Skip to main content

Speaking Truth to/as Victims – A Jurisprudential Analysis of Data Breach Notification Laws

  • Chapter
  • First Online:
The Responsibilities of Online Service Providers

Part of the book series: Law, Governance and Technology Series ((LGTS,volume 31))

Abstract

This paper analyses Data Breach Notification Duties from a jurisprudential perspective. DBNDs impose duties on people who are victims of a crime, duties whose violation in turn can trigger criminal sanctions. To analyze what type of duties a democratic society under the rule of law can impose on victims, we need a conceptual framework that links duties to participate in crime investigation and prosecution to specific roles a person can have in relation to a crime. Duff and Marshall have developed such a theory of the criminal law, which the paper applies to DBNLs, combining their approach with Floridi’s concept of the infosphere.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    United States v. ChoicePoint, Inc., No. 1:06-CV-0198 (N.D. Ga. Feb. 15, 2006), http://www.ftc.gov/os/caselist/ choicepoint/stipfinaljudgement.pdf; see also Otto et al. (2007).

  2. 2.

    Cal. Civ. Code §§ 1798.29, .82, .84.

  3. 3.

    ibid, Sec 4 1798 .82 a.

  4. 4.

    So e.g. the US Health Information Technology for Economic and Clinical Health Act (HITECH Act) which in additions to information about the facts of the breach (what data, when and, if known, by whom) also mandates information about the steps individuals should take in response to the breach; steps that are carried out to investigate the breach, and steps individual may want to take to mitigate, and protect against further harm.

  5. 5.

    In the US, entities that are regulated under the Gramm-Leach-Bliley Act or the Health Insurance Portability and Accountability Act (HIPAA) and meet their more stringent and prescriptive regulations and guidelines are frequently exempted from DBNLs. See Stevens (2005) p. 6. Use of strong encryption can also create a safe harbour. (Burdon et al. 2010a, b).

  6. 6.

    So in the Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice, 70 Fed. Reg. 15,736 (Mar. 29, 2005), a data breach notification system for the financial sector.

  7. 7.

    Art. 4(3), Directive 2009/136/EC.

  8. 8.

    Commission Regulation (EU) No 611/2013 Art 2 (2).

  9. 9.

    This problem is explicitly acknowledged in the German implementation of the Directive. § 42a S. 6 BDSG ensures that the information cannot be used in criminal proceedings against the company that reported the breach. (However, German law does not recognize a fruit of the poisonous tree doctrine, so information that the prosecutors found themselves after investigating in response to the notification is probably not affected) . However, German law only awards the right against self incrimination to natural persons, so that legal persons such as companies, the typical data controller, will not be protected by this rule.

  10. 10.

    Terrorism Act (2000) Sec 19 (b).

  11. 11.

    28 U.S.C. § 1651.

Bibliography

  • Bentham, J. (1827). Rationale of judicial evidence 1–8. New York: Rothman & Co.

    Google Scholar 

  • Bibas, S. (2002). The right to remain silent helps only the guilty. Iowa Law Review, 88, 421–432.

    Google Scholar 

  • Burdon, M., Low, R. and Reid, J. F.. (2010a). If it’s encrypted it’s secure! The viability of US state-based encryption exemptions. In: Proceedings of the 2010 IEEE International Symposium on technology and society: Social implications of emerging technologies. IEEE http://eprints.qut.edu.au/32781/1/c32781.pdf. Accessed May 2016

  • Burdon, M., Reid, J., & Low, R. (2010b). Encryption safe harbours and data breach notification laws. Computer Law & Security Review, 26, 520–534.

    Article  Google Scholar 

  • Desmedt, Y., Burmester, M., & Seberry, J. (2001). Equitability in retroactive data confiscation versus proactive key Escrow. In K. Kim (Ed.), Public key cryptography (pp. 277–286). Springer: Berlin.

    Chapter  Google Scholar 

  • Draper, A. (2006). Identity theft: Plugging the massive data leaks with a stricter nationwide breach-notification law. Journal Marshall & Law Review, 40, 681–703.

    Google Scholar 

  • Duff, A. (2001). Punishment, communication, and community. New York: Oxford University Press.

    Google Scholar 

  • Duff, A. (2010a). A criminal law for citizens. Theoretical Criminology, 14(3), 293–309.

    Article  Google Scholar 

  • Duff, A. (2010b). The boundaries of the criminal law. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Duff, A. (2015). Legal reasoning, good citizens, and the criminal law. Minnesota legal studies research paper 15–18. Available at SSRN: http://ssrn.com/abstract=2618684 or http://dx.doi.org/10.2139/ssrn.2618684

  • Duff, A., Farmer, L., Marshall, S. E., Renzo, M., & Tadros, V. (2015). Criminalization: the political morality of the criminal law. Oxford: Oxford University Press.

    Google Scholar 

  • Esty, D. C. (2004). Environmental protection in the information age. NYUL Review, 79, 115–212.

    Google Scholar 

  • Floridi, L. (1999). Information ethics: On the philosophical foundation of computer ethics. Ethics and Information Technology, 1, 33–52.

    Article  Google Scholar 

  • Floridi, L. (2002). On the intrinsic value of information objects and the infosphere. Ethics and Information Technology, 4, 287–304.

    Article  Google Scholar 

  • Floridi, L. (2005). Is semantic information meaningful data? Philosophy and Phenomenological Research, 70(2), 351–370.

    Article  Google Scholar 

  • Floridi, L. (Ed.). (2010). The Cambridge handbook of information and computer ethics. Cambridge: Cambridge University Press.

