2014
DOI: 10.1111/jels.12035
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Analysis of Data Breach Litigation

Abstract: Legal privacy scholarship has typically emphasized the various ways in which plaintiffs fail when bringing legal actions against entities when their personal information is lost or stolen. However, this scholarship is based on a limited set of published judicial opinions about large-scale data breaches. Little is actually known about the characteristics and disposition of a representative set of data breach lawsuits. Using a unique sample of manually-collected data from PACER, we analyze the court dockets of o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
54
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 114 publications
(59 citation statements)
references
References 29 publications
0
54
0
Order By: Relevance
“…These consumer actions should also be comforting to breached firms that are providing such assistance. Given that past research has shown that firms are less likely to be sued when they provide credit monitoring (Romanosky, Hoffman, and Acquisti, 2014), higher acceptance rates will likely further help reduce civil litigation costs.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…These consumer actions should also be comforting to breached firms that are providing such assistance. Given that past research has shown that firms are less likely to be sued when they provide credit monitoring (Romanosky, Hoffman, and Acquisti, 2014), higher acceptance rates will likely further help reduce civil litigation costs.…”
Section: Discussionmentioning
confidence: 99%
“…A NetDiligence study using anonymous cyber insurance claim data from 2014 reported that personal information was the most frequently exposed type of data (41 percent of breaches, n = 117), followed by personal health information (21 percent) and then credit card information (19 percent) (NetDiligence, 2014). Further, Romanosky, Hoffman, and Acquisti, 2014, found that the most-common personal information stolen was name, address, and Social Security number (77 percent of breaches, n = 1,772), followed by credit card and health information (12 percent). 18 We cannot comment on the absolute percentage of respondents who lost such information because of the potential overlap between discrete categories of information.…”
Section: Health Information 21mentioning
confidence: 99%
See 1 more Smart Citation
“…Different countries in the world use different definitions of personal data and apply different rules governing its collection and use. As a result, businesses operating in a digital economy without borders are exposed to legal and enforcement risks (Romanosky et al 2012 ) that are hard to quantify. Other liabilities arise from the risk that large collections of personal data become targets of cybercrime, in particular when they include identifying or financial information.…”
Section: Why Personal Data Markets Mattermentioning
confidence: 99%
“…For example, individuals may suffer from discrimination or identity theft. Likewise, organizations may suffer from negative publicity, fines or other sanctions [18]. Hence, this data must be anonymized before being shared for analysis.…”
Section: Introductionmentioning
confidence: 99%