SlideShare a Scribd company logo
1 of 34
Regulatory nets vs the
fishing hook of litigation
Wendy Knox Everette
@wendyck
BSides Las Vegas 2017
Regulation might be a dirty word in
today's political climate, but security is
the exception to our small-government
bias. And as the threats posed by
computers become greater and more
catastrophic, regulation will be
inevitable. So now's the time to start
thinking about it. - Bruce Schneier, Feb
2017
I am a lawyer, but I am not your
lawyer. This is not legal advice.
Instead, we are going to talk
about how to think about
incentivizing safer and more
secure computer software.
Photo by dakiny
Who am I?
@wendyck
● Software developer ‘99 -
‘13
● GMU Law School,
National Security Law
Concentration, ‘13 - ‘16
● ZwillGen Fellow ‘16 - ‘17
Photo by dakiny
Regulation - in the US, on a few
verticals
vs
Liability - contractual provisions,
very little software product liability
What we have now:
Liability
Tort or contract liability
imposed in a civil court,
such as the famous
McDonald's hot coffee law
suit.
Tort Liability
is
based on
negligence
or
strict liability
(as in product
liability)
Contract Liability
Users can enter into
agreements to indemnify
each other, agree on the
services and goods they will
exchange, and receive
contract breach damages if
the agreement falls apart
Regulation
The imposition of
rules by a
government body,
such as speed
limits or nutrition
labels on food
Photo by clry2
Are these a difference without a
distinction?
No, they are not! Proponents of software liability often favor it as protective of
innovation, and indeed the US has generally limited software liability so far in part to
allow the computer software industry to develop and innovate.
Meanwhile, proponents of regulation endorse the certainty and clarity that can
come from laying out a baseline set of requirements ahead of time.
(But are US regulations really all that clear? Are they too prescriptive in some
instances? When that occurs, do they make us less secure?)
Ex ante vs Ex Post
Tort liability, as with negligence and product
liability is an ex-post scheme, because any
liability is imposed based on past actions, after a
product has been released.
In contrast, something like HIPAA regulations
are considered to be ex-ante, as they apply
before a piece of software is released, and they
will influence the design of the software to
comply with their regulatory provisions.
How do we best
incentivize security?
Attempt to fix responsibility wherever it will
most effectively reduce hazards to life and
health inherent in defective products that reach
the market
So which is
better?
This is a complicated question, and this talk will
not aim to definitely endorse one or the other.
But lets look at some considerations on each
side….
Liability regime
pros & cons
● Ex-post scheme: no
harm, no liability
● Allows for innovation
● At the same time, this
can lead to
uncertainty which
may actually lead to
excessive risk-
avoidance behavior
Consumer Suits
US Courts have so far been reluctant to impose liability for software bugs, data
breaches, and so forth, in suits brought by consumers because there has been no
physical harm to consumers.
Some suits have been brought by consumers alleging violations of various laws like
the Video Privacy Protection Act, but these are niche harms, and are often still
dismissed by courts based on lack of substantial harm
Pure
economic
loss
Regulatory regime
pros & cons
Although regulations may be ex-ante, they may
still lead to uncertainty.
Generalized requirements, meant to avoid
locking-in a particular technology and therefore
impeding innovation, may be so vaguely worded
that companies are unsure how to interpret and
apply the regulation to their products.
Photo by irenicrhonda
Regulations can impose
burdensome
requirements, and be
slow to update, making
them a poor fit for a field
like technology that
changes quickly
Photo by aftab
Just a sampling of US regulations affecting computer
security
● FTC §5 authority protects consumers from
deceptive & unfair practices
● HIPAA (protects personal health information)
● SEC Cybersecurity rules
● NHTSA Automotive cybersecurity
● NY State Department of Financial Services
Cybersecurity Rules
Photo by plasticbag
HIPAA
