메뉴 건너뛰기




Volumn 80, Issue 2, 2007, Pages 241-297

Reservoirs of danger: The evolution of public and private law at the dawn of the information age

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33947681687     PISSN: 00383910     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (45)

References (415)
  • 1
    • 33947627187 scopus 로고    scopus 로고
    • See generally MARTIN REES, OUR FINAL HOUR: A SCIENTIST'S WARNING: HOW TERROR, ERROR, AND ENVIRONMENTAL DISASTER THREATEN HUMANKIND'S FUTURE IN THIS CENTURY - ON EARTH AND BEYOND (2003) (discussing threats arising in the wake of recent developments in bio-, cyber-, and nanotechnology);
    • See generally MARTIN REES, OUR FINAL HOUR: A SCIENTIST'S WARNING: HOW TERROR, ERROR, AND ENVIRONMENTAL DISASTER THREATEN HUMANKIND'S FUTURE IN THIS CENTURY - ON EARTH AND BEYOND (2003) (discussing threats arising in the wake of recent developments in bio-, cyber-, and nanotechnology);
  • 3
    • 33947707369 scopus 로고    scopus 로고
    • See U.S. FEDERAL TRADE COMM'N, INFORMATION COMPROMISE AND THE RISK OF IDENTITY THEFT: GUIDANCE FOR YOUR BUSINESS (June 2004), available at http://www.ftc.gov/bcp/edu/ pubs/business/idtheft/bus59.pdf [hereinafter FTC, INFORMATION COMPROMISE];
    • See U.S. FEDERAL TRADE COMM'N, INFORMATION COMPROMISE AND THE RISK OF IDENTITY THEFT: GUIDANCE FOR YOUR BUSINESS (June 2004), available at http://www.ftc.gov/bcp/edu/ pubs/business/idtheft/bus59.pdf [hereinafter FTC, INFORMATION COMPROMISE];
  • 4
    • 33947710113 scopus 로고    scopus 로고
    • Technology and Easy Credit Give Identity Thieves an Edge
    • May 30, at
    • John Leland & Tom Zeller, Jr., Technology and Easy Credit Give Identity Thieves an Edge, N.Y. TIMES, May 30, 2006, at A1;
    • (2006) N.Y. TIMES
    • Leland, J.1    Zeller Jr., T.2
  • 5
    • 33947697284 scopus 로고    scopus 로고
    • Senator Clinton Speaks on Privacy Rights to American Constitution Society, U.S. FED. NEWS, June 16, 2006, available at 2006 WLNR 10544222.
    • Senator Clinton Speaks on Privacy Rights to American Constitution Society, U.S. FED. NEWS, June 16, 2006, available at 2006 WLNR 10544222.
  • 6
    • 33947693899 scopus 로고    scopus 로고
    • See LAWRENCE M. FRIEDMAN, A HISTORY OF AMERICAN LAW 350, 364-65 (3d ed. 2005);
    • See LAWRENCE M. FRIEDMAN, A HISTORY OF AMERICAN LAW 350, 364-65 (3d ed. 2005);
  • 7
    • 33947658002 scopus 로고    scopus 로고
    • Oliver Wendell Holmes, The Path of the Law, 10 HARV. L. REV. 457, 467 (1897) (highlighting a shift in the late nineteenth century from wrongs, such as assault and battery, to those involving the incidents of industry).
    • Oliver Wendell Holmes, The Path of the Law, 10 HARV. L. REV. 457, 467 (1897) (highlighting a shift in the late nineteenth century from wrongs, such as assault and battery, to those involving the "incidents" of industry).
  • 8
    • 33947701662 scopus 로고    scopus 로고
    • Rylands v. Fletcher, (1868) 3 L.R.E. & I. App. 330 (H.L.).
    • Rylands v. Fletcher, (1868) 3 L.R.E. & I. App. 330 (H.L.).
  • 9
    • 33947709488 scopus 로고    scopus 로고
    • See infra Part V.B.
    • See infra Part V.B.
  • 10
    • 33947675931 scopus 로고    scopus 로고
    • See Leland & Zeller, supra note 2
    • See Leland & Zeller, supra note 2.
  • 11
    • 1842606409 scopus 로고    scopus 로고
    • A Thousand Words Are Worth a Picture: A Privacy Tort Response to Consumer Data Profiling, 98
    • Andrew J. McClurg, A Thousand Words Are Worth a Picture: A Privacy Tort Response to Consumer Data Profiling, 98 NW. U. L. REV. 63, 65 (2003).
    • (2003) NW. U. L. REV , vol.63 , pp. 65
    • McClurg, A.J.1
  • 12
    • 84900270514 scopus 로고    scopus 로고
    • See also DANIEL J. SOLOVE, THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE 16-26 (2004) (discussing the history of private sector databases).
    • See also DANIEL J. SOLOVE, THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE 16-26 (2004) (discussing the history of private sector databases).
  • 13
    • 33947638039 scopus 로고    scopus 로고
    • See FRIEDMAN, supra note 3, at 350-68
    • See FRIEDMAN, supra note 3, at 350-68.
  • 14
    • 33947648546 scopus 로고    scopus 로고
    • See Phillip Britt, Survey: Government Struggles with Data Breaches, INFO. TODAY, Jan. 1, 2006, at 48 (Like thieves [who] rob banks because 'that's where the money is,' computer attackers target databases because that's where the data is.);
    • See Phillip Britt, Survey: Government Struggles with Data Breaches, INFO. TODAY, Jan. 1, 2006, at 48 ("Like thieves [who] rob banks because 'that's where the money is,' computer attackers target databases because that's where the data is.");
  • 15
    • 33947710834 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse, A Chronology of Data Breaches Since the ChoicePoint Incident, http://www.privacyrights.org/ar/ChronDataBreaches.htm (last visited Aug. 1, 2006) [hereinafter Privacy Rights, Chronology].
    • Privacy Rights Clearinghouse, A Chronology of Data Breaches Since the ChoicePoint Incident, http://www.privacyrights.org/ar/ChronDataBreaches.htm (last visited Aug. 1, 2006) [hereinafter Privacy Rights, Chronology].
