Academia.eduAcademia.edu

Outline

Risk and Anxiety: A Theory of Data Breach Harms

2016, SSRN Electronic Journal

https://doi.org/10.2139/SSRN.2885638

Abstract

for their research assistance. We are grateful to the editors of the Texas Law Review for their superb assistance.

References (19)

  1. J. Craig Anderson, Identity Theft Growing, Costly to Victims, USA TODAY (Apr. 14, 2013), http://www.usatoday.com/story/money/personalfinance/2013/04/14/identity-theft-growing/ 2082179/ [https://perma.cc/7T5Q-DTHH].
  2. BUREAU OF JUST. STAT., U.S. DEP'T OF JUST., NCJ 243779, VICTIMS OF IDENTITY THEFT, 2012, at 7 (2013), https://www.bjs.gov/content/pub/pdf/vit12.pdf [https://perma.cc/773U-SHVT]. 113. Id.
  3. Thomas Clifford, Note, Provider Liability and Medical Identity Theft: Can I Get Your (Insurance) Number?, NW. J.L. & SOC. POL'Y, Fall 2016, at 45, 45. 115. BUREAU OF JUST. STAT., supra note 112, at 6. 116. Id. at 10.
  4. See Andrea Peterson, Data Exposed in Breaches Can Follow People Forever. The Protections Offered in Their Wake Don't., WASH. POST (June 15, 2015), http://www.washingtonpost.com/blogs/the-switch/wp/2015/06/15/data-exposed-in-breaches-can- follow-people-forever-the-protections-offered-in-their-wake-dont/ [https://perma.cc/JBF5-4K6X] (explaining that card providers quickly identify and replace at-risk card numbers).
  5. Id.
  6. See, e.g., Tara Siegel Bernard et al., Equifax Says Cyberattack May Have Affected 143 Million in the U.S., N.Y. TIMES (Sept. 7, 2017), https://www.nytimes.com/2017/09/07/ business/equifax-cyberattack.html?hp&action=click&pgtype=Homepage&clickSource=story- heading&module=first-column-region&region=top-news&WT.nav=top-news [https://perma.cc/ D9E6
  7. -BXGW] (discussing the 2017 Equifax cyberattack that resulted in a breach of sensitive consumer information);
  8. Rishi Iyengar, Hackers Release Data from Cheating Website Ashley Madison Online, TIME (Aug. 18, 2015), http://time.com/4002647/ashley-madison-hackers-data- released-impact-team/?iid=sr-link1 [https://perma.cc/37Y3-WHAP] (detailing the 2015 data breach of Ashley Madison that revealed members' personal and financial data);
  9. Maggie McGrath, Target Data Breach Spilled Info On As Many As 70 Million Customers, FORBES (Jan. 10, 2014), https://www.forbes.com/sites/maggiemcgrath/2014/01/10/target-data-breach-spilled-info-on-as- many-as-70-million-customers/#528bf61ee795 [https://perma.cc/XQ6V-GUSK] (reporting on the breach of customer information at Target in late 2013).
  10. See How to Keep Your Personal Information Secure, FED. TRADE COMM'N: CONSUMER INFO. (July 2012), https://www.consumer.ftc.gov/articles/0272-how-keep-your-personal- information-secure [https://perma.cc/H7QF-JZN3] (detailing suggestions for protecting personal information to avoid identity theft).
  11. Id.
  12. See, e.g., AMAZON WEB SERVS., AMAZON WEB SERVICES: OVERVIEW OF SECURITY PROCESSES 1 (2017), https://d0.awsstatic.com/whitepapers/Security/AWS_Security_
  13. Whitepaper.pdf [https://perma.cc/8KR8-QQFT] ("Helping to protect the confidentiality, integrity, and availability of our customers' systems and data is of the utmost importance . . . .");
  14. This Is How We Protect Your Privacy, APPLE INC., https://www.apple.com/privacy/approach-to-privacy/ [https://perma.cc/ZQC8-4B8H] ("We're committed to keeping your personal information safe.").
  15. ELDER, supra note 47, § 2:10. 191. Levit, supra note 128, at 147-48.
  16. ELDER, supra note 47, at § 5:2.
  17. Lewis R. Hagood, Claims of Mental and Emotional Damages in Employment Discrimination Cases, 29 U. MEM. L. REV. 577, 586 (1999) ("[A] majority of the federal courts that have held a plaintiff's own testimony as sufficient to sustain an award of damages for emotional distress usually subject such claims to heightened scrutiny.").
  18. See Citron, Mainstreaming, supra note 36, at 1811-14 (offering examples of mental injuries resulting from privacy intrusions). 195. Id. at 1811.
  19. Keating, supra note 54, at 277 & n.18.