Heartland Payment Systems Data Breach: Legal and Regulatory Analysis

Verified

Added on  2021/04/17

|5
|754
|36
Case Study
AI Summary
This case study examines the Heartland Payment Systems data breach, which occurred due to computer theft and exposed the data of approximately 130 million credit and debit cards. The breach notification letter, issued on May 8, 2015, is analyzed in the context of the Merchant Bill of Rights and the Sales Professional Bill of Rights, highlighting the legal and regulatory violations. The study explores the responses from law enforcement agencies and regulators, and Heartland's efforts to enhance security measures. Furthermore, the case study looks into the vagueness of the letter and its impact on affected parties, while also discussing the insurance and security steps Heartland has taken, such as encrypting most of their computers, to protect sensitive information and avoid confusion. This case offers valuable insights into data breach notification laws and their practical implications.
Document Page
Running head: BREACH NOTIFICATION LAW LETTER
Breach Notification Law Letter
(Case Study of Heartland)
Name of the student:
Name of the university:
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1BREACH NOTIFICATION LAW LETTER
Heartland issues breach notification letters after computer theft:
Data breach is the incident where data is stolen from any system. This is done
hiding from authorization and knowledge of system’s owners. A data breach notification
letter is sent from the company to customers or employees notifying about various data
breaches involved.
The following study demonstrates the incident of the “Heartland Payment System
that was notified that their data might be compromised. The event took place on May 8,
2015, when the issues breach notification letter as the computer theft took place.
The letter revealed that data exposure occurred because of a break-in at an office
that included stolen computers. It exposed about 130 million credit and debit cards of
United States.
There have been specific laws that have been alleged to be violated as mentioned in
the breach notification letter. The first one was the Merchant Bill of Rights, of which
Heartland has been the founding supporter. It is an initiative of public advocacy educating
merchants regarding fair debit and credit card processing (Sloan & Warner, 2017). Another
law that was broken was Sales Professional Bill of Rights. This right was meant to
advocate rights of sales professionals at every place.
Various items like password protected computers of Heartland got stolen. There, a
social security number and information regarding bank account were processed by an
employer. Here law enforcement agencies and federal and state regulators were
responsible for assisting Heartland to find the way to go through with the matter quickly.
They continued to analyze the case carefully. Thus they enhanced their review procedures
Document Page
2BREACH NOTIFICATION LAW LETTER
and internal security. This helped them to watch unusual activities (Bisogni, 2016). The
letter was set to make aware of the abundance of caution. This was useful to undertake
steps to protect information away from unauthorized usage. These steps were put down in
details within enclosed state notification requirements.
Various appropriate responses to the message that is to be sent to the victim are
discussed hereafter.
Public Persona:
It controls public record databases for addresses, aliases and names related to
social security number. Here the records include court proceedings, state technical license
data and various data sources (Weiss & Miller, 2015).
Quick Cash Scan:
It controls numerous cash-advance and short-term loan sources like payday lenders
and rent-to-own. They are also called “non-credit” loans since the application process never
includes a credit check and make that easy to use fraudulent or stolen identity data.
$1 Million Identity Theft Insurance:
This must help Heartland for their out-of-pocket costs summed up to one million in
legal expenses for stolen identity event. Here all the coverage gets subjected to exclusions
and conditions in that policy.
Thus the study shows that the letter has been intentionally vague, serving the basic
to those affected to avoid confusion. Irrespective of the possibilities, it cannot be
determined that the breach left unencrypted data at risk (Pierce, 2015). Hence as a part of
Document Page
3BREACH NOTIFICATION LAW LETTER
their ongoing commitment to security, Heartland has started to encrypt most of the
computers.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4BREACH NOTIFICATION LAW LETTER
References:
Bisogni, F. (2016). Proving Limits of State Data Breach Notification Laws: Is a Federal Law
the Most Adequate Solution?. Journal of Information Policy, 6(1), 154-205.
Pierce, J. C. (2015). Shifting data breach liability: a congressional approach. Wm. & Mary
L. Rev., 57, 975.
Sloan, R. H., & Warner, R. (2017). How Much Should We Spend to Protect Privacy?: Data
Breaches and the Need for Information We Do Not Have.
Weiss, N. E., & Miller, R. S. (2015, February). The target and other financial data breaches:
Frequently asked questions. In Congressional Research Service, Prepared for
Members and Committees of Congress February (Vol. 4, p. 2015).
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]