Data Aggregators, Consumer Data, and Responsibility Online: Who Is Tracking Consumers Online and Should They Stop?

Total Page:16

File Type:pdf, Size:1020Kb

Data Aggregators, Consumer Data, and Responsibility Online: Who Is Tracking Consumers Online and Should They Stop? THE INFORMATION SOCIETY 2016, VOL. 32, NO. 1, 51–63 http://dx.doi.org/10.1080/01972243.2015.1107166 Data aggregators, consumer data, and responsibility online: Who is tracking consumers online and should they stop? Kirsten Martin Department of Strategic Management and Public Policy, George Washington University, Washington, DC, USA ABSTRACT ARTICLE HISTORY The goal of this article is to examine the strategic choices of firms collecting consumer data online Received 7 August 2014 and to identify the roles and obligations of the actors within the current network of online tracking. Accepted 3 May 2015 In doing so, the focus shifts from placing the onus on individuals to make an informed choice, to KEYWORDS fi ’ justifying the roles and responsibilities of rms when gathering, aggregating, and using consumers Big data; business ethics; interests or behavior online. Firms online are uniquely positioned to undercut or to respect privacy Internet; privacy; expectations within three possible roles: as a member of a supply chain of information traders, surveillance; tracking online within a network of surveillance online, and as an arm of law enforcement. These firms benefit from aggregating and analyzing consumer data and have an associated responsibility to not only minimize the harm to consumers but also to enact change where the firm is in the most knowledgeable and powerful position. Through everyday activities, such as buying groceries, becoming a “captive audience” without functional opt-out paying bills, researching medical symptoms, and map- mechanisms, thereby making notice and choice less mean- ping runs, consumers create a data trail that is collected ingful (Popescu and Barah 2013). Privacy law scholars by companies and aggregated for later use. The term “big Schwartz and Solove (2011) summarize the idea behind data” refers to the marriage of modern predictive tools notice and choice: As long as a company provides notice with these large data sets of consumer information (boyd of its privacy practices, and people have some kind of and Crawford 2012; Lohr 2012; Sloan and Warner 2014). choice about whether to provide the data or not, then pri- Better analytical capabilities and larger data sets—with vacy is sufficiently protected. greater volume, variety, and velocity (Laney 2001)— The emergence of widespread consumer tracking com- allow for greater precision in tracking individuals and pounds the frailty of relying on notice and choice to gov- more widespread, beneficial use of big data by firms, ern privacy online. Currently, the only affirmative such as for fraud prevention and credit risk assessments responsibility of firmsonlineisadequatenotification (Beales and Muris 2008; U.S. Senate 2013), as well as in (Calo 2012;Beales2013). Firms online are not responsible health care, mobile, smart grids, traffic management, for their specificprivacypractices—only in communicat- retail, and payment services (Tene and Polonetsky 2013). ing their tactics to consumers. In focusing on disclosure as While recent advances have led to a democratization of the main responsibility of the firm, firms become free to big data, where more actors have access to more con- implement questionable privacy practices as long as the sumer information with better, faster, and cheaper tools, practices are accurately reported. As more firms have the tactics to address online privacy continue to languish access to consumer data, little prescriptive guidance is (Langenderfer and Cook 2004). The Federal Trade Com- offered in developing strategies for consumer information. mission (FTC) reliance on Fair Information Practices While the policy focus has been on consumer choice (FIP), and notice and choice in particular, serves as a and the associated user responsibility in disclosing infor- source of guidance for self-regulation within the industry mation, this article shifts the attention to the strategic (FTC 2012), yet considerable agreement exists that notice choices of firms online and their associated responsibility and choice have failed to govern privacy effectively online in collecting, aggregating, storing, and sharing consumer (Martin 2013;Nissenbaum2011;SchwartzandSolove information. The goal of this article is to critically analyze 2011;Calo2012; Solove 2013).1 Consumers fall victim to the strategic choices of firms collecting data online and to CONTACT Kirsten Martin [email protected] Department of Strategic Management and Public Policy, George Washington University, 2201 G Street, Washington, DC 20052, USA. Published with license by Taylor & Francis. © Kirsten Martin 52 K. MARTIN identify the roles and obligations of the actors within the Strategic choices of firms online current network of online tracking. In doing so, the focus shifts from placing the onus on individuals to make an When online, firms regularly gather and store consumers’ informed choice to justifying the roles and responsibilities information, browsing habits, clickstream data, and pur- of firms when gathering, aggregating, and using consum- chasing history. While websites have long been known to ers’ movements, preferences, interests, or behavior online. record users’ online activities in order to suggest products Firms are uniquely positioned to undercut or to respect or give discounts, additional actors and technologies have expectations on privacy based on the information tracked entered the online tracking space with increasing access to and the firms’ relationship with users. user information. For example, a Web beacon can capture The article proceeds as follows. First, I categorize