HHS tasked to “develop regulations protecting the privacy
and security of certain health information”
HIPAA Security Rule:
● Ensure the confidentiality, integrity, and availability of
e-PHI created, received, maintained or transmited
● Identify and protect against reasonably anticipated
threats to the security or integrity of the information
● Protect against reasonably anticipated, impermissible
uses or disclosures
Photo by Jan Erik
Waider
GDPR The EU's General Data Protection Regime is a
new set of regulations set to take effect in May
2018.
● Will end up affecting many companies in
the US due to its broad scope
● For companies outside of regulated
industries like finance and healthcare, the
GDPR requirements may be the most
stringent regulations affecting them
Photo by volvob12b
Harold Feld on FCC Net Neutrality regulations
Uncertainty
Bounded
Risk
If regulations apply to more companies, we
might see more risk avoidance behavior
(because now it is clear that a particular
activity violates a particular regulation)
or
we might see more risk taking (because at
worst a company might be subject to a known
fine, which it decides is an acceptable risk to
bear)
Photo by Kundan
Ramisetti
Balancing
innovation with
due care
Should the goal be to make
bad products pricier?
Ex-post liability depends on
the assumption that
consumers correctly gauge
their risk levels & that all
consumers have the same
risk-utility curves
Photo by Mike
Sutherland
Reducing transaction costs
The Coase Theorem in economics states that if transaction costs (which include
monitoring for compliance) are reduced, then initial assignments of property rights
become un-important because people will negotiate their way to the most efficient
allocation of resources.
Transaction costs include trying to figure out how to comply with a regulation, or
guessing what actions a jury would pin liability on after an accident.
Would consumers bargain for perfectly safe devices?
Coase’s take
on the Coase
Theorem
“I don't like it because it's a
proposition about a system
in which there were no
transaction costs. It's a
system which couldn't exist.
And therefore it's quite
unimaginable.”
Photo by don_greene
Collective
Action
problems &
Uncertainty
Coase again, “There is no reason why, on
occasion... governmental administrative
regulation should not lead to an improvement
in economic efficiency,...this would seem
particularly likely when, as is normally the case
with the smoke nuisance, a large number of
people are involved and in which therefore the
costs of handling the problem through the
market or the firm may be high”
Photo by 1ulian
Who is the
least-cost risk
avoider?
Who is best positioned to take
actions to avoid bad outcomes?
Is it the company that created a
particular device?
A consumer who failed to apply a
patch or used a device in an
unanticipated manner?
A hacker who broke into a device
that was connected to the internet?
Externalities
Regulations and liability
schemes try to
internalize externalities
Photo by seanpbarry
Compliance,
Auditing
&
Vendor
Reviews
Risk Management Frameworks
Companies have been figuring out ways to negotiate with each other about
software services.
If we look at the rise of compliance and risk management frameworks, as well as the
development of standard contracting terms, we will see the industry trying to create
standards to protect their data and systems. In many ways these frameworks are
similar to regulatory regimes, in that they can be a known set of requirements
imposed ex-ante on a software service.
Auditing & Compliance Standards
Companies have begun taking vendor security more seriously, and are often now
reviewing their vendors and at the same time being reviewed by their business
partners or companies for which they are vendors.
These could be analogized to the various regulations that apply to some industries in
the US. Companies also often negotiate contracts with each other, requiring that
their business partners use reasonable security to protect confidential data or PII,
and contracting around representations, warranties, and SLAs. These, especially
requirements for "commercially reasonable security measures" could be analogized
to the ex-post liability regimes.
Thank you
@wendyck
wendy@wendyk.org
Photo by premierehdr

