, SecurityFocus 2003-10-27
Consultants are using it in pitches, lawyers are lecturing on it, and in Washington, it's been used as a model for proposed federal legislation. But nearly four months after it took effect California's unique security breach disclosure law has yet to see any enforcement action."Our office is not aware of any, nor are we aware of any DA or local offices or private parties bringing them," says Hallye Jordan, a spokesperson for California attorney general Bill Lockyer. "It may be that there have not been any security breaches that the consumers have not been informed about."
The law, called
But observers say that SB 1386 hasn't opened a floodgate of security breach disclosures. "Thus far I have not seen a lot of examples of people notifying," says Scott Pink, deputy chair of the American Bar Association's Cybersecurity Task Force. "My guess is people are either not familiar with the law, or are handling it discreetly."
"I can tell you right now, nobody's telling anybody anything," says Dan Clements of
Clements offers consumers a paid notification service, in which he'll warn his customers if he spots their information in the chat rooms and websites frequented by credit card thieves. He says this month alone he traced stolen credit card information to breaches at five different online merchants, ranging from mid-sized businesses to modest mom-and-pop operations. When he contacted a sample of the exposed consumers, he was, in each case, the first to give them the bad news. "They were not informed," says Clements.
But the law only requires disclosure when personal information is "reasonably believed to have been" stolen; these merchants may not have known. One of them, an online store that sells collectable sculptures, had detailed order information for forty customers plastered on a public website devoted to credit card fraud. But proprietor James Hunter says he was ignorant of the leak until Clements tipped him off, and that he warned his customers five days later -- delaying that long only at the request of his hosting company, Philadelphia-based Datarealm, which also hosts another merchant exposed on the same carding site. (A Datarealm representative did not return phone calls on the breaches.) "They asked me to wait to let them find out what the problem was so we'd have something positive to say," says Hunter.
Pink says it's too early to pass judgment on the California law. "I think the test will be somewhere between six months and a year," he says. Meanwhile, a proposed federal version of SB 1386 called the Notification of Risk to Personal Data Act is stalled in committee, according to a spokesman for senator Dianne Feinstein, who introduced the bill this year.
For his part, Clements has begun reporting breaches to the New York Attorney General's office, which has had some success