Access your Pro+ Content below.
The ongoing debate over a federal breach notification law
This article is part of the Information Security magazine issue of December 2011
Here we go again. Every year it seems there’s at least one federal bill to create a national data breach notification standard. This year, there’s at least five in the mix. The renewed push by lawmakers isn’t surprising given the raft of high-profile security breaches this year involving Sony, Epsilon and others. But whether any of their bills actually become law is a huge question mark. These proposals always fade away, hammered down by partisan wrangling that pits business interests against consumer interests. Movement towards a federal breach notification law started fairly soon after California enacted its groundbreaking security breach disclosure law, known as SB1386, in 2002. Since then, 46 states have passed some form of breach notification requirement, creating a maze of laws that companies must navigate in the event of a breach. A national law would supersede the patchwork of state laws. This fall, the Senate Judiciary Committee approved three bills that would create a national data breach notification standard. The ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Companies need to factor security risks and incidents in their financial disclosures, agency says.
As the relative security of passwords falters, are they destined for obscurity?
EDRM brings users into security more than any other tool. Are you ready?
Researcher tells a firsthand account of her experience as a member of the final security review team for Windows Vista.
Columns in this issue
Lawmakers continue to wrangle over creation of a national data breach notification standard.
If you’re going to lure topnotch talent, refine your skills.
Cloud computing needs security standards and widely adopted security practices in order to become a viable choice for the enterprise.