SHARE
Facebook X Pinterest WhatsApp

Security Legislation

Apr 5, 2005

After a spate of high-profile security breaches, including those at ChoicePoint Inc., Bank of America Corp. and LexisNexis Group, U.S. lawmakers are waking up to the growing problem of identity theft. Jon Corzine’s (D-N.J.) Identity Theft Recovery and Victim Assistance Act, and Dianne Feinstein’s (D-Calif.) Notification of Risk to Personal Data Act, are bills that focus on forcing companies to inform customers in the event of a security breach that compromises their personal data.

But neither of these measures gets to the crux of the problem, says Jim Harper, director of information policy studies at the Washington, D.C.-based Cato Institute, a nonprofit public policy research foundation. “They don’t actually address security issues,” he says. “What good is it to simply inform a customer of a security breach a month after it’s happened?”

Harper argues that any federal legislation must hold companies liable for the consequences of a security breach. “So if someone is a victim of identity theft, the company that allowed the data to get into the hands of the criminals will be responsible for the consequences—and the cost,” he says.

Recommended for you...

What do Amazon, Microsoft, Meta, and IBM Have in Common? Tape Storage
Drew Robb
Aug 15, 2022
What Does Quantum Computing Mean for IT?
Devin Partida
Aug 11, 2022
Solving the Video Surveillance Retention Challenge 
Drew Robb
Jul 28, 2022
Top 6 IT Challenges in Healthcare
Lauren Hansen
Jun 21, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.