Racing to the Top: Creating a Flexible Duty of Care to Secure Personal Information Deirdre K. Mulligan Clinical Professor Director, Samuelson Law, Technology.

Slides:



Advertisements
Similar presentations
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Advertisements

Copyright Security-Assessment.com 2006 Protecting The Data Data security, compliance, disclosure requirements and what can happen if you get it wrong Presented.
INDIA.
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
Chapter 1 An Overview of Managerial Finance © 2005 Thomson/South-Western.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
Topic 2 The External Environment
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Information Disclosure as a light-weight regulatory mechanism DIMACS Deirdre K. Mulligan Director, Samuelson Law, Technology & Public Policy Clinic Clinical.
An Overview of Financial and Multinational Financial Management Corporate Finance Dr. A. DeMaskey.
MARKET STRUCTURES. What is a Market Structure? ▪ Market Structures, by book definition, is the nature and degree of competition among firms operating.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
XML AND THE LEGAL FOUNDATIONS FOR ELECTRONIC COMMERCE: Making XML Pay: Revising Existing Electronic Payments Law to Accommodate Innovation Copyright (c)
Privacy and Security Risks in Higher Education
1Copyright Jordan Lawrence. All rights reserved. Annual In-House Symposium Practical Steps to Minimize Privacy Risks: Understanding The Intersection.
Working towards responsible business practices in the oil and gas sector Rose Kimotho Programme Manager (East Africa) Institute for Human Rights and Business.
Privacy on the Books and on the Ground Kenneth A. Bamberger & Deirdre K. Mulligan University of California, Berkeley School of Law and School of Information.
Report from Breakout Session 1.2 Secure Consumerization: the Genuine Trustworthiness Revolution Chair: Craig Lee Rapporteur: Paolo Mazzetti.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
The Institutionalization of Business Ethics
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Track II: Introduction and Overview of Financial Services and Information Technology Privacy Policy: Synthesizing Financial Services Industry Privacy David.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Unit x economic environment of business
Enterprise Risk Management (ERM) ABN AMRO Business Unit North America (BU NA) Overview for ERM Committee April 11, 2007.
AUGUST 25, 2015 Cyber Insurance:
Knowledge Transfer - Policy Deirdre K. Mulligan School of Law School of Information University of California, Berkeley.
Sustainability Issues
Environmental taxes for the EU? opportunities and risks Dr. Pendo Maro EU Policy Officer, Environmental Policy Integration European Environmental Bureau.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Mark Carey, CPA, CISA President x8431 Management-ese: An Introductory Course.
Privacy of Home Energy Usage Data Jim Williams June 26, 2012 Jim Williams June 26, 2012.
... Future of the LDA Industry Daniel T. King President/CEO Justice Document Services, Inc. Copyright 2007 Justice Document Services, Inc.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
The Institutionalization of Business Ethics
Regulation and the Governance Agenda in the 21 st Century Josef Konvitz, Public Governance Directorate.
International Legal Regulation of the Securities Market Regulation of the securities market is an ordering activity of all its participants and transactions.
Environmental management and innovation strategies René Kemp UNU-MERIT, ICIS, DRIFT Presentation 4 Environment and Sustainable Development course UNU-MERIT.
Slide 0 in Chapter 7 Chapter 7 Analyzing Business Markets and Buyer Behavior.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
McGraw-Hill/Irwin Strategic Management, 10/e Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved. Corporate Social Responsibility and.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Copyright © Texas Education Agency, All rights reserved. Risk Management Fundamentals Statistics & Risk Management 1.
Warwick Business School The drivers of low carbon business strategies Andrew Sentance, Warwick Business School Warwick University Climate Policy Workshop.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
The Development of Environmental Protection in Information Age: Using Information as a Regulatory Tool and Its Perspective -- the Overview of US Experience.
Chapter 1 Introduction Copyright © 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Introduction to Sales Management in the Twenty First Century
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
An Overview of Financial and Multinational Financial Management.
CORE Discussion Forum: How to Keep Your Outsourcing Contract Current
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
The Institutionalization of Business Ethics
The Business Environment B200 Understanding Business Behavior
BUSINESS MARKETS & BUSINESS BUYER BEHAVIOR
Business Markets and Business Buying Behavior
General Counsel and Chief Privacy Officer
Business Markets and Business Buying Behavior
Extractive Industries and Water Governance in the Nile Basin, now and in 2030: Lessons from Upstream around Lake Victoria in Tanzania   Donald Kasongi,
E-Commerce and Economic Forces
Business Markets and Business Buying Behavior
Presentation transcript:

