Encryption safe harbours and data breach notification laws


Autoria(s): Burdon, Mark; Reid, Jason F.; Low, Rouhshi
Data(s)

01/10/2010

Resumo

Data breach notification laws require organisations to notify affected persons or regulatory authorities when an unauthorised acquisition of personal data occurs. Most laws provide a safe harbour to this obligation if acquired data has been encrypted. There are three types of safe harbour: an exemption; a rebuttable presumption and factor-based analysis. We demonstrate, using three condition-based scenarios, that the broad formulation of most encryption safe harbours is based on the flawed assumption that encryption is the silver bullet for personal information protection. We then contend that reliance upon an encryption safe harbour should be dependent upon a rigorous and competent risk-based review that is required on a case-by-case basis. Finally, we recommend the use of both an encryption safe harbour and a notification trigger as our preferred choice for a data breach notification regulatory framework.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/37693/

Publicador

Elsevier BV

Relação

http://eprints.qut.edu.au/37693/1/coversheet_37693.pdf

DOI:10.1016/j.clsr.2010.07.002

Burdon, Mark, Reid, Jason F., & Low, Rouhshi (2010) Encryption safe harbours and data breach notification laws. Computer Law and Security Review, 26(5), pp. 520-534.

Direitos

Copyright 2010 Elsevier B.V.

Fonte

QUT Business School; Faculty of Law; Information Security Institute

Palavras-Chave #180199 Law not elsewhere classified #Data breach notification #Encryption #Information security management #Data protection
Tipo

Journal Article