SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
2015 CONGRESSIONAL DATA SECURITY AGENDA: 
A TO-DO LIST FOR THE 114TH CONGRESS 
Introduction 
Rarely does a week go by without the announcement of another major data breach that has 
put thousands, or even millions of consumers at risk of fraud. From malicious use of 
compromised credit and debit cards, to increased identity theft risk to drained bank accounts, 
the threats are real and impact millions of consumers. 
While malicious hacking has been a problem since the dawn of the Internet Age, the 
unprecedented interconnectedness of our marketplace combined with an increasingly 
organized and skillful cyber criminal underground threatens consumer trust in the 
marketplace. A key challenge for the incoming 114th Congress will be to implement long-needed 
reforms that will protect American consumers personal data from malicious use by 
criminal hackers. 
For too long, inertia and fear of unintended consequences has prevented serious legislative 
efforts to address data insecurity in all but the most sensitive arenas. However, there is 
practically no piece of data that, when compromised, cannot be monetized at the expense of 
consumers nationwide. It is for this reason that NCL, is calling on our elected leaders to heed 
the call of millions of consumers to adopt the Congressional Data Security Agenda in the next 
Congress. 
The agenda items below represent ideas that have already been adopted in many states and 
should be applied nationally. Additionally, economic incentives that promote the adoption of 
strong cybersecurity safeguards by private enterprise are common-sense solutions. Finally, 
enforcement should be beefed up, with expert agencies given the tools they need to protect 
the growing amount of valuable consumer data coursing through the marketplace today. 
2015 Congressional Data Security Agenda 
Create a strong national data breach notification standard 
When a breach occurs, consumers should be made aware of the threat to their important 
personal information. Modeled on strong state notification laws such as California’s, a 
national data breach notification standard would ensure that all consumers would benefit 
from this protection. It would also put companies on notice that data breaches will not go 
unreported. 
Require data holders to abide by reasonable data security requirements 
Under existing law, companies collecting health and financial data are already required to 
institute reasonable data security measures. Ten states have already passed comprehensive 
data security standards. Given the multitude of ways that other sensitive data can be misused 
by cybercriminals, it is important that all data collected and stored about consumers be 
protected.
Clarify and strengthen the FTC’s data security authority 
The Federal Trade Commission is the primary cop on the beat when it comes to holding 
organizations accountable for protecting consumers’ data, bringing more than fifty data 
security actions. However, the Commission’s authority in this area has been called in to 
question in the courts. In addition, the Commission lacks civil penalty authority. By clarifying 
its role and giving its actions real teeth, Congress can give consumers greater confidence in 
their data’s security. 
Promote robust cyber-insurance underwriting standards 
Even with strong cybersecurity defenses, organizations can still be hacked. When breaches 
happen, consumers should be made whole for the increased risk of identity theft and other 
harm they sustain as a result of the breach. Promoting a rigorous cyber insurance market will 
also incentivize the creation of underwriting standards that can adapt to changing cyber 
threats more quickly that proscriptive government regulations. 
Increase federal civil and criminal penalties for malicious hacking 
Cybercriminals can hack in to corporate, government and other organizations networks and 
escape with millions of dollars worth of data. Increasing penalties for these criminals would 
strengthen the disincentive to engage in the crime and ensure that those convicted would be 
severely punished. 
Strengthen international anti-cybercrime partnerships 
Modern cybercriminals benefit greatly from lax or non-existent enforcement of anti-hacking 
laws overseas. Bringing crooks who defraud American consumers to justice should be an 
important goal of U.S. foreign policy. 
Conclusion 
Data security reform is one of the rare issues that has broad bipartisan appeal. More 
importantly, consumers nationwide would benefit greatly from Congressional actions to 
strengthen data security protections. Given the increasing frequency, magnitude and cost of 
data breaches, Congress can no longer sit back and hope the problem takes care of itself. 
Through strong leadership, Congress can create a framework where the scales begin to tilt 
back in favor of those who would protect consumers’ data rather than misuse it for their own 
gain. 
Learn more about NCL’s #DataInsecurity Project and find out how you can get 
involved at www.nclnet.org.

Más contenido relacionado

La actualidad más candente

Healthcare-NOW! Newsletter - March 2013
Healthcare-NOW! Newsletter - March 2013Healthcare-NOW! Newsletter - March 2013
Healthcare-NOW! Newsletter - March 2013
Healthcare-Now
 
AARP: Impact of Fiscal Cliff on Hawaii's Kupuna
AARP: Impact of Fiscal Cliff on Hawaii's KupunaAARP: Impact of Fiscal Cliff on Hawaii's Kupuna
AARP: Impact of Fiscal Cliff on Hawaii's Kupuna
Honolulu Civil Beat
 
Regulating code
Regulating codeRegulating code
Regulating code
blogzilla
 
May Newsletter
May NewsletterMay Newsletter
May Newsletter
Democracia
 
AARP Why We Will Win
AARP Why We Will WinAARP Why We Will Win
AARP Why We Will Win
Paul Wessel
 
