Information Disclosure as a light-weight regulatory mechanism

advertisement
Information Disclosure as a light-weight
regulatory mechanism
DIMACS
Deirdre K. Mulligan
Director, Samuelson Law, Technology & Public Policy Clinic
Clinical Professor of Law
Boalt Hall School of Law
Information School
University of California
If you build it they will come…
or maybe not…
The existence of technology solutions on
their own does not improve security or
privacy.
Creating incentives for security
Security failures

FTC Federal Advisory Committee on Online Access
and Security (2000)
–
Underinvestment in security


–
Relatively non-existent security market

–
–
Missing data points
4 options
2 preferred



Numerous breaches every year
Consumers/regulators largely unaware
Maintain a security program
“appropriate under the circumstances” duty of care
Problem: How to create a flexible duty of care
–
–
Legislation/regulation, industry self-reg, courts, tort, media
Limitations on all…
Creating a flexible duty of care

Findings from Emergency Planning and Community
Right-to-Know Act (EPCRA)
–
–
–

Huge drops in releases (EPA estimated 40%, but likely less)
Operational changes within companies
Remarkable changes from lighter, less costly approach
Why?
–
–
Incentives
Enabled





benchmarking, rationalizing of investment
Democratic participation
Collaborative decision making
Risk assessment (insurance/investment)
Provoked a race to the top
–
–
Avoided one size fits all, top-down, hard to adapt standards
Provided incentive structure to develop internal processes to
manage risk, improved tools available to management
Creating a flexible duty of care


Traditional Regulation
Information Disclosure
–
Emergency Planning and Community Right-to-Know Act
(EPCRA)



Gets government out of the middle
Widely copied model
Sunlight as disinfectant
–
–
Rhetoric

–
FOIA, FACA…
Private action
Reality

Drive performance through transparency and public oversight
–
Wide range of players able to use information for various purposes
California


What happens if we apply this to security
Privacy as pollution
–

Industrial society  information society
History of Security Breach Disclosure
–
–
–
–
–
SB 1386 (Simitian/Peace)
Effect July 2003
Eye opening
32+ other states follow
Federal legislation on 2007 Congressional agenda
(Feinstein)
Role of policy in creating incentives

Effects of Security Breach laws
–
More information

–
–
–
Broad reach -- electronic data
Privacy laws highly fragmented, sectoral, difficult to adjust
Security process focused  lacking performance metrics


–
Absent legal requirement only 20% of firms will report serious breaches
(FBI/CSI 2005)
We have no proof that process produces good outcomes
Don’t know how to measure security, but this introduces at least one
measure of failure which….
Put a price tag on failure







Average cost $182 per person (Ponemon 2006)
$75 per notice
Remedial services (credit monitoring etc.)
Heightened churn rates
Public relations, unwanted attention from AGs, FTC, trial lawyers
Effects stock prices to some extent (Acquisti et. al.)
Influences insurance, ratings etc. (possibly)
Role of policy in creating incentives

Effects of Security Breach laws con’t
–
Altered assessments of investment

–
Altered attention within institutions? anecdotal





–
“encryption of data done in advance of a breach may now be cost
effective…” -- L. Sotto
Security audits
Elimination of non-necessary personal information
Bifurcated databases
Tighter access control
Attention to risks of portable devices and media
Individual activity

Potentially greater use of
–
–
–
credit monitoring
Opt-out lists
Privacy hygiene
Predictions?

Success of EPCRA
–
–
–
–
–
structured information
Widely available
NGOs repackaging and recontextualizing
Regulatory agencies with substantive responsibility for issue
Result -- wide range of uses





Individual empowerment
Policy reforms
Self regulatory efforts
Internal reforms
Does it translate?
Predictions?

Limitations of Security Breach Legislation
–
–
–
–
No standard information
Severity of breaches sometimes unclear
Rarely centralized reporting (notice to individuals)
NGOs not activated around this data


–
–
push for federal legislation was silly, no need for it
No one is leveraging the data
No regulatory agency(ies) with substantive responsibility
Predict -- more limited effect

Individual empowerment-- some, but limits on shopping with feet
–



Lots of third-party leaks which consumers can’t shop for
Policy reforms -- maybe, little reflection on effects, benefits, arguing over
harm to consumers rather than focusing on benefits to computer
security within firms
Self regulatory efforts -- uncertain
Internal reforms -- yes, but not well documented
Research

Notices
–
–
110 analyzing for breach type, relationship to consumer,
remedial measures, disclosure practices
What are the causes of breaches

Identify strategic measures to address
–

Policy, technical, procedural, educational
Qualitative interviews
–
–
Organizational behavior literature
CSOs on SB 1386

–
Related to current project on CPOs
What policies yield what changes in organizations



Investment, staffing, process and procedure, technology
acquisition, product development, priority in organization etc.
Compliance v. compliance plus
Which produce race to the top in context of security?
Research Team
Deirdre K. Mulligan, Clinical Professor
Chris Jay Hoofnagle, Senior Fellow and Senior
Attorney
Olive Huang ph.d / j.d.
Drew Lewis undergraduate
Download