Getting It Right on Data Security and Breach Notification Legislation in the 114th Congress


Book Description

Getting it right on data security and breach notification legislation in the 114th Congress : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 5, 2015.




Getting It Right on Data Security and Breach Notification Legislation in the 114th Congress


Book Description

Getting it right on data security and breach notification legislation in the 114th Congress : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 5, 2015.




Getting It Right on Data Security and Breach Notification Legislation in the 114th Congress


Book Description

Recent high profile data breaches as well as the headline grabbing Sony cyberattack from late 2014 are the latest examples that highlight the ongoing and serious cyber threats that face Americans and businesses. The purpose of this hearing is to examine the merits of the Federal data security standard and the need for preemptive and uniform Federal data breach notification. We all know we live in a digital world where consumers have embraced online products and services. Kansans, my folks at home, they know they can make purchases, determine their credit score, conduct banking and examine health care plans all from a mobile phone, computer, or a tablet. That is true of consumers across the country and increasingly around the globe. This digital economy creates new risks. As of 2015, the Privacy Rights Clearinghouse has estimated more than 4,400 breaches involving more than 932 million records that have been made public since 2005. In a world where one bad actor can battle against a team of highly trained experts, we face challenges to make certain that consumers are protected and that businesses have the tools and incentives to protect their customers from harm.










Data Security


Book Description

Security breaches involving electronic personal data have come to light largely as a result of the California Security Breach Notification Act, a California notification law that went into effect in 2003. In response, the states and some Members have introduced bills that would require companies to notify persons affected by such security breaches. By December 2005, 35 states had introduced data security legislation and 22 states had enacted data security laws.




Federal Information Security and Data Breach Notification Laws


Book Description

When polluted air mixes with rain, snow, and fog, acid precipitation forms. This acidity has caused people to worry about the environment. Another concern is its effect on historic buildings and monuments. This booklet focuses on acid rain and its impact on our Nation¿s capital. In 1997, rain in Washington, D.C., had an average acidity of 4.2, about as acid as a carbonated drink and more than 10 times as acid as clean, unpolluted rain. This booklet defines acid rain, explains what effects it has on marble and limestone buildings, and shows, on a walking tour, some of the places in our Nation¿s capital where you can see the impact of acid precipitation. Includes a Glossary of Geologic and Architectural Terms and a map. Color photos.







Beyond Snowden


Book Description

Safeguarding Our Privacy and Our Values in an Age of Mass Surveillance America’s mass surveillance programs, once secret, can no longer be ignored. While Edward Snowden began the process in 2013 with his leaks of top secret documents, the Obama administration’s own reforms have also helped bring the National Security Agency and its programs of signals intelligence collection out of the shadows. The real question is: What should we do about mass surveillance? Timothy Edgar, a long-time civil liberties activist who worked inside the intelligence community for six years during the Bush and Obama administrations, believes that the NSA’s programs are profound threat to the privacy of everyone in the world. At the same time, he argues that mass surveillance programs can be made consistent with democratic values, if we make the hard choices needed to bring transparency, accountability, privacy, and human rights protections into complex programs of intelligence collection. Although the NSA and other agencies already comply with rules intended to prevent them from spying on Americans, Edgar argues that the rules—most of which date from the 1970s—are inadequate for this century. Reforms adopted during the Obama administration are a good first step but, in his view, do not go nearly far enough. Edgar argues that our communications today—and the national security threats we face—are both global and digital. In the twenty first century, the only way to protect our privacy as Americans is to do a better job of protecting everyone’s privacy. Beyond Surveillance: Privacy, Mass Surveillance, and the Struggle to Reform the NSA explains both why and how we can do this, without sacrificing the vital intelligence capabilities we need to keep ourselves and our allies safe. If we do, we set a positive example for other nations that must confront challenges like terrorism while preserving human rights. The United States already leads the world in mass surveillance. It can lead the world in mass surveillance reform.




Digital Contact Tracing for Pandemic Response


Book Description

As nations race to hone contact-tracing efforts, the world's experts consider strategies for maximum transparency and impact. As public health professionals around the world work tirelessly to respond to the COVID-19 pandemic, it is clear that traditional methods of contact tracing need to be augmented in order to help address a public health crisis of unprecedented scope. Innovators worldwide are racing to develop and implement novel public-facing technology solutions, including digital contact tracing technology. These technological products may aid public health surveillance and containment strategies for this pandemic and become part of the larger toolbox for future infectious outbreak prevention and control. As technology evolves in an effort to meet our current moment, Johns Hopkins Project on Ethics and Governance of Digital Contact Tracing Technologies—a rapid research and expert consensus group effort led by Dr. Jeffrey P. Kahn of the Johns Hopkins Berman Institute of Bioethics in collaboration with the university's Center for Health Security—carried out an in-depth analysis of the technology and the issues it raises. Drawing on this analysis, they produced a report that includes detailed recommendations for technology companies, policymakers, institutions, employers, and the public. The project brings together perspectives from bioethics, health security, public health, technology development, engineering, public policy, and law to wrestle with the complex interactions of the many facets of the technology and its applications. This team of experts from Johns Hopkins University and other world-renowned institutions has crafted clear and detailed guidelines to help manage the creation, implementation, and application of digital contact tracing. Digital Contact Tracing for Pandemic Response is the essential resource for this fast-moving crisis. Contributors: Joseph Ali, JD; Anne Barnhill, PhD; Anita Cicero, JD; Katelyn Esmonde, PhD; Amelia Hood, MA; Brian Hutler, Phd, JD; Jeffrey P. Kahn, PhD, MPH; Alan Regenberg, MBE; Crystal Watson, DrPH, MPH; Matthew Watson; Robert Califf, MD, MACC; Ruth Faden, PhD, MPH; Divya Hosangadi, MSPH; Nancy Kass, ScD; Alain Labrique, PhD, MHS, MS; Deven McGraw, JD, MPH, LLM; Michelle Mello, JD, PhD; Michael Parker, BEd (Hons), MA, PhD; Stephen Ruckman, JD, MSc, MAR; Lainie Rutkow, JD, MPH, PhD; Josh Sharfstein, MD; Jeremy Sugarman, MD, MPH, MA; Eric Toner, MD; Mar Trotochaud, MSPH; Effy Vayena, PhD; Tal Zarsky, JSD, LLM, LLB