  • 16
    • 33947693369 scopus 로고    scopus 로고
    • See FTC, INFORMATION COMPROMISE, supra note 2;
    • See FTC, INFORMATION COMPROMISE, supra note 2;
  • 17
    • 33947613174 scopus 로고    scopus 로고
    • Peter P. Swire, Efficient Confidentiality for Privacy, Security, and Confidential Business Information, 2003 BROOKINGS-WHARTON PAPERS ON FIN. SERVS. 273, 290, available at http://muse.jhu.edu/journals/brookings-wharton_papers_on_financial_servi ces/ v2003/2003.1swire.html; Leland & Zeller, supra note 2;
    • Peter P. Swire, Efficient Confidentiality for Privacy, Security, and Confidential Business Information, 2003 BROOKINGS-WHARTON PAPERS ON FIN. SERVS. 273, 290, available at http://muse.jhu.edu/journals/brookings-wharton_papers_on_financial_services/ v2003/2003.1swire.html; Leland & Zeller, supra note 2;
  • 18
    • 33947692300 scopus 로고    scopus 로고
    • Veterans Agency to Atone with Free Credit Monitoring
    • June 22, at
    • David Stout, Veterans Agency to Atone with Free Credit Monitoring, N.Y. TIMES, June 22, 2006, at A17.
    • (2006) N.Y. TIMES
    • Stout, D.1
  • 19
    • 33947675930 scopus 로고    scopus 로고
    • See ELTING E. MORISON, MEN, MACHINES, AND MODERN TIMES 54 (1966) (explaining that certain government employees spent their whole lives assembling the medical and salary records of U.S. soldiers in paper-filing systems during the early part of the twentieth century); SOLOVE, supra note 7, at 14.
    • See ELTING E. MORISON, MEN, MACHINES, AND MODERN TIMES 54 (1966) (explaining that certain government employees spent their "whole lives" assembling the medical and salary records of U.S. soldiers in paper-filing systems during the early part of the twentieth century); SOLOVE, supra note 7, at 14.
  • 20
    • 33947705281 scopus 로고    scopus 로고
    • ROBERT O'HARROW, JR., NO PLACE TO HIDE 4-5 (2005).
    • ROBERT O'HARROW, JR., NO PLACE TO HIDE 4-5 (2005).
  • 21
    • 33947612679 scopus 로고    scopus 로고
    • Moore's Law Corollary: Pixel Power
    • June 7, at
    • Nathan Myhrvold, Moore's Law Corollary: Pixel Power, N.Y. TIMES, June 7, 2006, at G3.
    • (2006) N.Y. TIMES
    • Myhrvold, N.1
  • 22
    • 33947643749 scopus 로고    scopus 로고
    • Researchers Say New Chip Breaks Speed Record
    • June 20, at
    • Laurie J. Flynn, Researchers Say New Chip Breaks Speed Record, N.Y. TIMES, June 20, 2006, at C7.
    • (2006) N.Y. TIMES
    • Flynn, L.J.1
  • 23
    • 33947692856 scopus 로고    scopus 로고
    • See id.; Press Release, IBM, IBM and Georgia Tech Break Silicon Speed Record (June 20, 2006), http://www-03.ibm.com/press/us/en/pressrelease/ 19843.wss (explaining that the recent breakthrough will redefine[] the performance limits of silicon-based semiconductors and that IBM will be working closely with academic and industry partners to deliver a new generation of high-performance, energy-efficient microprocessing).
    • See id.; Press Release, IBM, IBM and Georgia Tech Break Silicon Speed Record (June 20, 2006), http://www-03.ibm.com/press/us/en/pressrelease/ 19843.wss (explaining that the recent breakthrough will "redefine[] the performance limits of silicon-based semiconductors" and that IBM will be working closely with academic and industry partners to deliver a new generation of high-performance, energy-efficient microprocessing).
  • 24
    • 33645159715 scopus 로고    scopus 로고
    • Data Mine
    • Dec. 19, at
    • Daniel B. Prieto, Data Mine, NEW REPUBLIC, Dec. 19, 2005, at 17.
    • (2005) NEW REPUBLIC , pp. 17
    • Prieto, D.B.1
  • 25
    • 33947676945 scopus 로고    scopus 로고
    • See also John Markoff & Saul Hansell, Hiding in Plain Sight, Google Seeks an Expansion of Power, N.Y. TIMES, June 14, 2006, at A1 (describing Google as a leader in the effort to build a network of supercomputers that can process more data and searches at speeds constrained only by the speed of light).
    • See also John Markoff & Saul Hansell, Hiding in Plain Sight, Google Seeks an Expansion of Power, N.Y. TIMES, June 14, 2006, at A1 (describing Google as a leader in the effort to build a network of supercomputers that can process more data and searches at speeds constrained only by the speed of light).
  • 26
    • 33947676449 scopus 로고    scopus 로고
    • See J. Nicholas Hoover, High-Stakes Data Mining, INFO.WEEK, May 22, 2006, at 21, 23.
    • See J. Nicholas Hoover, High-Stakes Data Mining, INFO.WEEK, May 22, 2006, at 21, 23.
  • 27
    • 33947677757 scopus 로고    scopus 로고
    • Data - The Squeeze Is on - Today's Digital Data Explosion Is the Stuff of Legend
    • Nov. 24, at
    • Jon William Toigo, Data - The Squeeze Is on - Today's Digital Data Explosion Is the Stuff of Legend, NETWORK COMPUTING, Nov. 24, 2005, at S3.
    • (2005) NETWORK COMPUTING
    • William Toigo, J.1
  • 28
    • 33947691735 scopus 로고    scopus 로고
    • See also JEFFREY W. SEIFERT, CONGRESSIONAL RESEARCH SERVICE REPORT FOR CONGRESS, REPORT No. RL31798, DATA MINING AND HOMELAND SECURITY: AN OVERVIEW 2 (Jan. 27, 2006), available at http://www.fas.org/sgp/crs/intel/RL31798. pdf (noting that the decreased cost of data storage has contributed to the nation's increasing interest in data mining).
    • See also JEFFREY W. SEIFERT, CONGRESSIONAL RESEARCH SERVICE REPORT FOR CONGRESS, REPORT No. RL31798, DATA MINING AND HOMELAND SECURITY: AN OVERVIEW 2 (Jan. 27, 2006), available at http://www.fas.org/sgp/crs/intel/RL31798. pdf (noting that the decreased cost of data storage has contributed to the nation's increasing interest in data mining).
  • 29
    • 33947626698 scopus 로고    scopus 로고
    • O'HARROW, supra note 12, at 145. See also Joseph Menn, ChoicePoint Is Fined for Data Breach, L.A. TIMES, Jan. 27, 2006, at C1 (noting that ChoicePoint stores 19 billion records).