More Related Content

What's hot

SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPNick Selby
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsShawn Tuma
 
Cloud computing and hipaa navigating and mitigating the inevitable data breach
Cloud computing and hipaa   navigating and mitigating the inevitable data breachCloud computing and hipaa   navigating and mitigating the inevitable data breach
Cloud computing and hipaa navigating and mitigating the inevitable data breachPolsinelli PC
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
Cyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseCyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseShawn Tuma
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data BreachShawn Tuma
 
2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guideJames Fisher
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...Adam Thierer
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory LansdcapeBrian Bauer
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...Penelope Toth
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE Sarah Stogner
 
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...Penelope Toth
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Financial instituttion security article
Financial instituttion security articleFinancial instituttion security article
Financial instituttion security articleJoseph_S_Harrington
 
11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 aIT Strategy Group
 

What's hot (20)

SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
 
Cloud computing and hipaa navigating and mitigating the inevitable data breach
Cloud computing and hipaa   navigating and mitigating the inevitable data breachCloud computing and hipaa   navigating and mitigating the inevitable data breach
Cloud computing and hipaa navigating and mitigating the inevitable data breach
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
Cyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseCyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach Response
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
 
2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
HEMISPHERE SMB Case Study
HEMISPHERE SMB Case StudyHEMISPHERE SMB Case Study
HEMISPHERE SMB Case Study
 
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Financial instituttion security article
Financial instituttion security articleFinancial instituttion security article
Financial instituttion security article
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a
 

Similar to Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017

Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelPaul Di Gangi
 
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...Patton Boggs LLP
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Usersjyates
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals Richard Brzakala
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White PaperTodd Ruback
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paperspencerharry
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Trust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology RiskTrust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology RiskSwatantra Kumar
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Dana Gardner
 
2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity SurveyAdobe
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
SolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event ManagerSolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event ManagerSolarWinds
 

Similar to Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017 (20)

Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Users
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Trust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology RiskTrust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology Risk
 
Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
 
2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
SolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event ManagerSolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event Manager
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 

More from Wendy Knox Everette

FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)Wendy Knox Everette
 
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...Wendy Knox Everette
 
Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021Wendy Knox Everette
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"Wendy Knox Everette
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work togetherWendy Knox Everette
 
Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019Wendy Knox Everette
 
Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Wendy Knox Everette
 
SeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeSeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeWendy Knox Everette
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaWendy Knox Everette
 
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Wendy Knox Everette
 

More from Wendy Knox Everette (13)

FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)
 
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
 
Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019
 
Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018
 
SeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeSeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & Me
 
Green Locks for You and Me
Green Locks for You and MeGreen Locks for You and Me
Green Locks for You and Me
 
An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
 
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
 

Recently uploaded

如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955Abheet Mangleek
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 

Recently uploaded (20)

