Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future
Behnam Dayanim and
Edward George
Additional contact information
Behnam Dayanim: Paul Hastings LLP, USA
Cyber Security: A Peer-Reviewed Journal, 2018, vol. 1, issue 4, 301-315
Abstract:
Americans have grown accustomed to the drumbeat of data breaches, particularly because most have involved credit card data where individuals are protected from harm and almost never suffer out-of-pocket losses. But the more recent data breaches — Equifax, Yahoo! and the United States Office of Personnel Management — raise new concerns because of the amount of highly sensitive data that has been compromised. These compromises have caught the attention of the Federal Trade Commission (FTC), state attorneys general and Congress, and, as a result, the approaches to privacy-related harms are changing. This paper explores the circuit courts of appeals‘ approaches to privacy harms in data breach cases, specifically with regard to Article III standing, and the FTC‘s approach in its privacy and cyber security enforcement actions. After examining both approaches, this paper concludes with insights into best practices on dealing with the shifting legislative, judicial and regulatory climate surrounding breaches.
Keywords: privacy; cyber security; data breach; standing; Federal Trade Commission; circuit courts of appeals; emerging trends (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2018
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/1898/download/ (application/pdf)
https://hstalks.com/article/1898/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2018:v:1:i:4:p:301-315
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().