|  
                        overview
 networks
 
 tapes
 
 laptops
 
 sale
 
 law
 
 prevention
 
 responses
 
 studies
 
 costs
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  related
 Guides:
 
 Security &
 InfoCrime
 
 Consumers
 & Trust
 
 ID Theft,
 ID Fraud
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 |  studies 
 This page highlights some of the literature on large scale 
                        exposure of sensitive consumer information.
 
 It covers -
 Points 
                        of entry to the literature on liability and consumer responsibility 
                        are highlighted here.
 
  responsibilities 
 For Australia see in particular Margaret Jackson's Hughes 
                        on Data Protection Law in Australia (Pyrmont: LawBook 
                        2001) and the discussion in the Australian Law Reform 
                        Commission's 2008 For Your Information: Australian 
                        Privacy Law & Practice  report.
 
 US and Canadian items include -
 
                        'Negligence 
                          Liability for Breaches of Data Security' by Jennifer 
                          Chandler in 23 Banking & Finance Law Review 
                          (2008), 223-247'Identity 
                          Theft: The US Legal Environment and Organisations' Related 
                          Responsibilities' by Gregory Gerard, William Hillison 
                          & Carl Pacini in 12(1) Journal of Financial 
                          Crime (2004), 33-43 
                          'Financial Institutions' Duty of Confidentiality to 
                          Keep Customer's Personal information Secure from the 
                          Threat of Identity Theft' by Brandon McKelvey in 34 
                          UC Davis Law Review (2001), 1077-1128'Identity 
                          Theft: Making the Known Unknowns Known' by Chris Hoofnagle 
                          in 21 Harvard Journal of Law and Technology 
                          (2007) 'The 
                          Jewel Of Their Souls: Preventing Identity Theft Through 
                          Loss Allocation Rules' by Jeff Sovern in 64 University 
                          of Pittsburgh Law Review (2003), 343-406'Reservoirs 
                          Of Danger: The Evolution Of Public And Private Law At 
                          The Dawn Of The Information Age' by Danielle Citron 
                          in 80 Southern California Law Review (2007), 
                          241-96'Identity 
                          Theft And Consumer Protection: Finding Sensible Approaches 
                          To Safeguard Personal Data In The United States And 
                          Canada' by Kamaal Zaidi in 19(2) Loyola Consumer 
                          Law Review (2007), 99-150'The 
                          Recognition Of A Negligence Cause Of Action For Victims 
                          Of Identity Theft: Someone Stole My Identity, Now Who 
                          Is Going To Pay For It?' by Anthony White in 88(4) Marquette 
                          Law Review (2005), 847-866'After 
                          Billions Spent To Comply With HIPAA And GLBA Privacy 
                          Provisions, Why Is Identity Theft The Most Prevalent 
                          Crime In America?' by R. Bradley McMahon in 49(3) Villanova 
                          Law Review (2004), 625-660'Identity 
                          Theft: Myths, Methods, And New Law' by Holly Towle in 
                          30(2) Rutgers Computer & Technology Law Journal 
                          (2004), 237-326'Data 
                          Rape: Assault By An Unknown Predator - The Supreme Court 
                          Went Wrong In TRW, Inc. V. Andrews' by Latasha McDade 
                          in 45 South Texas Law Review (2004), 395-417'Cybersecurity, 
                          Identity Theft, And The Limits Of Tort Liability' by 
                          Vincent Johnson in 57 South Carolina Law Review 
                          (2005)'Invasion 
                          of the Information Snatchers: Creating Liability for 
                          Corporations with Vulnerable Computer Networks' by Sarah 
                          Faulkner in 18 John Marshall Journal of Computer 
                          & Information Law (2000), 1019'Protecting 
                          The Most Valuable Corporate Asset: Electronic Data, 
                          Identity Theft, Personal Information, And The Role Of 
                          Data Security In The Information Age' by Kenneth Siegel 
                          in 111 Penn State Law Review (2007)'Negligent 
                          Entrustment Liability for Outsourced Data' by Michael 
                          Rustad & Thomas Koenig in 10 Journal of Internet 
                          Law (2007), 10 
                          'The Tort of Negligent Enablement of Cybercrime' by 
                          Rustad & Koenig in 20 Berkeley Technology Law 
                          Journal (2005), 1553   reporting 
 Works on mandatory reporting in the US include -
 
                        'Identity 
                          Theft: Plugging The Massive Data Leaks With A Stricter 
                          Nationwide Breach-Notification Law' by Amanda Draper 
                          in 40 John Marshall Law Review (2007)'Identity 
                          Theft, Privacy, And The Architecture Of Vulnerability' 
                          by Daniel Solove in 54 Hastings Law Journal 
                          (2003)'Gauging 
                          The Effectiveness Of Us Identity Theft Legislation' 
                          by Robert Holtfreter & Kristy Holtfreter in 13(1) 
                          Journal of Financial Crime (2006), 56-64 'Database 
                          Security Breach Notification Statutes: Does Placing 
                          The Responsibility On The True Victim Increase Data 
                          Security?' by Lilia Rode in 43 Houston Law Review 
                          (2007)'California's 
                          Database Breach Notification Security Act: The First 
                          State Breach Notification Law Is Not Yet A Suitable 
                          Template For National Identity Theft Legislation' by 
                          Timothy Skinner in 10 Richmond Journal of Law and 
                          Technology (2003)'The 
                          Misplaced Role Of Identity Theft In Triggering Public 
                          Notice Of Database Breaches' by Brendan St. Amant in 
                          44 Harvard Journal on Legislation (2007) 
                          'A Case of Mistaken Identity? News Accounts of Hacker, 
                          Consumer, and Organizational Responsibility for Compromised 
                          Digital Records' by Kris Erickson & Philip Howard 
                          in 12(4) Journal of Computer-Mediated Communication 
                          (2007) | here  offshoring 
 Data loss in relation to offshoring remains a monster 
                        under the bed, polemicised in literature by politicians 
                        and labour activists but as yet without extensive coverage 
                        in law journals. US items include -
 
                        '"I 
                          Just Bought A Flat Screen T.V. In Kolkata?" Application 
                          of Laws for International Outsourcing Related Identity 
                          Theft' by Samantha Grant in 11 University of Pittsburgh 
                          Journal of Technology Law & Policy (2006)  economics
 Salient 
                        items regarding IT security economics are - 
                        Ross 
                          Anderson's 2001 Why Information Security is Hard: 
                          An Economic Perspective (PDF) 
                          Lawrence 
                          Gordon & Martin Loeb's 'The Economics of Information 
                          Security Investment' in Economics of Information 
                          Security (Dordrecht: Kluwer Academic 2004) edited 
                          by L Jean Camp & Stephen LewisRobert 
                          Hahn & Anne Layne-Farrar's 2006 The Law and 
                          Economics of Software Security (PDF) Other 
                        works are highlighted here. 
 
 
 
 
 
 
 
 
  next page (costs)
   | 
                        
                       |