Reference Hub1
Data Breach Disclosure: A Policy Analysis

Data Breach Disclosure: A Policy Analysis

Melissa Dark
Copyright: © 2012 |Pages: 27
ISBN13: 9781613503232|ISBN10: 1613503237|EISBN13: 9781613503249
DOI: 10.4018/978-1-61350-323-2.ch302
Cite Chapter Cite Chapter

MLA

Dark, Melissa. "Data Breach Disclosure: A Policy Analysis." Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2012, pp. 430-456. https://doi.org/10.4018/978-1-61350-323-2.ch302

APA

Dark, M. (2012). Data Breach Disclosure: A Policy Analysis. In I. Management Association (Ed.), Cyber Crime: Concepts, Methodologies, Tools and Applications (pp. 430-456). IGI Global. https://doi.org/10.4018/978-1-61350-323-2.ch302

Chicago

Dark, Melissa. "Data Breach Disclosure: A Policy Analysis." In Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 430-456. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-323-2.ch302

Export Reference

Mendeley
Favorite

Abstract

As information technology has become more ubiquitous and pervasive, assurance and security concerns have escalated; in response, we have seen noticeable growth in public policy aimed at bolstering cybertrust. With this growth in public policy, questions regarding the effectiveness of these policies arise. This chapter focuses on policy analysis of the state data breach disclosure laws recently enacted in the United States. The state data breach disclosure laws were chosen for policy analysis for three reasons: the rapid policy growth (the United States have enacted 45 state laws in 6 years); this is the first instantiation of informational regulation for information security; and the importance of these laws to identity theft and privacy. The chapter begins with a brief history in order to provide context. Then, this chapter examines the way in which historical, political and institutional factors have shaped our current data breach disclosure policies, focusing on discovering how patterns of interaction influenced the legislative outcomes we see today. Finally, this chapter considers: action that may result from these policies; the action type(s) being targeted; alternatives that are being considered, and; potential outcomes of the existing and proposed alternative policies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.