firms detailed information such as clicking, typing, and brows- online based on the two important strategic decisions con- ing behavior and then relay that information to profes- cerning (1) a firm’s relationship with consumers and (2) sional tracking companies and data aggregators; a mobile the breadth of information collected. Second, these strategic software company such as Carrier IQ—with which no end choices are framed as positioning firms to either undercut customer has any direct contact—can log customer activ- or respect privacy expectations within three possible over- ity on mobile devices down to the keystroke for later anal- lapping roles: as a member of a supply chain of informa- ysis without the knowledge of the user. Primary websites tion traders, within a network of surveillance online, and as may pass information to affiliated companies, sell infor- an arm of law enforcement. Based on the firms’ strategic mation to data aggregators and data exchanges directly, or position online, I identify the moral basis for firms’ obliga- allow a tracking company to place an invisible beacon or tions for each role and summarize in Table 1. web bug on their website. Table 1. Problems with tracking online by role. Suggested ethical Role Problem Key actors Responsible because… actions Supply chain Potential harm from Primary website acting as a Primary website benefit from harm Reveal tracking allowed on secondary use of gatekeeper to the caused to individuals within the primary website or information along the information supply chain. information supply chain. application. supply chain. Without primary website, individual would not disclose information. Relationship with individual acts as a lure for the individual to visit the site and disclose information. Possible breaching of privacy Primary website has unique knowledge Set policies as to who has expectations and and ability to identify and stop access to user data and confidentiality in passing tracking. for what purpose. Limit information within the who has access. supply chain. Surveillance Inability to avoid watcher. Data aggregators with no Residual harm from data aggregation— Keep data within functional direct relationship with tracking actors benefit from the silos so that no single users. personality and identity of others actor has broad user while contributing to the harm of data. surveillance. Deidentify user information. Inability to identify watchers Tactics by which data is collected are Make watchers visible by deceptive and disrespectful to browser or primary individuals by not maintaining website/application. minimum social contract norms that require the ability to identify contractors (trackers) and give contractors (the individuals) a voice. Law enforcement Storing data and leaving Actors that benefit from Retaining data makes the individual Add options to make data individual vulnerable to aggregated and vulnerable. An already obscure or less changing ability of law individualized data disadvantaged party online—the personally identifiable. enforcement. render the data attractive user—is made worse off in retaining Diminish size of data set: to law enforcement. data. delete data; collect less data. Lowering hurdles for law Actors online that change the structure Implement transparency enforcement to access of privacy expectations have a reports (such as Google information by making responsibility to fix what was broken. and Twitter). data more accessible. By breaking an existing structure that Make presence visible to was relied upon to uphold privacy end users to allow users interests online, the actors to make decisions voluntarily take on the responsibility about disclosure. to reconstitute the social and Have own policies as to technological structures. when and why to disclose data to law enforcement. THE INFORMATION SOCIETY 53 Companies collecting, aggregating, and disclosing Yet the distinction between actors focused on front- consumer
Recommended publications
  • Statement of Natalie S. Talpas, Senior Vice President and Digital Product Management Group Manager, PNC Bank
    Statement of Natalie S. Talpas, Senior Vice President and Digital Product Management Group Manager, PNC Bank Consumer Financial Protection Bureau Symposium on Consumer Access to Financial Records, Section 1033 of the Dodd-Frank Act Wednesday, February 26, 2020 I. Introduction and Executive Summary PNC Bank, National Association (PNC) appreciates the opportunity to participate in the Consumer Financial Protection Bureau’s (Bureau) symposium regarding data aggregators and consumer access to financial records. PNC is a Main Street bank focused on serving the financial needs of our customers and communities. We have employees in more than 40 states across the country and a retail branch network located primarily in the Mid-Atlantic, Midwest and Southeast, with approximately 2,300 branches and 9,100 ATMs. We are proud of our longstanding history of supporting our customers, communities and employees while operating a sustainable long-term business. We are committed to providing our customers with access to convenient technology tools and the financial applications of their choice, while protecting the personal and financial information they entrust to us and maintaining the integrity of our systems. We support our customers’ use of financial applications (apps) and informed consumer choice in accessing and sharing their financial data. In fact, we process millions of trouble-free logins by financial apps, and the data aggregators that support these apps, each week. What are data aggregators? Data aggregators are nonbank financial services companies that gather financial data on consumers from banks and other financial institutions, such as broker- dealers, and make this information available to financial apps and, potentially, other purchasers of consumer data.
