Risk and Anxiety: A Theory of Data Breach Harms
2016, SSRN Electronic Journal
https://doi.org/10.2139/SSRN.2885638Abstract
for their research assistance. We are grateful to the editors of the Texas Law Review for their superb assistance.
References (19)
- J. Craig Anderson, Identity Theft Growing, Costly to Victims, USA TODAY (Apr. 14, 2013), http://www.usatoday.com/story/money/personalfinance/2013/04/14/identity-theft-growing/ 2082179/ [https://perma.cc/7T5Q-DTHH].
- BUREAU OF JUST. STAT., U.S. DEP'T OF JUST., NCJ 243779, VICTIMS OF IDENTITY THEFT, 2012, at 7 (2013), https://www.bjs.gov/content/pub/pdf/vit12.pdf [https://perma.cc/773U-SHVT]. 113. Id.
- Thomas Clifford, Note, Provider Liability and Medical Identity Theft: Can I Get Your (Insurance) Number?, NW. J.L. & SOC. POL'Y, Fall 2016, at 45, 45. 115. BUREAU OF JUST. STAT., supra note 112, at 6. 116. Id. at 10.
- See Andrea Peterson, Data Exposed in Breaches Can Follow People Forever. The Protections Offered in Their Wake Don't., WASH. POST (June 15, 2015), http://www.washingtonpost.com/blogs/the-switch/wp/2015/06/15/data-exposed-in-breaches-can- follow-people-forever-the-protections-offered-in-their-wake-dont/ [https://perma.cc/JBF5-4K6X] (explaining that card providers quickly identify and replace at-risk card numbers).
- Id.
- See, e.g., Tara Siegel Bernard et al., Equifax Says Cyberattack May Have Affected 143 Million in the U.S., N.Y. TIMES (Sept. 7, 2017), https://www.nytimes.com/2017/09/07/ business/equifax-cyberattack.html?hp&action=click&pgtype=Homepage&clickSource=story- heading&module=first-column-region®ion=top-news&WT.nav=top-news [https://perma.cc/ D9E6
- -BXGW] (discussing the 2017 Equifax cyberattack that resulted in a breach of sensitive consumer information);
- Rishi Iyengar, Hackers Release Data from Cheating Website Ashley Madison Online, TIME (Aug. 18, 2015), http://time.com/4002647/ashley-madison-hackers-data- released-impact-team/?iid=sr-link1 [https://perma.cc/37Y3-WHAP] (detailing the 2015 data breach of Ashley Madison that revealed members' personal and financial data);
- Maggie McGrath, Target Data Breach Spilled Info On As Many As 70 Million Customers, FORBES (Jan. 10, 2014), https://www.forbes.com/sites/maggiemcgrath/2014/01/10/target-data-breach-spilled-info-on-as- many-as-70-million-customers/#528bf61ee795 [https://perma.cc/XQ6V-GUSK] (reporting on the breach of customer information at Target in late 2013).
- See How to Keep Your Personal Information Secure, FED. TRADE COMM'N: CONSUMER INFO. (July 2012), https://www.consumer.ftc.gov/articles/0272-how-keep-your-personal- information-secure [https://perma.cc/H7QF-JZN3] (detailing suggestions for protecting personal information to avoid identity theft).
- Id.
- See, e.g., AMAZON WEB SERVS., AMAZON WEB SERVICES: OVERVIEW OF SECURITY PROCESSES 1 (2017), https://d0.awsstatic.com/whitepapers/Security/AWS_Security_
- Whitepaper.pdf [https://perma.cc/8KR8-QQFT] ("Helping to protect the confidentiality, integrity, and availability of our customers' systems and data is of the utmost importance . . . .");
- This Is How We Protect Your Privacy, APPLE INC., https://www.apple.com/privacy/approach-to-privacy/ [https://perma.cc/ZQC8-4B8H] ("We're committed to keeping your personal information safe.").
- ELDER, supra note 47, § 2:10. 191. Levit, supra note 128, at 147-48.
- ELDER, supra note 47, at § 5:2.
- Lewis R. Hagood, Claims of Mental and Emotional Damages in Employment Discrimination Cases, 29 U. MEM. L. REV. 577, 586 (1999) ("[A] majority of the federal courts that have held a plaintiff's own testimony as sufficient to sustain an award of damages for emotional distress usually subject such claims to heightened scrutiny.").
- See Citron, Mainstreaming, supra note 36, at 1811-14 (offering examples of mental injuries resulting from privacy intrusions). 195. Id. at 1811.
- Keating, supra note 54, at 277 & n.18.