    • O'HARROW, supra note 12, at 145. See also Joseph Menn, ChoicePoint Is Fined for Data Breach, L.A. TIMES, Jan. 27, 2006, at C1 (noting that ChoicePoint stores 19 billion records).
  • 30
    • 33947642715 scopus 로고    scopus 로고
    • Gates's Lieutenants Look Ahead, Hoping to Avoid Other Companies' Mistakes
    • June 17, at
    • John Markoff, Gates's Lieutenants Look Ahead, Hoping to Avoid Other Companies' Mistakes, N.Y. TIMES, June 17, 2006, at C1.
    • (2006) N.Y. TIMES
    • Markoff, J.1
  • 31
    • 33947711862 scopus 로고    scopus 로고
    • U.S. GOV'T ACCOUNTABILITY OFFICE, SOC. SEC. NUMBERS: MORE COULD BE DONE TO PROTECT SSNS, GAO REP. NO. GAO-06-586T, TESTIMONY BEFORE THE SUBCOMM. ON SOC. SEC., COMM. ON WAYS AND MEANS, H.R. 3 (Mar. 30, 2006) (statement of Cynthia M. Fagnoni, Managing Director of Education, Workforce, and Income Security Issues), available at http://www.gao.gov/new.items/d06586t.pdf [hereinafter GAO, MORE COULD BE DONE].
    • U.S. GOV'T ACCOUNTABILITY OFFICE, SOC. SEC. NUMBERS: MORE COULD BE DONE TO PROTECT SSNS, GAO REP. NO. GAO-06-586T, TESTIMONY BEFORE THE SUBCOMM. ON SOC. SEC., COMM. ON WAYS AND MEANS, H.R. 3 (Mar. 30, 2006) (statement of Cynthia M. Fagnoni, Managing Director of Education, Workforce, and Income Security Issues), available at http://www.gao.gov/new.items/d06586t.pdf [hereinafter GAO, MORE COULD BE DONE].
  • 32
    • 33947694413 scopus 로고    scopus 로고
    • This Article focuses on the collection of sensitive personal information by the large section of the private sector that is likely to remain unregulated by federal law. See infra text accompanying notes 98-108
    • This Article focuses on the collection of sensitive personal information by the large section of the private sector that is likely to remain unregulated by federal law. See infra text accompanying notes 98-108.
  • 33
    • 33947691733 scopus 로고    scopus 로고
    • BRUCE SCHNEIER, BEYOND FEAR: THINKING SENSIBLY ABOUT SECURITY IN AN UNCERTAIN WORLD 114 (2003, SOLOVE, supra note 7, at 116. Federal law requires the collection of SSNs for the administration of the federal personal income tax, Medicaid, Child Support Enforcement programs, and to ensure compliance with the USA Patriot Act. U.S. GOV'T ACCOUNTABILITY OFFICE, SOC. SEC. NUMBERS: FEDERAL AND STATE LAWS RESTRICT USE OF SSNS, YET GAPS REMAIN, GAO REP. NO. GAO-05-1016T, at 6, 9-10 & n.14, 11, 20-21 (Sept. 15, 2005, statement of Barbara D. Bovbjerg, Director of Education, Workforce, and Income Security Issues, available at See also 26 U.S.C. § 6109a, 2000, inco
    • BRUCE SCHNEIER, BEYOND FEAR: THINKING SENSIBLY ABOUT SECURITY IN AN UNCERTAIN WORLD 114 (2003); SOLOVE, supra note 7, at 116. Federal law requires the collection of SSNs for the administration of the federal personal income tax, Medicaid, Child Support Enforcement programs, and to ensure compliance with the USA Patriot Act. U.S. GOV'T ACCOUNTABILITY OFFICE, SOC. SEC. NUMBERS: FEDERAL AND STATE LAWS RESTRICT USE OF SSNS, YET GAPS REMAIN, GAO REP. NO. GAO-05-1016T, at 6, 9-10 & n.14, 11, 20-21 (Sept. 15, 2005) (statement of Barbara D. Bovbjerg, Director of Education, Workforce, and Income Security Issues), available at http://www.gao.gov/new.items/d051016t.pdf. See also 26 U.S.C. § 6109(a) (2000) (income tax); USA Patriot Act of 2001, 31 U.S.C. § 5318A(b)(3)(B) (Supp. II 2002); 42 U.S.C.A. § 666(a)(13)(B) (West Supp. 2006) (child support); 42 U.S.C. § 1320b-7(a)(1), (b)(2) (2000) (Medicaid). Although federal law restricts the public disclosure of SSNs by credit reporting agencies, banks, and health care providers, no federal legislation addresses the collection and disclosure of SSNs by employers, retailers, and information resellers.
  • 34
    • 33947648545 scopus 로고    scopus 로고
    • See Privacy Rights Clearinghouse, My Social Security Number: How Secure Is It? (Jan. 2006), http://www.privacyrights.org/fs/fs10-ssn.htm; infra text accompanying notes 73-76.
    • See Privacy Rights Clearinghouse, My Social Security Number: How Secure Is It? (Jan. 2006), http://www.privacyrights.org/fs/fs10-ssn.htm; infra text accompanying notes 73-76.
  • 35
    • 33947673523 scopus 로고    scopus 로고
    • FTC, INFORMATION COMPROMISE, supra note 2.
    • FTC, INFORMATION COMPROMISE, supra note 2.
  • 36
    • 33947615840 scopus 로고    scopus 로고
    • See Hearing Before the H. Energy Commerce Reps. and Subcomm. on Commerce, Trade and Consumer Protection, 109th Cong. (2006) (statement of H.R. Lively, President and CEO for the American Financial Services Association), available at http://energycommerce.house.gov/108/Hearings/ 05112006hearing1871/Lively.pdf [hereinafter Lively Testimony].
    • See Hearing Before the H. Energy Commerce Reps. and Subcomm. on Commerce, Trade and Consumer Protection, 109th Cong. (2006) (statement of H.R. Lively, President and CEO for the American Financial Services Association), available at http://energycommerce.house.gov/108/Hearings/ 05112006hearing1871/Lively.pdf [hereinafter Lively Testimony].
  • 37
    • 33947704791 scopus 로고    scopus 로고
    • Lively Testimony, supra note 25 (explaining that SSNs are used to track employees in high-security positions); FREDERICK S. LANE III, THE NAKED EMPLOYEE: HOW TECHNOLOGY IS COMPROMISING WORKPLACE PRIVACY 28 (2003); Employees Sue over Data Theft, N.Y. TIMES, July 5, 2006, at C2 (describing a class-action lawsuit filed by employees of the Union Pacific Corporation for the company's use of SSNs to identify its employees).