    [Show full text]
  • Technology and Innovation in the Insurance Sector
    Technology and innovation in the insurance sector TECHNOLOGY AND INNOVATION IN THE INSURANCE SECTOR Please cite this publication as: OECD (2017), Technology and innovation in the insurance sector This work is published under the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the OECD or of the governments of its member countries or those of the European Union. This document and any map included herein are without prejudice to the status or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city, or area. © OECD 2017 FOREWORD │ 3 Foreword “Insurtech” is the term being used to describe the new technologies with the potential to bring innovation to the insurance sector and impact the regulatory practices of insurance markets. This report catalogues these technologies and examines how InsurTech is being funded and how insurers are engaging with the start-ups entering the market. This report was prepared as part of the programme of work of the OECD Insurance and Private Pensions Committee, the international forum for addressing policy and regulatory issues in insurance and private pensions for governments, international organisations and industry. It has benefited from input from the insurance market and industry, including from a number of insurance start-ups. This report contributes to the OECD’s Going Digital project which is examining from a wide range of perspectives how technology and innovation is affecting the economy. TECHNOLOGY AND INNOVATION IN THE INSURANCE SECTOR TABLE OF CONTENTS │ 5 Table of contents Executive summary ..............................................................................................................................
    [Show full text]
  • Do Data Breach Disclosure Laws Reduce Identity Theft?
    Do Data Breach Disclosure Laws Reduce Identity Theft? Sasha Romanosky, Rahul Telang, Alessandro Acquisti The Heinz College Carnegie Mellon University ABSTRACT In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting “data breach disclosure laws” that require firms to notify consumers if their personal information has been lost or stolen. While the laws are expected to reduce identity theft, their effect has yet to be empirically measured. We used panel data from the U.S. Federal Trade Commission to estimate the impact of data breach disclosure laws on identity theft from 2002 to 2009. We find that adoption of data breach disclosure laws reduce identity theft caused by data breaches by, on average, 6.1 percent. Keywords Data breach disclosure, economics of information security, identity theft, fixed effects regression 2 Do Data Breach Disclosure Laws Reduce Identity Theft? INTRODUCTION Data breaches occur when personally identifiable information such as names, social security numbers, and credit card numbers are accidentally lost or maliciously stolen. These breaches can result in hundreds of thousands (sometimes millions) of compromised records, and lead to identity theft and related crimes (Givens, 2000).1 In the United States, identity theft resulted in corporate and consumer losses of around $56 billion dollars in 2005 (Javelin Research, 2006).2 In an effort to reduce these crimes, many states have responded by adopting data breach disclosure (or “security breach notification”) laws, requiring firms to notify individuals when their personal information has been compromised.
    [Show full text]
  • E-Aggregation: the Present and Future of Online Financial Services in Asia-Pacific (PACIS)
    E-Aggregation: The Present and Future of Online Financial Services in Asia-Pacific (PACIS) Hiroshi Fujii Taeko Okano Stuart Madnick Michael Siegel Working Paper CISL# 2002-06 September 2002 Composite Information Systems Laboratory (CISL) Sloan School of Management, Room E53-320 Massachusetts Institute of Technology Cambridge, MA 02142 E-Aggregation: The Present and Future of Online Financial Services in Asia-Pacific Hiroshi Fujii1, Taeko Okano1, Stuart Madnick2, Michael Siegel2 1Suruga Bank, Japan 2Sloan School of Management, Massachusetts Institute of Technology, USA Abstract Financial institutions see the Internet as an important channel and many have built websites to inform and attract customers. Financial aggregation services as represented by “Account Aggregator” present an opportunity by which financial institutions can build stronger relationships with customers. Account aggregation services began in the United States, but they are now widely used by financial institutions in other countries. In this paper, we examine financial aggregation services by classifying aggregator types and the method for implementing their service. Second, we explain the differences between financial account relationship aggregation services in the U.S. and in Asia-Pacific countries, including Australia, South Korea, and Japan. We then discuss the status of financial comparison aggregation services and related issues. Owing to the popularity of WAP phones and the fast- growing market for mobile phone service in Asia-Pacific, we will also look into the development of mobile aggregation services. Finally, we examine future directions for aggregators in conjunction with universal and global banking concepts. Keywords: Financial institution, Aggregation service, Universal banking, Global banking I. Introduction Financial institutions are one of the most influential businesses in the information technology (IT) revolution.
