advertisement
advertisement

This is page 2 of:

Breach Notification: What Does “As Soon As Possible” Mean? And Why It May Not Be Wise To Comply

March 15th, 2011

If you are told that your personal information (name, address, social security number) has been compromised, then you will need to run credit reports, have full credit freezes and generally look for signs of ID fraud.

The problem for companies suffering a data breach is that the law requires notification as soon as possible—whether that is good for the customer or not. That Ponemon report offered some interesting numbers, although the methodologies behind these types of reports is highly suspect. Ponemon said that 43 percent of companies notified data breach victims within one month of discovery of the breach last year, a figure that had been 36 percent the year before.

You would think this would decrease overall retail costs and liabilities, but no. Indeed, the report claimed that those who responded quickly in 2010 had a per-record cost of $268, up $49 from the $219 of the year before. Conversely, the “slow responders” paid $174 per record, down $22 from 2009.

What was the report’s rationale? “Moving too quickly through the data breach process may cause cost inefficiencies for the organization, especially during the detection, escalation and notification phases. The notable increase in companies responding quickly to breaches, despite the additional cost, may reflect pressure companies feel to comply with commercial regulations and state and federal data protection laws.”

This suggests that companies are trying to do what they believe is both the “right thing” and what the law requires with respect to data breaches. Many laws require companies to “promptly” notify data subjects of the breach or potential breach of their personal information, and some states may further define both what constitutes “promptly” and the manner in which such notifications must be made. Most state laws also have a law enforcement exemption—that is, you are permitted to delay or defer notification if you are requested to do so by law enforcement.

The problem with that exception is it’s a Holland Tunnel size loophole. Why? Law enforcement—whether it’s police, FBI or, especially, the Secret Service—love to keep details as quiet as possible for as long as possible. In a chase for cyberthieves, you want the suspects kept in the dark as long as possible. If it’s at all possible to have the suspects think the attack hasn’t been detected yet, they may be more easily caught if the thieves get careless.

None of this means that delay is always—or even usually—the appropriate response. Remember that the purpose of notification is to allow the data subjects to mitigate their (and indirectly the retailer’s) damages. What companies should be doing is following normal procedures to determine the scope, nature and extent of a breach, the nature of the data subject to the breach, the time that has already elapsed from the date that the information has been presumably compromised, and the date the entity became aware of the breach, and then make a rational, informed and justifiable decision about when, how, and who to notify.

In Douglas Adams’ Hitchhiker’s Guide to the Galaxy, Ford Prefect advises, “Don’t Panic.” That advice works as well in law as in intergalactic transportation.

If you disagree with me, I’ll see you in court, buddy. If you agree with me, however, I would love to hear from you.


advertisement

Comments are closed.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.