    • Lively Testimony, supra note 25 (explaining that SSNs are used to track employees in high-security positions); FREDERICK S. LANE III, THE NAKED EMPLOYEE: HOW TECHNOLOGY IS COMPROMISING WORKPLACE PRIVACY 28 (2003); Employees Sue over Data Theft, N.Y. TIMES, July 5, 2006, at C2 (describing a class-action lawsuit filed by employees of the Union Pacific Corporation for the company's use of SSNs to identify its employees).
  • 38
    • 33947627185 scopus 로고    scopus 로고
    • Greg Sandoval, University Server in Hackers' Hands for a Year, ZDNET NEWS, May 21, 2006, http://news.zdnet.com/2100-1009_22- 6074739.html; Privacy Rights Clearinghouse, supra note 23. Although publicly funded schools governed by the Privacy Act of 1974 must tell students how their SSNs will be used, private institutes face few restrictions in their use of student and alumni SSNs. Privacy Rights Clearinghouse, supra note 23.
    • Greg Sandoval, University Server in Hackers' Hands for a Year, ZDNET NEWS, May 21, 2006, http://news.zdnet.com/2100-1009_22- 6074739.html; Privacy Rights Clearinghouse, supra note 23. Although publicly funded schools governed by the Privacy Act of 1974 must tell students how their SSNs will be used, private institutes face few restrictions in their use of student and alumni SSNs. Privacy Rights Clearinghouse, supra note 23.
  • 40
    • 33947697283 scopus 로고    scopus 로고
    • See also, note 21, at, explaining that 90% of businesses outsource the storage of personal data, such as SSNs, to third-party contractors
    • See also GAO, MORE COULD BE DONE, supra note 21, at 3-4 (explaining that 90% of businesses outsource the storage of personal data, such as SSNs, to third-party contractors).
    • supra , pp. 3-4
    • GAO, M.1    BE DONE, C.2
  • 41
    • 33947649097 scopus 로고    scopus 로고
    • See SOLOVE, supra note 7, at 19; Jonathan Krim, Net Aids Access to Sensitive ID Data, WASH. POST, Apr. 4, 2005, at A1 (describing numerous companies that sell SSNs for as low as thirty-five dollars on websites such as www.secret-info.com). One such firm, SixChannels, explains that it continuously gathers the personal data of consumers from a variety of sources, including title companies, credit bureaus, tax liens, and judgments. SixChannels, Next Generation Multichannel Marketing Solutions, Frequently Asked Questions, http://www.sixchannels.net/faq. asp (last visited Aug. 1, 2006).
    • See SOLOVE, supra note 7, at 19; Jonathan Krim, Net Aids Access to Sensitive ID Data, WASH. POST, Apr. 4, 2005, at A1 (describing numerous companies that sell SSNs for as low as thirty-five dollars on websites such as www.secret-info.com). One such firm, "SixChannels," explains that it continuously gathers the personal data of consumers from a variety of sources, including title companies, credit bureaus, tax liens, and judgments. SixChannels, Next Generation Multichannel Marketing Solutions, Frequently Asked Questions, http://www.sixchannels.net/faq. asp (last visited Aug. 1, 2006).
  • 42
    • 33947670958 scopus 로고    scopus 로고
    • See SOLOVE, supra note 7, at 81, 84 (explaining that [i]nformation collection is duplicitous, clandestine, and often coerced); Stephanie Kirchgaessner & Bob Sherwood, Companies Selling Personal Information Have Been Allowed to Operate Relatively Free of Regulation, FIN. TIMES (U.K.), May 20, 2005, at 17 (discussing how data brokers acquire individuals' names and addresses from credit agencies and supplement that information with data culled from public records); McClurg, supra note 7, at 65;
    • See SOLOVE, supra note 7, at 81, 84 (explaining that "[i]nformation collection is duplicitous, clandestine, and often coerced"); Stephanie Kirchgaessner & Bob Sherwood, Companies Selling Personal Information Have Been Allowed to Operate Relatively Free of Regulation, FIN. TIMES (U.K.), May 20, 2005, at 17 (discussing how data brokers acquire individuals' names and addresses from credit agencies and supplement that information with data culled from public records); McClurg, supra note 7, at 65;
  • 43
    • 33947621672 scopus 로고    scopus 로고
    • Leigh Webb, Personal Information - Asset or Risk?, IDENTITY THEFT 911 NEWSLETTER, Apr. 2006, at 1, available at http://www.identitytheft911-sunj.com/content.do?sp=323 (explaining that because of the increase in instances of personal data collection, often without the consumer's consent, more and more people are falling victim to identity theft).
    • Leigh Webb, Personal Information - Asset or Risk?, IDENTITY THEFT 911 NEWSLETTER, Apr. 2006, at 1, available at http://www.identitytheft911-sunj.com/content.do?sp=323 (explaining that because of the increase in instances of personal data collection, often without the consumer's consent, more and more people are falling victim to identity theft).
  • 44
    • 33947662593 scopus 로고    scopus 로고
    • E.g., Kirchgaessner & Sherwood, supra note 30, at 17 (noting that LexisNexis permits consumers to opt out of its database only in limited circumstances, despite the industry's previous commitment to permit such opt outs whenever a consumer requested them); Your Privacy for Sale, CONSUMER REP., Oct. 2006, available at http://www.consumerreports.org/cro/personal-finance/data-privacy-10-06/ a-steady-customer/1006_privacy_ov6_1.htm [hereinafter Your Privacy] (noting that the Pentagon refuses requests to opt out of its vast database).
    • E.g., Kirchgaessner & Sherwood, supra note 30, at 17 (noting that LexisNexis permits consumers to opt out of its database only in limited circumstances, despite the industry's previous commitment to permit such opt outs whenever a consumer requested them); Your Privacy for Sale, CONSUMER REP., Oct. 2006, available at http://www.consumerreports.org/cro/personal-finance/data-privacy-10-06/ a-steady-customer/1006_privacy_ov6_1.htm [hereinafter Your Privacy] (noting that the Pentagon refuses requests to opt out of its vast database).
  • 45
    • 33947654973 scopus 로고    scopus 로고
    • See also O'HARROW, supra note 12, at 138 (explaining that information broker ChoicePoint apparently does not allow individuals to opt out of its databases). When Consumer Reports investigators asked data brokers to permit them access to their own personal information, the data brokers informed them that they could not see everything that was routinely sold to businesses. Your Privacy, supra.