Racing to the Top: Creating a Flexible Duty of Care to Secure Personal Information Deirdre K. Mulligan Clinical Professor Director, Samuelson Law, Technology & Public Policy Clinic Director, Center for Clinical Education Berkeley Law, UC Berkeley

If you build it they will come… or maybe not… Security in the market place is “remarkably below what “known best Practices” could provide.” The existence of technology solutions on their own does not improve security or privacy.

Q: What public policies create incentives for firms to effectively secure personal information? The problem The metaphor The intervention Current research Conclusions Reforms and future research

Problem Security of personal information –Inadequate incentives to protect Non-rivalrous Externalized harm Unknown harm from breach Difficult to establish causality –Requires dynamic evolutionary response Traditional legal responses ill-suited –Standards –Common law –Market

Metaphor Pollution is to Industrial society as Privacy Breaches are to Information society

Environmental Law: Information Disclosure Emergency Planning and Community Right-to-Know Act (EPCRA) –Huge drops in releases (EPA est. 40% likely less) –Operational changes within companies Remarkable changes from lighter, less costly approach

How it works Catalyst for market activity Catalyst for political activity Source of power/pressure internal actors

Breach as toxic release?

Intervention: Security Breach Laws Notice to individuals whose… “unencrypted personal information (first name or initial and last name + SSN; DL; CICN; Account number, credit or debit card number + PW) was, or is reasonably believed to have been, acquired by an unauthorized person”

Current Research: Effects of Security Breach Laws What information are they producing? Are they catalyzing –market activity? –political activity? –organizational behavior? What limits their effectiveness? –Informational limits –Subject matter limits

New Information and Harms Consumers and public aware of breaches Fuller picture of problem –Absent legal requirement only 20% of firms will report serious breaches (FBI/CSI 2005) Particular vulnerabilities identified –Laptops, third-party vendors, tapes and other data in transit Creation of new harm –Harm to business reputation and brand flowing from report of breach Price tag on problem –Average cost $182 per person (Ponemon 2006)

Market Activity Some Individuals and self protection 20% claim to have terminated relationship 0-7% actual churn rate Stock market fluctuations Limitations Notices uninformative Unable to compare risks Limited opportunities for exit (Relationship-less)

Political Activity Some Copycat laws –39 additional states and DC; proposals US, UK, forthcoming in EU Relation to other regulatory efforts Limited use by ngos Limitations Location-less Mile wide, inch deep Technocratic Weak and fragmented legal framework

Location-less Astroglide mashup: Christopher Soghoian & Sid Stamm, PhD candidates, Indiana University

Organizational Behavior “You manage what you measure” security and privacy bound to brand Heightened role of CPO Bridge between CPO/CSO/CISO drive information exchange among security professionals Altered paradigm–compliance to risk management

Conclusions Security Breach Laws are effecting markets, political activity and organizational behavior Push towards risk management is likely to drive ongoing improvements Some limitations Information and reporting requirements of current laws inherent in characteristics of breaches

Reforms and Future Research Reforms Standardized, electronic, centralized reporting Does NOT create publicly available database Future research Dual standard of notification? User based analysis of information –shifts in content, format and timing Metrics to determine risk, not just loss