If it's encrypted it's secure! The viability of US state-based encryption exemptions


Autoria(s): Burdon, Mark; Low, Rouhshi; Reid, Jason F.
Contribuinte(s)

Michael, Katina

Data(s)

2010

Resumo

US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/32781/

Publicador

IEEE

Relação

http://eprints.qut.edu.au/32781/1/c32781.pdf

http://www.uow.edu.au/conferences/2010/ISTAS/home/index.htm

Burdon, Mark, Low, Rouhshi, & Reid, Jason F. (2010) If it's encrypted it's secure! The viability of US state-based encryption exemptions. In Michael, Katina (Ed.) Proceedings of the 2010 IEEE International Symposium on technology and society : Social Implications of Emerging Technologies, IEEE, University of Wollongong, New South Wales, pp. 96-102.

Direitos

Copyright 2010 IEEE/theAuthors

Copyright c2010 ISTAS Program Committee Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the Publisher.

Fonte

QUT Business School; Faculty of Law; Faculty of Science and Technology; Information Security Institute; School of Law; School of Accountancy

Palavras-Chave #089999 Information and Computing Sciences not elsewhere classified #189999 Law and Legal Studies not elsewhere classified #Data breach #Encryption #Data breach notification laws #Encryption exemption #Encryption safe harbours
Tipo

Conference Paper