    • See also O'HARROW, supra note 12, at 138 (explaining that information broker ChoicePoint apparently does not allow individuals to opt out of its databases). When Consumer Reports investigators asked data brokers to permit them access to their own personal information, the data brokers informed them that they could not see everything that was routinely sold to businesses. Your Privacy, supra.
  • 46
    • 84893687732 scopus 로고    scopus 로고
    • See Gang Wei & Dongge Li, Biometrics: Applications, Challenges and the Future, in PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION 135, 136 (Katherine J. Strandburg & Daniela Stan Raicu eds., 2006);
    • See Gang Wei & Dongge Li, Biometrics: Applications, Challenges and the Future, in PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION 135, 136 (Katherine J. Strandburg & Daniela Stan Raicu eds., 2006);
  • 47
    • 33947625693 scopus 로고    scopus 로고
    • Alex Halperin, Biometrics: Payments at Your Fingerprints, BUS. WK. ONLINE, Mar. 28, 2006, http://www. businessweek.com/technology/content/mar2006/tc20060328_901806.htm?campai gn_id= search.
    • Alex Halperin, Biometrics: Payments at Your Fingerprints, BUS. WK. ONLINE, Mar. 28, 2006, http://www. businessweek.com/technology/content/mar2006/tc20060328_901806.htm?campaign_id= search.
  • 48
    • 33947659042 scopus 로고    scopus 로고
    • Halperin, supra note 32
    • Halperin, supra note 32.
  • 49
    • 33947659039 scopus 로고    scopus 로고
    • See Ishwar K. Sethi, Biometrics: Overview and Application, in PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION, supra note 32, at 117, 120-22. In certain biometric systems, individuals do not provide their biometric information for storage in a database but instead carry cards, known as Smart Cards, with their biometric data stored inside. Id. at 121. Such systems match biometric data contained in a card to the individual's characteristic, such as a fingerprint or iris. Id.
    • See Ishwar K. Sethi, Biometrics: Overview and Application, in PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION, supra note 32, at 117, 120-22. In certain biometric systems, individuals do not provide their biometric information for storage in a database but instead carry cards, known as Smart Cards, with their biometric data stored inside. Id. at 121. Such systems match biometric data contained in a card to the individual's characteristic, such as a fingerprint or iris. Id.
  • 51
    • 33947618578 scopus 로고    scopus 로고
    • Wei & Li, supra note 32, at 137 (explaining that biometric systems either identify an individual by matching the person's sample to the many samples in the database or verify an individual's identity by matching the sample to the template or image in the database with that name).
    • Wei & Li, supra note 32, at 137 (explaining that biometric systems either identify an individual by matching the person's sample to the many samples in the database or verify an individual's identity by matching the sample to the template or image in the database with that name).
  • 52
    • 33947695763 scopus 로고    scopus 로고
    • See JOHN D. WOODWARD, JR., NICHOLAS M. ORLANS & PETER T. HIGGINS, BIOMETRICS 329-52 (2003);
    • See JOHN D. WOODWARD, JR., NICHOLAS M. ORLANS & PETER T. HIGGINS, BIOMETRICS 329-52 (2003);
  • 53
    • 33947696778 scopus 로고    scopus 로고
    • Roger Allan, Biometrics Wields a Double-Edged Sword, ELECTRONIC DESIGN, June 30, 2005, at 77, available at http://www.elecdesign.com/Articles/ArticleID/10605/10605.html (describing massive databases of biometric data maintained by banking, security, and medical organizations). Technology sold by Identix Incorporated currently allows businesses to store up to twenty million fingerprints in a single computer database.
    • Roger Allan, Biometrics Wields a Double-Edged Sword, ELECTRONIC DESIGN, June 30, 2005, at 77, available at http://www.elecdesign.com/Articles/ArticleID/10605/10605.html (describing massive databases of biometric data maintained by banking, security, and medical organizations). Technology sold by Identix Incorporated currently allows businesses to store up to twenty million fingerprints in a single computer database.
  • 54
    • 33947665658 scopus 로고    scopus 로고
    • See IDENTIX, ABIS® SYSTEM FREQUENTLY ASKED QUESTIONS - VERSION 4.1, para. 12 (2005), available at http://www.identix.com/support/downloads/ ABIS%204-1%20FAQs%20Draft2_Customer%20Version_Final.pdf. Comnetix Inc. stores biometric image scans indefinitely and, for government users, can submit scans to the national fingerprint database for quick checks against criminal records.
    • See IDENTIX, ABIS® SYSTEM FREQUENTLY ASKED QUESTIONS - VERSION 4.1, para. 12 (2005), available at http://www.identix.com/support/downloads/ ABIS%204-1%20FAQs%20Draft2_Customer%20Version_Final.pdf. Comnetix Inc. stores biometric image scans indefinitely and, for government users, can submit scans to the national fingerprint database for quick checks against criminal records.
  • 55
    • 33947657999 scopus 로고    scopus 로고
    • John Breeden II, Biometrics Look Ready for Prime Time, GOV'T COMPUTER NEWS, Feb. 6, 2006, at 36, available at 2006 WLNR 2849844.
    • John Breeden II, Biometrics Look Ready for Prime Time, GOV'T COMPUTER NEWS, Feb. 6, 2006, at 36, available at 2006 WLNR 2849844.
  • 56
    • 33947657487 scopus 로고    scopus 로고
    • Halperin, supra note 32. One hundred seventy-six Bi-Lo grocery stores in Georgia, North Carolina, South Carolina, and Tennessee use fingerprint systems to allow customers to cash paychecks. O'HARROW, supra note 12, at 174-75.
    • Halperin, supra note 32. One hundred seventy-six Bi-Lo grocery stores in Georgia, North Carolina, South Carolina, and Tennessee use fingerprint systems to allow customers to cash paychecks. O'HARROW, supra note 12, at 174-75.
  • 57
    • 33947696776 scopus 로고    scopus 로고
    • Halperin, supra note 32; Greg Toppo, Eye Scans: A High-Tech Hall Pass?, USA TODAY, Feb. 23, 2006, at 12B (discussing the recent implementation of iris-scan technology as a security measure at a New Jersey elementary school).
    • Halperin, supra note 32; Greg Toppo, Eye Scans: A High-Tech Hall Pass?, USA TODAY, Feb. 23, 2006, at 12B (discussing the recent implementation of iris-scan technology as a security measure at a New Jersey elementary school).