2. 9 8 21 amber alerts on mobile can now link to missing child's pic
2. 9 8 21  amber alerts on mobile can now link to missing child's pic2. 9 8 21  amber alerts on mobile can now link to missing child's pic
2. 9 8 21 amber alerts on mobile can now link to missing child's pic
.krishu80
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
Gary Kazmer
 
Grassroots basics
Grassroots basicsGrassroots basics
Grassroots basics
Shcl1438
 

La actualidad más candente (16)

Healthcare-NOW! Newsletter - March 2013
Healthcare-NOW! Newsletter - March 2013Healthcare-NOW! Newsletter - March 2013
Healthcare-NOW! Newsletter - March 2013
 
AARP: Impact of Fiscal Cliff on Hawaii's Kupuna
AARP: Impact of Fiscal Cliff on Hawaii's KupunaAARP: Impact of Fiscal Cliff on Hawaii's Kupuna
AARP: Impact of Fiscal Cliff on Hawaii's Kupuna
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Regulating code
Regulating codeRegulating code
Regulating code
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
May Newsletter
May NewsletterMay Newsletter
May Newsletter
 
World Energy Focus - Ottobre 2016
World Energy Focus - Ottobre 2016World Energy Focus - Ottobre 2016
World Energy Focus - Ottobre 2016
 
Media industry analysis america
Media industry analysis americaMedia industry analysis america
Media industry analysis america
 
AARP Why We Will Win
AARP Why We Will WinAARP Why We Will Win
AARP Why We Will Win
 
Protect the American Investor From Financing CCP’s Surveillance State, Keith ...
Protect the American Investor From Financing CCP’s Surveillance State, Keith ...Protect the American Investor From Financing CCP’s Surveillance State, Keith ...
Protect the American Investor From Financing CCP’s Surveillance State, Keith ...
 
Cyber Claims Insight
Cyber Claims InsightCyber Claims Insight
Cyber Claims Insight
 
2. 9 8 21 amber alerts on mobile can now link to missing child's pic
2. 9 8 21  amber alerts on mobile can now link to missing child's pic2. 9 8 21  amber alerts on mobile can now link to missing child's pic
2. 9 8 21 amber alerts on mobile can now link to missing child's pic
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Ethics presentation 2-b
Ethics presentation 2-bEthics presentation 2-b
Ethics presentation 2-b
 
Grassroots basics
Grassroots basicsGrassroots basics
Grassroots basics
 

Similar a National Consumers League's 2015 Cybersecurity Policy Agenda

TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
gorsline
 
Data Breaches
Data BreachesData Breaches
Data Breaches
sstose
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
Paul Ferrillo
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
James Sheehan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 

Similar a National Consumers League's 2015 Cybersecurity Policy Agenda (20)

databreach whitepaper
databreach whitepaperdatabreach whitepaper
databreach whitepaper
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plan
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data Privacy
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 

Más de nationalconsumersleague

Ncl trumpeter awards sponsorship form (2) (4)
Ncl trumpeter awards sponsorship form (2) (4)Ncl trumpeter awards sponsorship form (2) (4)
Ncl trumpeter awards sponsorship form (2) (4)
nationalconsumersleague
 
2013 National Consumers League Annual Report
2013 National Consumers League Annual Report2013 National Consumers League Annual Report
2013 National Consumers League Annual Report
nationalconsumersleague
 

Más de nationalconsumersleague (17)

Coding Into the Future
Coding Into the FutureCoding Into the Future
Coding Into the Future
 
2015 Consumer Policy Agenda
2015 Consumer Policy Agenda2015 Consumer Policy Agenda
2015 Consumer Policy Agenda
 
NCL Fans Act Senate Testimony 12 4 2014
NCL Fans Act Senate Testimony 12 4 2014NCL Fans Act Senate Testimony 12 4 2014
NCL Fans Act Senate Testimony 12 4 2014
 
Where do our calories come from factsheet
Where do our calories come from factsheetWhere do our calories come from factsheet
Where do our calories come from factsheet
 
Ncl food waste white paper
Ncl food waste white paperNcl food waste white paper
Ncl food waste white paper
 
Stuff Happens: NCL explores airline travel insurance
Stuff Happens: NCL explores airline travel insuranceStuff Happens: NCL explores airline travel insurance
Stuff Happens: NCL explores airline travel insurance
 
NCL Trumpeter Dinner: Sponsorship Information
NCL Trumpeter Dinner: Sponsorship InformationNCL Trumpeter Dinner: Sponsorship Information
NCL Trumpeter Dinner: Sponsorship Information
 
Ncl trumpeter awards sponsorship form (2) (4)
Ncl trumpeter awards sponsorship form (2) (4)Ncl trumpeter awards sponsorship form (2) (4)
Ncl trumpeter awards sponsorship form (2) (4)
 
NCL Food and Drug Interactions Brochure
NCL Food and Drug Interactions BrochureNCL Food and Drug Interactions Brochure
NCL Food and Drug Interactions Brochure
 
NCL Trumpeter Dinner: Sponsorship Information
NCL Trumpeter Dinner: Sponsorship InformationNCL Trumpeter Dinner: Sponsorship Information
NCL Trumpeter Dinner: Sponsorship Information
 
