871: 156: 84: 58: 856: 818: 585:
Honeywill, Sean C. 2006. "Data Security and Data Breach Notification for Financial Institutions." NC Banking Inst. 10: 269-304.
622:
Toh, Ying Lei. 2018. “Incentivizing Firms to Protect Consumer Data: Can Reputation Play a (Bigger) Role?” Working Paper 1-42.
606:
Regan, Priscilla M. 2009. "Federal Security Breach Notifications: Politics and Approaches." Berkeley Tech. LJ 24: 1103-1132.
881: 619:
Shaw, Abraham. 2009. "Data breach: from notification to prevention using PCI DSS." Colum. JL & Soc. Probs. 43: 517-562.
304: 828:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
564: 398: 886: 747: 876: 346:
http://searchsecurity.techtarget.com/news/450409941/Yahoo-breach-data-reveals-the-need-for-ethical-breach-reporting
640:
Romanosky, Sasha. 2016. “Examining the Costs and Causes of Cyber Incidents.” Journal of Cybersecurity 2(2):121-135
207:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
866: 702: 142: 63: 423: 751: 375: 279:, an attempt at providing a comprehensive, standardised, pan-jurisdictional and up-to-date resource for the 653:
Ritchey, Katherine, et al. 2013."Global Privacy and Data Security Developments-2013." Bus. Law. 69: 245-254
371: 33: 711: 367: 275: 236: 693: 181: 724:
after discussing it on the closer's talk page. No further edits should be made to this discussion.
92:
on Knowledge. If you would like to participate, please visit the project page, where you can join
521:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
440:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
21: 786: 763: 721: 39: 754:– More common per Google Scholar results (see below) and consistent with the main article, 419: 411: 8: 737: 689: 469: 453: 554: 501: 473: 461: 210:
Find editors who have shown interest in this subject and ask them to take a look here.
457: 176: 89: 813: 782: 759: 397:
This article seems unnecessarily US-centric. It does not, for example, mention the
682:
the 2017 ACM SIGSAC Conference on Computer and Communications Security: 1421-1434.
799: 477: 341:
The following references may be useful when improving this article in the future:
733: 481: 465: 335: 835: 550: 497: 415: 538: 485: 810: 758:. This article already defines its scope as restricted to data breaches. 755: 534: 267: 132: 251: 230: 517: 436: 261: 803: 76: 52: 166: 852:
Stub-Class Computer Security articles of Unknown-importance
392: 330: 280: 366:
On 24 March 2024, it was proposed that this article be
512:
Wiki Education Foundation-supported course assignment
431:
Wiki Education Foundation-supported course assignment
257: 88:, a collaborative effort to improve the coverage of 188:Review importance and quality of existing articles 122:This article has not yet received a rating on the 833: 632:Less than 15 pages, but still useful articles: 191:Identify categories related to Computer Security 847:Unknown-importance Computer Security articles 710:The following is a closed discussion of a 197:Identify articles for creation (see also: 19: 547:Template:Dashboard.wikiedu.org assignment 494:Template:Dashboard.wikiedu.org assignment 179:. Please allow some days for processing. 545:Above undated message substituted from 492:Above undated message substituted from 102:Knowledge:WikiProject Computer Security 834: 105:Template:WikiProject Computer Security 862:Unknown-importance Computing articles 842:Stub-Class Computer Security articles 729:The result of the move request was: 355: 273:This article is within the scope of 82:This article is within the scope of 15: 401:and other laws in other countries. 283:and the subjects encompassed by it. 38:It is of interest to the following 13: 644:({USENIX} Security 19).: 1556-1571 526: 522: 445: 441: 165: 131: 14: 898: 748:Security breach notification laws 372:Security breach notification laws 204:Identify articles for improvement 824:The discussion above is closed. 529:. Further details are available 516: 448:. Further details are available 435: 359: 334: 260: 250: 229: 75: 51: 20: 309:This article has been rated as 872:All Computer Security articles 408:22:21, 31 October 2018 (UTC) 1: 857:Stub-Class Computing articles 752:Data breach notification laws 376:Data breach notification laws 175:will be generated shortly by 157:WikiProject Computer Security 140:This article is supported by 96:and see a list of open tasks. 85:WikiProject Computer Security 703:Requested move 24 March 2024 698:02:02, 18 October 2020 (UTC) 559:08:53, 17 January 2022 (UTC) 506:08:53, 17 January 2022 (UTC) 7: 882:Low-importance law articles 10: 903: 819:15:50, 25 March 2024 (UTC) 791:20:33, 24 March 2024 (UTC) 768:20:33, 24 March 2024 (UTC) 565:Bibliography (in progress) 315:project's importance scale 124:project's importance scale 108:Computer Security articles 742:01:52, 2 April 2024 (UTC) 308: 289:Knowledge:WikiProject Law 245: 150: 139: 121: 70: 46: 887:WikiProject Law articles 826:Please do not modify it. 773:Google Scholar results: 717:Please do not modify it. 292:Template:WikiProject Law 877:Stub-Class law articles 867:All Computing articles 781:("security breach..") 