  • 58
    • 33947657485 scopus 로고    scopus 로고
    • Coughlin, supra note 34; Elizabeth Fernandez, Fast-track Security Check OK'd for Airports, S.F. CHRON., Apr. 21, 2006, at B3 (discussing the Transportation Security Administration's recent approval of a plan to use fingerprint and iris scans to screen preregistered passengers at airport security checkpoints at twenty airports).
    • Coughlin, supra note 34; Elizabeth Fernandez, Fast-track Security Check OK'd for Airports, S.F. CHRON., Apr. 21, 2006, at B3 (discussing the Transportation Security Administration's recent approval of a plan to use fingerprint and iris scans to screen preregistered passengers at airport security checkpoints at twenty airports).
  • 59
    • 33947628792 scopus 로고    scopus 로고
    • Michael Sisk, Biometric Systems Replace the Lost Card Key, CRAIN'S N.Y. BUS., May 1, 2006, at 17.
    • Michael Sisk, Biometric Systems Replace the Lost Card Key, CRAIN'S N.Y. BUS., May 1, 2006, at 17.
  • 60
    • 33947700997 scopus 로고    scopus 로고
    • Joan Engebretson, How Security Dealers Really Feel About Biometrics, SEC. DISTRIBUTING & MARKETING., Mar. 13, 2006, available at http://www.sdmmag.com/copyright/ faf86047124f9010VgnVCM100000f932a8c0_?. One in four companies surveyed by Deloitte in 2006 plans to employ biometric security measures over the next eighteen months to authenticate employees.
    • Joan Engebretson, How Security Dealers Really Feel About Biometrics, SEC. DISTRIBUTING & MARKETING., Mar. 13, 2006, available at http://www.sdmmag.com/copyright/ faf86047124f9010VgnVCM100000f932a8c0_?. One in four companies surveyed by Deloitte in 2006 plans to employ biometric security measures over the next eighteen months to authenticate employees.
  • 61
    • 33947698972 scopus 로고    scopus 로고
    • DELOITTE, 2006 GLOBAL SECURITY STUDY 9 (2006), available at http://www.deloitte.com/dtt/cda/doc/content/ dtt_lssecuritystudy_053006.pdf.
    • DELOITTE, 2006 GLOBAL SECURITY STUDY 9 (2006), available at http://www.deloitte.com/dtt/cda/doc/content/ dtt_lssecuritystudy_053006.pdf.
  • 63
    • 33947641163 scopus 로고    scopus 로고
    • Brian J. Rogal, Biometrics: Getting in Touch with a Growing Trend, CREDIT CARD MGMT., Feb. 1, 2006, at 26. Credit unions have started deploying electronic fingerprint systems at kiosks to allow members to do business remotely. O'HARROW, supra note 12, at 176.
    • Brian J. Rogal, Biometrics: Getting in Touch with a Growing Trend, CREDIT CARD MGMT., Feb. 1, 2006, at 26. Credit unions have "started deploying electronic fingerprint systems at kiosks to allow members to do business remotely." O'HARROW, supra note 12, at 176.
  • 64
    • 33947664579 scopus 로고    scopus 로고
    • See Jonathan Curiel, The Last Days of Privacy, S.F. CHRON., June 25, 2006, at E1 (discussing the present consideration by the banking industry of widespread implementation of biometric technology in ATMs in the United States).
    • See Jonathan Curiel, The Last Days of Privacy, S.F. CHRON., June 25, 2006, at E1 (discussing the present consideration by the banking industry of widespread implementation of biometric technology in ATMs in the United States).
  • 65
    • 33947614242 scopus 로고    scopus 로고
    • O'HARROW, supra note 12, at 171; C. Maxine Most, Biometrics and Financial Services - Show Me the Money!, DIGITAL ID WORLD, Jan./Feb. 2004, at 20, available at http://magazine.digitalidworld.com/Jan04/Page20.pdf.
    • O'HARROW, supra note 12, at 171; C. Maxine Most, Biometrics and Financial Services - Show Me the Money!, DIGITAL ID WORLD, Jan./Feb. 2004, at 20, available at http://magazine.digitalidworld.com/Jan04/Page20.pdf.
  • 66
    • 33947622198 scopus 로고    scopus 로고
    • See Dan Frommer, The Tell-Tale Heart, FORBES.COM, Feb. 16, 2006, http://www.forbes.com/technology/2006/02/16/ibm-aladdin- biometric-cx_df_0216biometric.html (predicting that the annual sales of biometric security devices will grow from its present level of $2.2 billion to $6 billion by 2010).
    • See Dan Frommer, The Tell-Tale Heart, FORBES.COM, Feb. 16, 2006, http://www.forbes.com/technology/2006/02/16/ibm-aladdin- biometric-cx_df_0216biometric.html (predicting that the annual sales of biometric security devices will grow from its present level of $2.2 billion to $6 billion by 2010).
  • 67
    • 33947628791 scopus 로고    scopus 로고
    • See also William Abernathy & Lee Tien, Biometrics: Who's Watching You?, http://www.eff.org/Privacy/Surveillance/biometrics/ (last visited Aug. 2, 2006) (stating that an effective biometric system must compare captured biometric data to a biometric database).
    • See also William Abernathy & Lee Tien, Biometrics: Who's Watching You?, http://www.eff.org/Privacy/Surveillance/biometrics/ (last visited Aug. 2, 2006) (stating that an effective biometric system "must compare captured biometric data to a biometric database").
  • 68
    • 33947707366 scopus 로고    scopus 로고
    • Identity Theft Suits Gain Popularity with Plaintiffs
    • See, July, at
    • See Jarrett Banks, Identity Theft Suits Gain Popularity with Plaintiffs, CORP. LEGAL TIMES, July 2005, at 32.
    • (2005) CORP. LEGAL TIMES , pp. 32
    • Banks, J.1
  • 69
    • 4243198165 scopus 로고    scopus 로고
    • Michael E. Whitman, Enemy at the Gate: Threats to Information Security, COMM. OF THE ACM, Aug. 2003, at 91, 92-93 (explaining different means by which the Internet opens organizations using it to attack of their computer networks).
    • Michael E. Whitman, Enemy at the Gate: Threats to Information Security, COMM. OF THE ACM, Aug. 2003, at 91, 92-93 (explaining different means by which the Internet opens organizations using it to attack of their computer networks).