如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 

Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017

  • 1. Regulatory nets vs the fishing hook of litigation Wendy Knox Everette @wendyck BSides Las Vegas 2017
  • 2. Regulation might be a dirty word in today's political climate, but security is the exception to our small-government bias. And as the threats posed by computers become greater and more catastrophic, regulation will be inevitable. So now's the time to start thinking about it. - Bruce Schneier, Feb 2017
  • 3. I am a lawyer, but I am not your lawyer. This is not legal advice. Instead, we are going to talk about how to think about incentivizing safer and more secure computer software. Photo by dakiny
  • 4. Who am I? @wendyck ● Software developer ‘99 - ‘13 ● GMU Law School, National Security Law Concentration, ‘13 - ‘16 ● ZwillGen Fellow ‘16 - ‘17 Photo by dakiny
  • 5. Regulation - in the US, on a few verticals vs Liability - contractual provisions, very little software product liability What we have now:
  • 6. Liability Tort or contract liability imposed in a civil court, such as the famous McDonald's hot coffee law suit.
  • 7. Tort Liability is based on negligence or strict liability (as in product liability)
  • 8. Contract Liability Users can enter into agreements to indemnify each other, agree on the services and goods they will exchange, and receive contract breach damages if the agreement falls apart
  • 9. Regulation The imposition of rules by a government body, such as speed limits or nutrition labels on food Photo by clry2
  • 10. Are these a difference without a distinction? No, they are not! Proponents of software liability often favor it as protective of innovation, and indeed the US has generally limited software liability so far in part to allow the computer software industry to develop and innovate. Meanwhile, proponents of regulation endorse the certainty and clarity that can come from laying out a baseline set of requirements ahead of time. (But are US regulations really all that clear? Are they too prescriptive in some instances? When that occurs, do they make us less secure?)
  • 11. Ex ante vs Ex Post Tort liability, as with negligence and product liability is an ex-post scheme, because any liability is imposed based on past actions, after a product has been released. In contrast, something like HIPAA regulations are considered to be ex-ante, as they apply before a piece of software is released, and they will influence the design of the software to comply with their regulatory provisions.
  • 12. How do we best incentivize security? Attempt to fix responsibility wherever it will most effectively reduce hazards to life and health inherent in defective products that reach the market
  • 13. So which is better? This is a complicated question, and this talk will not aim to definitely endorse one or the other. But lets look at some considerations on each side….
  • 14. Liability regime pros & cons ● Ex-post scheme: no harm, no liability ● Allows for innovation ● At the same time, this can lead to uncertainty which may actually lead to excessive risk- avoidance behavior
  • 15. Consumer Suits US Courts have so far been reluctant to impose liability for software bugs, data breaches, and so forth, in suits brought by consumers because there has been no physical harm to consumers. Some suits have been brought by consumers alleging violations of various laws like the Video Privacy Protection Act, but these are niche harms, and are often still dismissed by courts based on lack of substantial harm
  • 17. Regulatory regime pros & cons Although regulations may be ex-ante, they may still lead to uncertainty. Generalized requirements, meant to avoid locking-in a particular technology and therefore impeding innovation, may be so vaguely worded that companies are unsure how to interpret and apply the regulation to their products. Photo by irenicrhonda
  • 18. Regulations can impose burdensome requirements, and be slow to update, making them a poor fit for a field like technology that changes quickly Photo by aftab
  • 19. Just a sampling of US regulations affecting computer security ● FTC §5 authority protects consumers from deceptive & unfair practices ● HIPAA (protects personal health information) ● SEC Cybersecurity rules ● NHTSA Automotive cybersecurity ● NY State Department of Financial Services Cybersecurity Rules Photo by plasticbag
  • 20. HIPAA HHS tasked to “develop regulations protecting the privacy and security of certain health information” HIPAA Security Rule: ● Ensure the confidentiality, integrity, and availability of e-PHI created, received, maintained or transmited ● Identify and protect against reasonably anticipated threats to the security or integrity of the information ● Protect against reasonably anticipated, impermissible uses or disclosures Photo by Jan Erik Waider
  • 21. GDPR The EU's General Data Protection Regime is a new set of regulations set to take effect in May 2018. ● Will end up affecting many companies in the US due to its broad scope ● For companies outside of regulated industries like finance and healthcare, the GDPR requirements may be the most stringent regulations affecting them Photo by volvob12b
  • 22. Harold Feld on FCC Net Neutrality regulations
  • 24. Bounded Risk If regulations apply to more companies, we might see more risk avoidance behavior (because now it is clear that a particular activity violates a particular regulation) or we might see more risk taking (because at worst a company might be subject to a known fine, which it decides is an acceptable risk to bear) Photo by Kundan Ramisetti
  • 25. Balancing innovation with due care Should the goal be to make bad products pricier? Ex-post liability depends on the assumption that consumers correctly gauge their risk levels & that all consumers have the same risk-utility curves Photo by Mike Sutherland
  • 26. Reducing transaction costs The Coase Theorem in economics states that if transaction costs (which include monitoring for compliance) are reduced, then initial assignments of property rights become un-important because people will negotiate their way to the most efficient allocation of resources. Transaction costs include trying to figure out how to comply with a regulation, or guessing what actions a jury would pin liability on after an accident. Would consumers bargain for perfectly safe devices?
  • 27. Coase’s take on the Coase Theorem “I don't like it because it's a proposition about a system in which there were no transaction costs. It's a system which couldn't exist. And therefore it's quite unimaginable.” Photo by don_greene
  • 28. Collective Action problems & Uncertainty Coase again, “There is no reason why, on occasion... governmental administrative regulation should not lead to an improvement in economic efficiency,...this would seem particularly likely when, as is normally the case with the smoke nuisance, a large number of people are involved and in which therefore the costs of handling the problem through the market or the firm may be high” Photo by 1ulian
  • 29. Who is the least-cost risk avoider? Who is best positioned to take actions to avoid bad outcomes? Is it the company that created a particular device? A consumer who failed to apply a patch or used a device in an unanticipated manner? A hacker who broke into a device that was connected to the internet?
  • 30. Externalities Regulations and liability schemes try to internalize externalities Photo by seanpbarry
  • 32. Risk Management Frameworks Companies have been figuring out ways to negotiate with each other about software services. If we look at the rise of compliance and risk management frameworks, as well as the development of standard contracting terms, we will see the industry trying to create standards to protect their data and systems. In many ways these frameworks are similar to regulatory regimes, in that they can be a known set of requirements imposed ex-ante on a software service.
  • 33. Auditing & Compliance Standards Companies have begun taking vendor security more seriously, and are often now reviewing their vendors and at the same time being reviewed by their business partners or companies for which they are vendors. These could be analogized to the various regulations that apply to some industries in the US. Companies also often negotiate contracts with each other, requiring that their business partners use reasonable security to protect confidential data or PII, and contracting around representations, warranties, and SLAs. These, especially requirements for "commercially reasonable security measures" could be analogized to the ex-post liability regimes.

