Title :
If it´s encrypted its secure! The viability of US state-based encryption exemptions
Author :
Burdon, Mark ; Low, Rouhshi ; Reid, Jason
Author_Institution :
Queensland Univ. of Technol., Brisbane, QLD, Australia
Abstract :
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC´s proposed encryption safe harbour in relation to the US experience at the state legislature level.
Keywords :
cryptography; data analysis; data privacy; Australian Law Reform Commission; Privacy Act 1988; US state-based data breach notification law; data encryption; information security; personal information encryption; state legislature; unauthorized acquisition; Australia; Authorization; Computer crime; Cryptography; Data privacy; Data security; Information security; Law; Protection; US Government;
Conference_Titel :
Technology and Society (ISTAS), 2010 IEEE International Symposium on
Conference_Location :
Wollongong, NSW
Print_ISBN :
978-1-4244-7777-7
DOI :
10.1109/ISTAS.2010.5514647