777:("data breach..") vs 170: 136: 28:This article is rated 533:. Student editor(s): 452:. Student editor(s): 169: 143:WikiProject Computing 135: 194:Tag related articles 155:Things you can help 182:More information... 537:. Peer reviewers: 531:on the course page 456:. Peer reviewers: 450:on the course page 171: 137: 34:content assessment 442:19 September 2020 427: 414:comment added by 390: 389: 354: 353: 329: 328: 325: 324: 321: 320: 224: 223: 220: 219: 216: 215: 99:Computer Security 90:computer security 59:Computer Security 894: 719: 561: 528: 524: 520: 508: 447: 446:19 December 2020 443: 439: 409: 378:. The result of 363: 362: 356: 338: 331: 297: 296: 293: 290: 287: 270: 265: 264: 254: 247: 246: 241: 233: 226: 225: 199:Article requests 184: 152: 151: 110: 109: 106: 103: 100: 79: 72: 71: 66: 55: 48: 47: 31: 25: 24: 16: 902: 901: 897: 896: 895: 893: 892: 891: 832: 831: 830: 829: 816: 815:it has begun... 800:security breach 715: 705: 567: 544: 514: 491: 433: 395: 360: 294: 291: 288: 285: 284: 276:WikiProject Law 266: 259: 239: 185: 180: 107: 104: 101: 98: 97: 61: 32:on Knowledge's 29: 12: 11: 5: 900: 890: 889: 884: 879: 874: 869: 864: 859: 854: 849: 844: 823: 822: 821: 814: 794: 793: 745: 727: 726: 712:requested move 706: 704: 701: 690:Nicholas100000 687: 686: 683: 679: 675: 674:Systems.:1-14. 671: 668: 665: 661: 658: 654: 651: 648: 645: 641: 638: 630: 629: 626: 623: 620: 617: 614: 611: 607: 604: 601: 598: 595: 592: 589: 586: 583: 580: 577: 574: 571: 566: 563: 513: 510: 470:Plusoneplusone 454:Nicholas100000 432: 429: 394: 391: 388: 387: 380:the discussion 364: 352: 351: 350: 349: 348: 342: 339: 327: 326: 323: 322: 319: 318: 311:Low-importance 307: 301: 300: 298: 272: 271: 255: 243: 242: 240:Low‑importance 234: 222: 221: 218: 217: 214: 213: 212: 211: 208: 205: 202: 195: 192: 189: 173:Article alerts 164: 161: 160: 148: 147: 138: 128: 127: 120: 114: 113: 111: 94:the discussion 80: 68: 67: 56: 44: 43: 37: 26: 9: 6: 4: 3: 2: 899: 888: 885: 883: 880: 878: 875: 873: 870: 868: 865: 863: 860: 858: 855: 853: 850: 848: 845: 843: 840: 839: 837: 827: 820: 817: 812: 809: 805: 802:redirects to 801: 796: 795: 792: 788: 784: 780: 776: 772: 771: 770: 769: 765: 761: 757: 753: 749: 744: 743: 739: 735: 732: 725: 723: 718: 713: 708: 707: 700: 699: 695: 691: 684: 680: 676: 672: 669: 666: 662: 659: 655: 652: 649: 646: 642: 639: 635: 634: 633: 627: 624: 621: 618: 615: 612: 608: 605: 602: 599: 596: 593: 590: 587: 584: 581: 578: 575: 572: 569: 568: 562: 560: 556: 552: 548: 542: 540: 536: 532: 519: 509: 507: 503: 499: 495: 489: 487: 483: 479: 475: 474:Showtime oski 471: 467: 463: 462:Exploredragon 459: 455: 451: 438: 428: 425: 421: 417: 413: 406: 402: 400: 385: 381: 377: 373: 369: 365: 358: 357: 347: 344: 343: 340: 337: 333: 332: 316: 312: 306: 303: 302: 299: 282: 278: 277: 269: 263: 258: 256: 253: 249: 248: 244: 238: 235: 232: 228: 227: 209: 206: 203: 200: 196: 193: 190: 187: 186: 183: 178: 174: 168: 163: 162: 158: 154: 153: 149: 145: 144: 134: 130: 129: 125: 119: 116: 115: 112: 95: 91: 87: 86: 81: 78: 74: 73: 69: 65: 60: 57: 54: 50: 49: 45: 41: 35: 27: 23: 18: 17: 825: 807: 746: 730: 728: 716: 709: 688: 631: 543: 527:31 July 2021 515: 490: 458:Jameswang323 434: 410:— Preceding 407: 403: 396: 383: 310: 295:law articles 274: 172: 141: 83: 40:WikiProjects 783:Buidhe paid 760:Buidhe paid 756:data breach 734:– robertsky 722:move review 678:58:132-145. 523:17 May 2021 281:legal field 836:Categories 811:* Pppery * 478:Hiiisparks 268:Law portal 30:Stub-class 482:Lolabaylo 466:Madssnake 177:AAlertBot 64:Computing 804:security 610:305-321. 551:PrimeBOT 498:PrimeBOT 424:contribs 416:RayKiddy 412:unsigned 393:Untitled 808:support 637:217-234 539:Fsharbi 486:HanMiKC 313:on the 731:moved. 657:22(4). 36:scale. 779:~1200 775:~1500 535:Svn38 384:moved 370:from 368:moved 159:with: 787:talk 764:talk 738:talk 694:talk 664:1-4. 555:talk 525:and 502:talk 444:and 420:talk 399:GDPR 382:was 549:by 496:by 374:to 305:Low 286:Law 237:Law 118:??? 838:: 789:) 766:) 750:→ 740:) 714:. 696:) 557:) 541:. 504:) 488:. 484:, 480:, 476:, 472:, 468:, 464:, 460:, 426:) 422:• 62:: 785:( 762:( 736:( 692:( 553:( 500:( 418:( 386:. 317:. 201:) 146:. 126:. 42::

Index


content assessment
WikiProjects
WikiProject icon
Computer Security
Computing
WikiProject icon
WikiProject Computer Security
computer security
the discussion
???
project's importance scale
Taskforce icon
WikiProject Computing
WikiProject Computer Security

AAlertBot
More information...
Article requests
WikiProject icon
Law
WikiProject icon
icon
Law portal
WikiProject Law
legal field
Low
project's importance scale

http://searchsecurity.techtarget.com/news/450409941/Yahoo-breach-data-reveals-the-need-for-ethical-breach-reporting

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