  • 70
    • 33947646472 scopus 로고    scopus 로고
    • See also Siobhan Gorman, Hacker Attacks Hitting Pentagon, BALTIMORE SUN, July 2, 2006, at 1A (describing thousands of successful penetrations of the Pentagon's computer networks and noting the obsolescence of NSA's methods to safeguard data).
    • See also Siobhan Gorman, Hacker Attacks Hitting Pentagon, BALTIMORE SUN, July 2, 2006, at 1A (describing thousands of successful penetrations of the Pentagon's computer networks and noting the obsolescence of NSA's methods to safeguard data).
  • 71
    • 33745609764 scopus 로고    scopus 로고
    • ID Theft: More Hype Than Harm
    • July 3, at
    • Dean Foust, ID Theft: More Hype Than Harm, BUS. WK., July 3, 2006, at 34.
    • (2006) BUS. WK , pp. 34
    • Foust, D.1
  • 72
    • 33947630367 scopus 로고    scopus 로고
    • DELOITTE, PROTECTING THE DIGITAL ASSETS: THE 2006 TECHNOLOGY, MEDIA AND TELECOMMUNICATIONS SECURITY SURVEY 7 (2006), available at http://www.deloitte.com/dtt/cda/doc/content/ dtt_DR_ProtectingDigitalAssets_062106.pdf.
    • DELOITTE, PROTECTING THE DIGITAL ASSETS: THE 2006 TECHNOLOGY, MEDIA AND TELECOMMUNICATIONS SECURITY SURVEY 7 (2006), available at http://www.deloitte.com/dtt/cda/doc/content/ dtt_DR_ProtectingDigitalAssets_062106.pdf.
  • 73
    • 33947664074 scopus 로고    scopus 로고
    • See Privacy Rights, Chronology, supra note 9
    • See Privacy Rights, Chronology, supra note 9.
  • 74
    • 33947623772 scopus 로고    scopus 로고
    • See also Stefanie Olsen, Man Charged with Hacking USC Database, CNET NEWS.COM, Apr. 20, 2006, http://news.com.com/Man+charged+with+hacking+USC+database/2100-7350_3-60 63470. html?tag=nl (describing a hacker's successful penetration of a USC database containing 275,000 applicants' SSNs). Universities are becoming bigger and bigger targets to the hacker community because they are large institutions with vast collections of SSNs. Id.
    • See also Stefanie Olsen, Man Charged with Hacking USC Database, CNET NEWS.COM, Apr. 20, 2006, http://news.com.com/Man+charged+with+hacking+USC+database/2100-7350_3-6063470. html?tag=nl (describing a hacker's successful penetration of a USC database containing 275,000 applicants' SSNs). "Universities are becoming bigger and bigger targets to the hacker community because they are large institutions" with vast collections of SSNs. Id.
  • 75
    • 33947681807 scopus 로고    scopus 로고
    • See Privacy Rights, Chronology, supra note 9 (describing data-security breaches at Guess.com and DSW Inc., among others).
    • See Privacy Rights, Chronology, supra note 9 (describing data-security breaches at Guess.com and DSW Inc., among others).
  • 76
    • 33947693897 scopus 로고    scopus 로고
    • See id
    • See id.
  • 77
    • 33947645454 scopus 로고    scopus 로고
    • See Stout, supra note 10
    • See Stout, supra note 10.
  • 78
    • 33947651740 scopus 로고    scopus 로고
    • See FEDERAL TRADE COMMISSION, IDENTITY THEFT SURVEY REPORT 3, Sept., available at
    • See FEDERAL TRADE COMMISSION, IDENTITY THEFT SURVEY REPORT 3, 13 (Sept. 2003), available at http://www.consumer.gov/idtheft/pdf/synovatereport. pdf.
    • (2003) , vol.13
  • 79
    • 33947643747 scopus 로고    scopus 로고
    • Federal Survey: Identity Theft Hits 1 in 4 U.S. Households
    • See also, Sept. 4, at
    • See also Christine Dugas, Federal Survey: Identity Theft Hits 1 in 4 U.S. Households, USA TODAY, Sept. 4, 2003, at 10B.
    • (2003) USA TODAY
    • Dugas, C.1
  • 81
    • 33947661532 scopus 로고    scopus 로고
    • See Swire, supra note 10, at 290
    • See Swire, supra note 10, at 290.
  • 82
    • 33947614802 scopus 로고    scopus 로고
    • O'HARROW, supra note 12, at 79; Swire, supra note 10, at 290.
    • O'HARROW, supra note 12, at 79; Swire, supra note 10, at 290.
  • 83
    • 33947678301 scopus 로고    scopus 로고
    • Leland & Zeller, supra note 2; Privacy Rights Clearinghouse, supra note 23.
    • Leland & Zeller, supra note 2; Privacy Rights Clearinghouse, supra note 23.
  • 84
    • 33947700995 scopus 로고    scopus 로고
    • See also Harry A. Valetk, Mastering the Dark Arts of Cyberspace: A Quest for Sound Internet Safety Policies, 2004 STAN. TECH. L. REV. 2, ¶ 15 (2004), available at http://stlr.stanford.edu/STLR/Articles/04_STLR_2/contents_f.htm (noting that identity theft is an enabling crime that permits criminals to commit other crimes by assuming the victim's identity). This past year, identity thieves used the SSNs and birth dates of three million people to open new lines of credit, secure loans, [and] flip property in the victim's name. See Leland & Zeller, supra note 2.
    • See also Harry A. Valetk, Mastering the Dark Arts of Cyberspace: A Quest for Sound Internet Safety Policies, 2004 STAN. TECH. L. REV. 2, ¶ 15 (2004), available at http://stlr.stanford.edu/STLR/Articles/04_STLR_2/contents_f.htm (noting that identity theft is an "enabling crime" that permits criminals to commit other crimes by assuming the victim's identity). This past year, identity thieves used the SSNs and birth dates of three million people to "open new lines of credit, secure loans, [and] flip property" in the victim's name. See Leland & Zeller, supra note 2.
  • 85
    • 33947652788 scopus 로고    scopus 로고
    • See Valetk, supra note 58, ¶¶ 31-32
    • See Valetk, supra note 58, ¶¶ 31-32.
  • 86
    • 33947711859 scopus 로고    scopus 로고
    • See BOB SULLIVAN, YOUR EVIL TWIN: BEHIND THE IDENTITY THEFT EPIDEMIC 42 (2004) (describing examples of victims of criminal identity theft who faced arrest and jail time before clearing their names). A false criminal record is virtually impossible to erase because officials of criminal records databases are reluctant to remove information from such databases. Id.