    [Show full text]
  • Identity Software – May 2021 EXECUTIVE SUMMARY Identity Software Sector Update
    SECTOR SNAPSHOT: Identity Software – May 2021 EXECUTIVE SUMMARY Identity Software Sector Update The pandemic has driven digital transformation into overdrive with retailers and financial institutions rapidly adopting to consumer demand shifting from offline to online transactions, and enterprises accelerating migration to cloud to manage millions of workers working remotely. This unprecedented growth in digital activity saw a corresponding increase in intensity and regularity of identity fraud and data breaches on an almost daily basis. Advanced persistent threats are fueling rapid innovation and adoption of identity security and data protection solutions across different market verticals, which in turn have catalyzed some of the most significant M&A and funding activities in recent history Recent M&A activity has been robust across multiple sub categories especially in IAM, highlighted by: Select M&A Transactions ($MM) $28,940 $1,400 $6,408 $850 Financing and investment volume in the overall identity sector has continued unabated with sponsors making bold bets to unleash growth and create new unicorns: Select Financing Transactions ($MM) $210 $205 $150 $100 $100 $100 GCA expects these trends to continue with even stronger identity related market activity excepted in the remainder of 2021 2 I. GCA OVERVIEW II. IDENTITY SOFTWARE MARKET OBSERVATIONS III. APPENDIX 3 GCA’S DEDICATED SECTOR KNOWLEDGE AND EXECUTION EXCELLENCE GCA’s Identity Software Leadership Team Chris Gough Saif Malik Managing Director / Head of Cybersecurity Executive
    [Show full text]
  • Symposium on Consumer Access to Financial Records February 26, 2020
    Symposium on Consumer Access to Financial Records February 26, 2020 Written Statement of Natalie R. Williams Managing Director & Associate General Counsel, Responsible Banking, Data & Privacy JPMorgan Chase & Co. Submitted to the Consumer Financial Protection Bureau Thank you for the opportunity to serve as a panelist at the Consumer Financial Protection Bureau’s (CFPB) Data Aggregation Symposium. I. Data Aggregation Presents Both Benefits and Risks Financial data aggregation has grown dramatically in recent years and has yielded consumer benefits. Among other things, it has facilitated the creation of an array of innovative products and services that can help consumers better understand and manage their financial lives. However, data aggregation should be undertaken in the best interest of consumers. It therefore must be executed with appropriate measures to ensure data safety and security and informed consumer consent. Most aggregators require consumers to provide financial account login credentials so that they can “screen scrape” the consumer’s financial information. Through this practice of “screen scraping,” aggregators have the ability to collect all of the consumer’s financial information, even if the financial application the customer desires to use doesn’t need it. That information can include account numbers, payees, and contact information as well as details on mortgage, investment and credit card accounts, joint accounts, and children’s accounts. Aggregators also generally store account login credentials and scraped customer data, creating highly attractive targets for hackers and malicious insiders. Moreover, current data aggregation practices often are insufficiently transparent regarding the use and sharing of consumer financial data. This, in turn, limits the control that consumers have over their own financial information, placing data privacy and data security at risk.