    Google Scholar 

  • Floridi, L. (2015). Tolerant paternalism: Pro-ethical design as a resolution of the Dilemma of toleration. Science and Engineering Ethics, 21, 1–20.

    Article  Google Scholar 

  • Goel, S., & Shawky, H. A. (2014). The impact of federal and state notification laws on security breach announcements. Communications of the Association for Information Systems, 34, 37–50.

    Google Scholar 

  • Hirsch, D. D. (2013). The glass house effect: Big data, the new oil, and the power of analogy. Maine Law Review, 66, 373–396.

    Google Scholar 

  • Kerr, O. (2016). Preliminary thoughts on the Apple iPhone order in the San Bernardino case: Part 2, the All Writs Act https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/02/19/preliminary-thoughts-on-the-apple-iphone-order-in-the-san-bernardino-case-part-2-the-all-writs-act/. Accessed May 2016.

  • Kurzon, D. (1995). The right of silence: A socio-pragmatic model of interpretation. Journal of Pragmatics, 23, 55–69.

    Article  Google Scholar 

  • Lee, S. (2006). Breach notification laws: Notification requirements and data safeguarding now apply to everyone, including entrepreneurs. Entrepreneurial Business Law Journal, 1, 125–153.

    Google Scholar 

  • Leonard, T. C., Thaler, R. H., & Sunstein, C. R. (2008). Nudge: Improving decisions about health, wealth, and happiness. Constitutional Political Economy, 19, 356–360.

    Article  Google Scholar 

  • Marshall, S. (2004). Victims of crime: Their station and its duties. Critical Review of International Social and Political Philosophy, 7, 104–117.

    Google Scholar 

  • Marshall, S. (2015). It isn’t just about you’ victims of crime, their associated. Duties, and public wrongs. In A. Duff, et al. (Eds.), Criminalization: The political morality of the criminal law. Oxford: Oxford University Press.

    Google Scholar 

  • Naess, A. (1973). The shallow and the deep, long-range ecology movement. A summary. Inquiry, 16, 95–100.

    Article  Google Scholar 

  • Needles, S. A. (2009). The data game: Learning to love the state-based approach to data breach notification law. NCL Review, 88, 267–310.

    Google Scholar 

  • Nowey, T., & Federrath, H. (2007). Collection of quantitative data on security incidents. InThe second international conference on availability, reliability and security ARES (pp. 325–334). Vienna: IEEE.

    Chapter  Google Scholar 

  • Otto, P. N., Antón, A. I., & Baumer, D. L. (2007). The choicepoint dilemma: How data brokers should handle the privacy of personal information. IEEE Security and Privacy, 5, 15–23.

    Article  Google Scholar 

  • Sasha, R., & Acquisti, A. (2009). Privacy costs and personal data protection: Economic and legal perspectives. Berkeley Technology Law Journal, 24, 1061–1101.

    Google Scholar 

  • Schneider, J. W. (2009). Preventing data breaches: Alternative approaches to Deter Negligent handling of consumer data. Boston University Journal of Science & Technology Law, 15, 279–304.

    Google Scholar 

  • Schwartz, P. M., & Janger, E. J. (2007). Notification of data security breaches. Michigan Law Review, 105, 913–984.

    Google Scholar 

  • Segall, L. (2015, September 8). Pastor outed on Ashley Madison commits suicide. CNNMoney.

    Google Scholar 

  • Seidmann, D. J., & Stein, A. (2000). The right to silence helps the innocent: A game-theoretic analysis of the Fifth Amendment privilege. Harvard Law Review, 114, 430–510.

    Article  Google Scholar 

  • Simitian, J. (2009). UCB security breach notification symposium March 6, 2009: How a bill becomes a law, really. Berkeley Technology Law Journal, 24, 1009–1018.

    Google Scholar 

  • Skinner, T. H. (2003). California’s database breach notification security act: The first state breach notification law is not yet a suitable template for national identity theft legislation. Richmond Journal Law & Technology, 10, 1–40.

    Google Scholar 

  • Stevens, G. M. (2005). Data security breach notification laws. CRS Report for Congress R42475. https://www.hsdl.org/?view&did=706636. Accessed May 2016

  • Sunstein, C. R. (1999). Informational regulation and informational standing: Akins and beyond. University of Pennsylvania Law Review, 147, 613–675.

    Article  Google Scholar 

  • Towle, H. K. (2003). Identity theft: Myths, methods, and new law. Rutgers Computer & Technology Law Journal, 30, 237–326.

    Google Scholar 

  • Winn, J. K. (2009). Are “Better” security breach notification laws possible? 2–3. Berkley Technology Law Journal, 24, 1133–1165.

    Google Scholar 

  • Wintgens, L. J. (2006). Legisprudence as a new theory of legislation. Ratio Juris, 19, 1–25.

    Article  Google Scholar 

  • Zander, M. (1995). You have no right to remain silent: Abolition of the privilege against self-incrimination in England. Louis ULJ, 40, 659–676.

    Google Scholar 

Download references

Acknowledgement

This work was supported by the Arts and Humanities Research Council [grant number AH/M009610/1]

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Burkhard Schafer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Schafer, B. (2017). Speaking Truth to/as Victims – A Jurisprudential Analysis of Data Breach Notification Laws. In: Taddeo, M., Floridi, L. (eds) The Responsibilities of Online Service Providers. Law, Governance and Technology Series, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-319-47852-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47852-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47851-7

  • Online ISBN: 978-3-319-47852-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics