[Infowarrior] - Do Breach Notification Laws Work?

Richard Forno rforno at infowarrior.org
Thu Mar 12 11:47:43 UTC 2009


Do Breach Notification Laws Work?
By Kim Zetter EmailMarch 09, 2009 | 9:00:00 AM

http://blog.wired.com/27bstroke6/2009/03/experts-debate.html

Consumers caught in a national epidemic of data spills are growing  
numb, discarding breach notification letters as junk mail rather than  
acting to protect their identity, experts say.

And though most states now have laws requiring companies to warn  
breach victims, some serious breaches are still showing up on customer  
credit and bank statements before any official warning has been  
issued. It all begs the question: are the notification laws working?

This was the question that a number of speakers at the Security Breach  
Notification seminar held in Berkeley on Friday (at right) tried to  
answer.

When California passed the first data breach notification law in 2003,  
it quickly became the defacto standard for the rest of the country. A  
total of 44 states now have breach notification laws, which vary only  
slightly in their definitions of what constitutes a breach that  
requires notification and what companies must do when they experience  
a breach.

It's clear that the laws have made the public more aware of breaches  
and the vulnerability of their data, and have exposed poor security  
practices at many businesses. A 2005 study by the FBI showed that in  
the absence of a legal requirement to report breaches, only 20 percent  
of firms would report serious breaches to law enforcement.

But beyond this transparency benefit, speakers said, it's unclear what  
other benefits the laws have had. There are even suggestions that the  
laws have had some detrimental effects on consumers and companies.

Breach notifications should, theoretically, reduce the number of  
incidents of identity theft or fraudulent charges to credit cards if  
consumers take proper precautions once they receive a notification --  
such as placing a fraud alert or freeze on their credit account and  
monitoring their account bills and statements for suspicious  
transactions.

But in some cases, customers discover fraudulent charges on their  
cards or become victims of identity theft before a company is even  
aware its computers have been breached, making the breach notification  
redundant for those consumers.

There's also the "cry-wolf" effect.

As notifications have become more ubiquitous -- 55 percent of  
respondents in a survey by the Ponemon Institute last year said they'd  
received two or more notices within 24 months -- many consumers have  
become inured to them, simply tossing them in the trash rather than  
acting on them to protect their identity.

When the Choicepoint datamining company was breached in 2004 -- the  
breach that put California's breach notification law on the map -- the  
company offered credit protection and monitoring services to those  
whose information had been compromised. But the company later said  
that fewer than 10 percent of 163,000 people called Choicepoint to  
take advantage of the offer.

Consumers have often complained that notification letters provide no  
clear instructions for what they can or should do to protect  
themselves after their information has been breached and therefore  
many take no action to protect themselves after being notified that  
their information was breached.

According to a study (.pdf) conducted by Alessandro Acquisti,  
professor of information technology and public policy at Carnegie  
Mellon University, and his grad student Sasha Romanosky, there are  
arguments to be made both in support of and against breach laws.

On the one hand, data breach laws are helpful in leading companies to  
install encryption and to devise new access controls and auditing  
measures on their networks. They also lower consumer losses and  
damages in terms of time and money, although the researchers offered  
no statistics on this.

On the other hand, they said, the laws cause firms and consumers to  
incur what could be deemed unnecessary costs in the face of unclear  
risks. They pointed to the Ponemon survey, which found that only 2  
percent of respondents who said their information had been breached  
experienced identity theft as a result of the breach. This would mean  
that money spent on credit monitoring services in these cases would do  
little but enrich the monitoring services.

[It's worth noting that this low rate of identity theft was touted  
heavily by the Ponemon Institute when it released its study last year.  
But the same survey also found that 64 percent of respondents were  
unsure if they'd been a victim of identity theft -- showing how  
unreliable surveys on identity theft can be. Most victims don't know  
they're victims until they try to take out a loan or find themselves  
placed in collection for failure to pay a bill. And sometimes  
criminals hold onto data a year or more after a breach before they use  
it, meaning that consumers whose data is stolen may report that the  
breach didn't result in identity theft for them when in fact it may  
show up at a later date.]

When it comes to reducing identity theft rates, it's hard to know what  
effect the laws are having. The researchers examined statistics from  
the U.S. Federal Trade Commission for identity theft rates between  
2002 -- before breach laws were passed -- and 2007, and found only  
about a 2 percent reduction in identity theft incidents related to  
data breaches in 2005.

But they cautioned that the data is inconclusive, particularly because  
it's often difficult to correlate an incident of identity theft with a  
specific breach for the reasons I mentioned above -- that criminals  
will sometimes hold on to stolen data a year or more before trying to  
use it, making the rate of identity theft appear to go down when it's  
really only delayed. There's also a problem with the FTC data itself,  
since it represents only incidents of identity theft that consumers  
report to the FTC, not actual incidents of identity theft.

There are additional questions worth asking about what effect breach  
notifications have on the relationship between customers and the  
breached entity. Consumers often express anger and mistrust toward  
companies that lose their data, but it's unclear how often that anger  
translates to action. According to Deirdre Mulligan, a professor of  
information technology law and policy at UC Berkeley's School of  
Information, a Ponemon study found that about 20 percent of  
respondents claimed to have terminated their relationship with a  
company after discovering that the company experienced a breach.

But a separate survey of companies found that the percentage of  
customers who actually do terminate their relationship with a company  
is less than 7 percent. Both numbers should be taken with a grain of  
salt, , however. Consumers, Mulligan told Threat Level, have a  
tendency to say they're going to do one thing when they actually do  
another, and companies also can't be relied on to honestly report the  
numbers of customers they lose from a breach.

All of this leads to the main takeaway from Friday's seminar -- data  
on breach notifications and their after-effects is still very poor and  
unreliable. In fact, this seemed to be the refrain from most of the  
speakers. There just isn't enough evidence to show definitively one  
way or another yet whether notification laws have been a boon or a bain.


More information about the Infowarrior mailing list