    [Show full text]
  • RIN 3064-ZA24 Attachments: SSRN-Id3622468.Pdf; SSRN-Id3864965.Pdf
    From: Susan Von Struensee Sent: Saturday, June 19, 2021 12:22 PM To: Comments Subject: [EXTERNAL MESSAGE] RIN 3064-ZA24 Attachments: SSRN-id3622468.pdf; SSRN-id3864965.pdf COMMENTS OF SUSAN VON STRUENSEE, JD, MPH to the Request for Information and Comment on Financial Institutions' Use of Artificial Intelligence, Including Machine Learning 86 FR 16837-38 (March 31, 2021) Agency/Docket Numbers: Docket ID OCC-2020-0049 Docket No. OP-1743 Docket No. CFPB-2021-0004 Docket No. NCUA-2021-0023 Please see attached file A Survey of Fintech Research and Policy Discussion The intersection of finance and technology, known as fintech, has resulted in the dramatic growth of innovations and has changed the entire financial landscape. While fintech has a critical role to play in democratizing credit access to the unbanked and thin-file consumers around the globe, those consumers who are currently well served also turn to fintech for faster services and greater transparency. Fintech, particularly the blockchain, has the potential to be disruptive to financial systems and intermediation. Our aim in this paper is to provide a comprehensive fintech literature survey with relevant research studies and policy discussion around the various aspects of fintech. The topics include marketplace and peer-to-peer lending, credit scoring, alternative data, distributed ledger technologies, blockchain, smart contracts, cryptocurrencies and initial coin offerings, central bank digital currency, robo-advising, quantitative investment and trading strategies, cybersecurity, identity theft, cloud computing, use of big data and artificial intelligence and machine learning, identity and fraud detection, anti- money laundering, Know Your Customers, natural language processing, regtech, insuretech, sandboxes, and fintech regulations.
    [Show full text]
  • Dara Aggregators and Financial Institutions Kimberly L
    NORTH CAROLINA BANKING INSTITUTE Volume 5 | Issue 1 Article 17 2001 If You Can't Beat Them, Join Them: Dara Aggregators and Financial Institutions Kimberly L. Wierzel Follow this and additional works at: http://scholarship.law.unc.edu/ncbi Part of the Banking and Finance Law Commons Recommended Citation Kimberly L. Wierzel, If You Can't Beat Them, Join Them: Dara Aggregators and Financial Institutions, 5 N.C. Banking Inst. 457 (2001). Available at: http://scholarship.law.unc.edu/ncbi/vol5/iss1/17 This Comments is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Banking Institute by an authorized administrator of Carolina Law Scholarship Repository. For more information, please contact [email protected]. If You Can't Beat Them, Join Them: Data Aggregators and Financial Institutions I. INTRODUCTION: Data aggregation has been a hot topic in the financial industry since First Union's December 1999 suit against Secure Commerce Services.! Data aggregation is the process of gathering information from multiple websites and delivering it to a consumer on a single website.2 There are essentially two ways for an aggregator to gather information-direct feed and screen scraping? Both methods require a customer to create on-line account access with the institutions they want on their single website.4 The customer then turns over their account numbers, I.D. numbers and passwords to their selected aggregator.5 1. First Union Alleges Online Payment Service Used Bank Customers' Information Illegally, B.N.A., Feb. 1, 2000, at 2437 (citing First Union Corp v.
    [Show full text]
  • Americans for Financial Reform Education Fund Center for Responsible Lending Consumer Action Consumer Federation of America USPIRG
    National Consumer Law Center (on behalf of its low-income clients) Americans for Financial Reform Education Fund Center for Responsible Lending Consumer Action Consumer Federation of America USPIRG February 4, 2021 Via regulations.gov Comment Intake Consumer Financial Protection Bureau 1700 G Street NW Washington, DC 20552 Re: Consumer Access to Financial Records, Docket No. CFPB–2020–0034/RIN 3170- AA78. The National Consumer Law Center (on behalf of its low-income clients) (NCLC), Americans for Financial Reform Education Fund, Center for Responsible Lending, Consumer Action, Consumer Federation of America, and USPIRG are pleased to submit these comments in response to the Consumer Financial Protection Bureau (CFPB)’s Advanced Notice of Proposed Rulemaking regarding Consumer Access to Financial Records, Docket No. 2020-0034, issued November 6, 2020. The CFPB has requested comment on 46 questions to assist it in developing a proposed rule to implement Section 1033 of the Dodd-Frank Wall Street Reform and Consumer Protection Act. These comments address a selected number of these questions that we as consumer advocacy groups are particularly suited to answer. In summary, these comments discuss how: 1. The potential benefits for consumers of authorized data access, assuming strong provisions for consumer control, security, and use limitations, are significant, as consumer use of their own data could provide a better alternative and provide true competition to the Big Three credit bureaus. The CFPB should issue a strong rule under 1033 to ensure protections for consumers accessing their own account data. 2. Authorized data access also poses significant risks to consumers. Consumers face the dangers of losing control over the data, having it used against them, and having their privacy invaded.
