If it's encrypted it's secure! The viability of US state-based encryption exemptions
Contribuinte(s) |
Michael, Katina |
---|---|
Data(s) |
2010
|
Resumo |
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level. |
Formato |
application/pdf |
Identificador | |
Publicador |
IEEE |
Relação |
http://eprints.qut.edu.au/32781/1/c32781.pdf http://www.uow.edu.au/conferences/2010/ISTAS/home/index.htm Burdon, Mark, Low, Rouhshi, & Reid, Jason F. (2010) If it's encrypted it's secure! The viability of US state-based encryption exemptions. In Michael, Katina (Ed.) Proceedings of the 2010 IEEE International Symposium on technology and society : Social Implications of Emerging Technologies, IEEE, University of Wollongong, New South Wales, pp. 96-102. |
Direitos |
Copyright 2010 IEEE/theAuthors Copyright c2010 ISTAS Program Committee Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the Publisher. |
Fonte |
QUT Business School; Faculty of Law; Faculty of Science and Technology; Information Security Institute; School of Law; School of Accountancy |
Palavras-Chave | #089999 Information and Computing Sciences not elsewhere classified #189999 Law and Legal Studies not elsewhere classified #Data breach #Encryption #Data breach notification laws #Encryption exemption #Encryption safe harbours |
Tipo |
Conference Paper |