- Title
- The importance of mandatory data breach notification to identity crime
- Creator
- Holm, Eric; Mackenzie, Geraldine
- Date
- 2014
- Type
- Text; Conference proceedings
- Identifier
- http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/76386
- Identifier
- vital:7534
- Identifier
-
https://doi.org/10.1109/CyberSec.2014.6913963
- Abstract
- The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identity crime. Initiatives around data breach notification have become increasingly prevalent and are now seen in many State legislatures in the United States and overseas. The Australian Government is currently in the process of introducing mandatory data breach notification laws. This paper explores the introduction of mandatory data breach notification in Australia, and lessons learned from the experience in the US, particularly noting the link between data breaches and identity crime. The paper proposes that through the introduction of such laws, identity crimes are likely to be reduced.
- Publisher
- Institute of Electrical and Electronics Engineers Inc.
- Rights
- Copyright ©2014 IEEE
- Rights
- Open Access
- Rights
- This metadata is freely available under a CCO license
- Subject
- data breaches; identity crime; mandatory breach reporting; privacy; Crime; Data privacy; Australia; Data breach notifications; Government IS; Identity crimes; Personal identification; State legislatures; Computer crime
- Full Text
- Hits: 3476
- Visitors: 4248
- Downloads: 859
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE1 | Published version | 2 MB | Adobe Acrobat PDF | View Details Download | ||
View Details Download | SOURCE2 | Accepted version | 135 KB | Adobe Acrobat PDF | View Details Download |