    [Show full text]
  • The Use of Cash-Flow Data in Underwriting Credit Market Context & Policy Analysis
    The Use of Cash-Flow Data in Underwriting Credit Market Context & Policy Analysis FEBRUARY 2020 About FinRegLab FinRegLab is a non-profit research organization that was founded on the premise that independent, rigorous research is a primary ingredient in helping develop market norms and policy solutions that enable responsible innovation in financial services. Acknowledgments This report, The Use of Cash-Flow Data in Underwriting Credit: Market Context & Policy Analysis, and the accompanying Policy Overview were made possible through founding support from Flourish/Omidyar Network. Additional support was provided by the Milken Institute, which enabled FinRegLab to evaluate cash-flow data in small business credit underwriting. Detailed information on our funders can be found on the inside back cover. We would like to extend a special note of appreciation for their leadership and facilitation of FinRegLab’s policy working groups to Melanie Brody, Mayer Brown; Mark Schultz, Capital One; P-R Stark, Oliver Wyman; and Corey Stone, Financial Health Network. Thanks also to the Fintech Team at the Federal Reserve Bank of San Francisco for co-hosting a symposium entitled “The Role of Consumers in the Data Ecosystem.” FinRegLab would also like to recognize the individuals and organizations who participated in the policy working groups as listed in Appendix A, the participants of the Data Ecosystem symposium, and stakeholders who participated in interviews. We are particularly grateful to Marsha Courchane and Arthur Baines, Charles River Associates, for the role they played in designing and executing the empirical research analysis. We are also grateful to Thomas P. Brown and Stephen J. Bandrowsky, Paul Hastings, for legal assistance throughout the course of the research process.
    [Show full text]
  • Data Aggregation Services – De-Identification
    TECHNOLOGY MAY-RATHON DIGITAL HEALTH PRIVACY: THERE’S AN APP FOR THAT Reece Hirsch Partner, Morgan Lewis, San Francisco Co-chair, Privacy and Cybersecurity Practice May 19, 2017 © 2017 Morgan, Lewis & Bockius LLP The Technologies are New, The Laws … Not So Much • When the Health Insurance Portability and Accountability Act was enacted in 1996, there were no smart phones, no mobile apps, no cloud computing – HIPAA Privacy Rule became effective April 14, 2003 – HIPAA Security Rule became effective April 21, 2005 – Compliance date of HIPAA Final Rule: September 23, 2013 • In recent years regulators and digital health companies have had to stretch, tweak and interpret existing laws to fit this new landscape of – Healthcare mobile apps – Cloud hosting services – Personal health records 2 Privacy by Design • For companies venturing into the digital health space, privacy and security are critical issues that must be addressed from Day One – For startups, questions about privacy and security will be among the first that get asked by customers and potential acquirers – The due diligence process will show when a company scrambled to improve privacy and security immediately prior to potential acquisition – For established companies venturing into digital health, a stumble in the digital privacy space can damage a brand and customer relationships • Privacy by design is the FTC’s mantra, baking in privacy and security during the development of a product or service 3 The FTC and OCR • One overarching theme in digital health privacy is the overlapping jurisdiction of: – The Federal Trade Commission, the primary U.S. privacy regulator with the broadest purview – The Dept.
    [Show full text]
  • Do Data Breach Disclosure Laws Reduce Identity Theft? / 257 Mitigate, Any Resulting Harm
    Do Data Breach Disclosure Sasha Romanosky Rahul Telang Laws Reduce Identity Theft? Alessandro Acquisti Abstract In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal informa- tion has been lost or stolen. Although the laws are expected to reduce identity theft, their effect has yet to be empirically measured. We use panel data from the U.S. Federal Trade Commission to estimate the impact of data breach disclosure laws on identity theft from 2002 to 2009. We find that adoption of data breach disclo- sure laws reduce identity theft caused by data breaches, on average, by 6.1 percent. © 2011 by the Association for Public Policy Analysis and Management. INTRODUCTION Data breaches occur when personally identifiable information such as names, Social Security numbers, and credit card numbers are accidentally lost or maliciously stolen. These breaches can result in hundreds of thousands (sometimes millions) of compromised records and lead to identity theft and related crimes (Givens, 2000).1 In the United States, identity theft resulted in corporate and consumer losses of around $56 billion in 2005 (Javelin Research, 2006).2 In an effort to reduce these crimes, many states have responded by adopting data breach disclosure (also known as secu- rity breach notification) laws, requiring firms to notify individuals when their per- sonal information has been compromised. However, to date, no empirical analysis has investigated the effectiveness of such legislative initiatives in reducing identity theft.
    [Show full text]