NCL Report: Wage theft in the restaurant industry
NCL Report: Wage theft in the restaurant industryNCL Report: Wage theft in the restaurant industry
NCL Report: Wage theft in the restaurant industry
 
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013
 
National Consumers League 2013 Vaccine Study
National Consumers League 2013 Vaccine StudyNational Consumers League 2013 Vaccine Study
National Consumers League 2013 Vaccine Study
 
NCL Consumer Data Insecurity Report: Examining Data Breaches June 2014
NCL Consumer Data Insecurity Report: Examining Data Breaches June 2014NCL Consumer Data Insecurity Report: Examining Data Breaches June 2014
NCL Consumer Data Insecurity Report: Examining Data Breaches June 2014
 
NCL trumpeter awards: sponsorship form
NCL trumpeter awards: sponsorship formNCL trumpeter awards: sponsorship form
NCL trumpeter awards: sponsorship form
 
Our wasteful nation, reducing food waste
Our wasteful nation, reducing food wasteOur wasteful nation, reducing food waste
Our wasteful nation, reducing food waste
 
2013 National Consumers League Annual Report
2013 National Consumers League Annual Report2013 National Consumers League Annual Report
2013 National Consumers League Annual Report
 

Último

VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakurbest call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
 
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
 
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
 
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
 
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
 

National Consumers League's 2015 Cybersecurity Policy Agenda

  • 1. 2015 CONGRESSIONAL DATA SECURITY AGENDA: A TO-DO LIST FOR THE 114TH CONGRESS Introduction Rarely does a week go by without the announcement of another major data breach that has put thousands, or even millions of consumers at risk of fraud. From malicious use of compromised credit and debit cards, to increased identity theft risk to drained bank accounts, the threats are real and impact millions of consumers. While malicious hacking has been a problem since the dawn of the Internet Age, the unprecedented interconnectedness of our marketplace combined with an increasingly organized and skillful cyber criminal underground threatens consumer trust in the marketplace. A key challenge for the incoming 114th Congress will be to implement long-needed reforms that will protect American consumers personal data from malicious use by criminal hackers. For too long, inertia and fear of unintended consequences has prevented serious legislative efforts to address data insecurity in all but the most sensitive arenas. However, there is practically no piece of data that, when compromised, cannot be monetized at the expense of consumers nationwide. It is for this reason that NCL, is calling on our elected leaders to heed the call of millions of consumers to adopt the Congressional Data Security Agenda in the next Congress. The agenda items below represent ideas that have already been adopted in many states and should be applied nationally. Additionally, economic incentives that promote the adoption of strong cybersecurity safeguards by private enterprise are common-sense solutions. Finally, enforcement should be beefed up, with expert agencies given the tools they need to protect the growing amount of valuable consumer data coursing through the marketplace today. 2015 Congressional Data Security Agenda Create a strong national data breach notification standard When a breach occurs, consumers should be made aware of the threat to their important personal information. Modeled on strong state notification laws such as California’s, a national data breach notification standard would ensure that all consumers would benefit from this protection. It would also put companies on notice that data breaches will not go unreported. Require data holders to abide by reasonable data security requirements Under existing law, companies collecting health and financial data are already required to institute reasonable data security measures. Ten states have already passed comprehensive data security standards. Given the multitude of ways that other sensitive data can be misused by cybercriminals, it is important that all data collected and stored about consumers be protected.
  • 2. Clarify and strengthen the FTC’s data security authority The Federal Trade Commission is the primary cop on the beat when it comes to holding organizations accountable for protecting consumers’ data, bringing more than fifty data security actions. However, the Commission’s authority in this area has been called in to question in the courts. In addition, the Commission lacks civil penalty authority. By clarifying its role and giving its actions real teeth, Congress can give consumers greater confidence in their data’s security. Promote robust cyber-insurance underwriting standards Even with strong cybersecurity defenses, organizations can still be hacked. When breaches happen, consumers should be made whole for the increased risk of identity theft and other harm they sustain as a result of the breach. Promoting a rigorous cyber insurance market will also incentivize the creation of underwriting standards that can adapt to changing cyber threats more quickly that proscriptive government regulations. Increase federal civil and criminal penalties for malicious hacking Cybercriminals can hack in to corporate, government and other organizations networks and escape with millions of dollars worth of data. Increasing penalties for these criminals would strengthen the disincentive to engage in the crime and ensure that those convicted would be severely punished. Strengthen international anti-cybercrime partnerships Modern cybercriminals benefit greatly from lax or non-existent enforcement of anti-hacking laws overseas. Bringing crooks who defraud American consumers to justice should be an important goal of U.S. foreign policy. Conclusion Data security reform is one of the rare issues that has broad bipartisan appeal. More importantly, consumers nationwide would benefit greatly from Congressional actions to strengthen data security protections. Given the increasing frequency, magnitude and cost of data breaches, Congress can no longer sit back and hope the problem takes care of itself. Through strong leadership, Congress can create a framework where the scales begin to tilt back in favor of those who would protect consumers’ data rather than misuse it for their own gain. Learn more about NCL’s #DataInsecurity Project and find out how you can get involved at www.nclnet.org.