Editor's Notes

  1. The legal and policy choices would lead to more secure and safer software and computing-enabled devices
  2. What sort of legal and policy choices lead to more secure and safer software and computing-enabled devices? https://www.schneier.com/blog/archives/2017/02/security_and_th.html
  3. https://www.flickr.com/photos/dakiny/32881123852
  4. https://www.flickr.com/photos/dakiny/32881123852
  5. A patchwork of regulations imposed on a few verticals (finance, healthcare, and education in particular), and a complex web of compliance frameworks, contractual provisions, and consumer lawsuits
  6. Why did PL develop? - insurance function - want incentives make products safer Are these efficient? - 1st party insurance is more efficient than 3rd party insurance - could get disability insurance, rather than prove a defect in a product, have to share wins w/ lawyer - Ideology behind PL: paternalistic, consumers not knowledgeable
  7. https://www.flickr.com/photos/clry2/8282445472
  8. https://www.flickr.com/photos/jfew/294316629/
  9. Ex-ante uncertainty: if I take this action, could someone later impose some liability on me for it?
  10. NY DFS https://www.flickr.com/photos/irenicrhonda/8987718232
  11. Can be more like strict liability in some instances but not all Consumer private right of action https://www.flickr.com/photos/aftab/5963074999
  12. https://www.flickr.com/photos/plasticbag/35326646211
  13. HIPAA Security Rule Standards and Implementation Specifications Required vs addressable implementation specification https://unsplash.com/collections/493637/deep-blue?photo=JYvF1iMJpTY Photo by Jan Erik Waider on Unsplash
  14. https://www.flickr.com/photos/volvob12b/12921298264
  15. https://unsplash.com/collections/493637/deep-blue?photo=OODWPtfXAF0 Photo by Kundan Ramisetti on Unsplash
  16. (depends on assumption that consumers underestimate risk) (also considering that people have same risk utility curves) https://www.flickr.com/photos/156015048@N08/35190304552 - Mike Sutherland
  17. https://www.flickr.com/photos/don_greene/5959054783
  18. https://www.flickr.com/photos/1ulian/8921213863
  19. Tort law seeks to put blame on least cost risk avoider
  20. https://www.flickr.com/photos/seanpbarry/815847472/
  21. https://www.flickr.com/photos/156015048@N08/35190301372
  22. We will briefly explore why companies might prefer to combine these methods, and what that might say about the current US landscape.
  23. https://www.flickr.com/photos/premierehdr/14450637756