    • See BOB SULLIVAN, YOUR EVIL TWIN: BEHIND THE IDENTITY THEFT EPIDEMIC 42 (2004) (describing examples of victims of criminal identity theft who faced arrest and jail time before clearing their names). A false criminal record is virtually impossible to erase because officials of criminal records databases are reluctant to remove information from such databases. Id.
  • 87
    • 33947672471 scopus 로고    scopus 로고
    • Data Breaches and Identity Theft: Hearing Before the S. Comm. on Commerce, Science, and Transportation, 109th Cong. 4 (2005) (prepared statement of Deborah Platt Majoras, Chairman of the FTC), available at http://commerce.senate.gov/pdf/ftc.pdf [hereinafter Majoras Statement] (Identity theft causes significant economic and emotional injury.); O'HARROW, supra note 12, at 78;
    • Data Breaches and Identity Theft: Hearing Before the S. Comm. on Commerce, Science, and Transportation, 109th Cong. 4 (2005) (prepared statement of Deborah Platt Majoras, Chairman of the FTC), available at http://commerce.senate.gov/pdf/ftc.pdf [hereinafter Majoras Statement] ("Identity theft causes significant economic and emotional injury."); O'HARROW, supra note 12, at 78;
  • 88
    • 33947629305 scopus 로고    scopus 로고
    • Identity Theft Resolution Center, Rutgers University, available at
    • Identity Theft Resolution Center, Rutgers University, Identity Theft Overview: Part III - Emotional Considerations, 2003, available at http://www.identitytheft911-sunj.com/articles/article.ext?sp=27.
    • (2003) Identity Theft Overview: Part III - Emotional Considerations
  • 89
    • 33947655998 scopus 로고    scopus 로고
    • Prieto, supra note 16
    • Prieto, supra note 16.
  • 90
    • 33747888288 scopus 로고    scopus 로고
    • Heather M. Howard, Note, The Negligent Enablement of Imposter Fraud: A Common-sense Common Law Claim, 54 DUKE L.J. 1263, 1268 (2005). Victims also risk losing stolen bank funds in excess of the FDIC's insurance limit as the FDIC only insures up to $100,000 of a bank customer's funds. See Federal Deposit Insurance Co., FDIC: Insuring Your Deposits, http://www.fdic.gov (last visited Aug. 2, 2006).
    • Heather M. Howard, Note, The Negligent Enablement of Imposter Fraud: A Common-sense Common Law Claim, 54 DUKE L.J. 1263, 1268 (2005). Victims also risk losing stolen bank funds in excess of the FDIC's insurance limit as the FDIC only insures up to $100,000 of a bank customer's funds. See Federal Deposit Insurance Co., FDIC: Insuring Your Deposits, http://www.fdic.gov (last visited Aug. 2, 2006).
  • 91
    • 33947646470 scopus 로고    scopus 로고
    • Remsburg v. Docusearch, Inc., 816 A.2d 1001, 1005-06 (N.H. 2003).
    • Remsburg v. Docusearch, Inc., 816 A.2d 1001, 1005-06 (N.H. 2003).
  • 92
    • 33947612136 scopus 로고    scopus 로고
    • Id. at 1006-08 (finding an information broker liable for the stalker's criminal actions because the information broker's conduct created 'an especial temptation and opportunity for criminal misconduct' (quoting Walls v. Oxford Mgmt. Co., 633 A.2d 103, 106 (N.H. 1993))).
    • Id. at 1006-08 (finding an information broker liable for the stalker's criminal actions because the information broker's conduct created "'an especial temptation and opportunity for criminal misconduct'" (quoting Walls v. Oxford Mgmt. Co., 633 A.2d 103, 106 (N.H. 1993))).
  • 93
    • 33947633594 scopus 로고    scopus 로고
    • See also Your Privacy, supra note 31 citing a lawsuit alleging that a former coworker of Stanford Douglas obtained his home address from a data broker and later killed him
    • See also Your Privacy, supra note 31 (citing a lawsuit alleging that a former coworker of Stanford Douglas obtained his home address from a data broker and later killed him).
  • 94
    • 33947645457 scopus 로고    scopus 로고
    • See Bruce Barton et al., The Emerging Cyber Risks of Biometrics, RISK MGMT. MAG., Oct. 2005, at 26, 28, available at http://www.rmmag.corn/ShowArticle.cfm?AID=2896; Frommer, supra note 45 (explaining that any biometric database runs the risk of being hacked to steal the information inside). The 2006 Biometrics and Privacy report, issued by the world's largest biometrics consulting group, warns that the storage of biometric information in databases runs a high degree of risk of theft to gain unauthorized access to a biometric system. Int'l Biometric Group, Biometric Research Report Series, Biometrics and Privacy, 2006 Research Report Series 3-8 (unpublished report on file with author) [hereinafter Int'l Biometric].
    • See Bruce Barton et al., The Emerging Cyber Risks of Biometrics, RISK MGMT. MAG., Oct. 2005, at 26, 28, available at http://www.rmmag.corn/ShowArticle.cfm?AID=2896; Frommer, supra note 45 (explaining that "any biometric database runs the risk of being hacked" to steal the information inside). The 2006 Biometrics and Privacy report, issued by the world's largest biometrics consulting group, warns that the storage of biometric information in databases runs a "high" degree of risk of theft to gain unauthorized access to a biometric system. Int'l Biometric Group, Biometric Research Report Series, Biometrics and Privacy, 2006 Research Report Series 3-8 (unpublished report on file with author) [hereinafter Int'l Biometric].
  • 95
    • 33947619124 scopus 로고    scopus 로고
    • Sethi, supra note 34, at 131-32; Wei & Li, supra note 32, at 143. Although many biometric vendors would have the public believe that reverse engineering is not possible, that is simply untrue. Sethi, supra note 34, at 131-32. For example, in 2002, an Australian computer science student reverse engineered a fingerprint system as part of his honors thesis. Id. Moreover, a 2003 study showed that sample images can be regenerated from face recognition templates. ANDY ADLER, SAMPLE IMAGES CAN BE INDEPENDENTLY RESTORED FROM FACE RECOGNITION TEMPLATES (2003, available at http://www.site.uottawa.ca/~adler/publications/2003/adler- 2003-fr-templates.pdf. See also Int'l Biometric, supra note 67, at 35 discussing regeneration of face recognition templates
    • Sethi, supra note 34, at 131-32; Wei & Li, supra note 32, at 143. Although many biometric vendors would have the public believe that reverse engineering is not possible, that is simply untrue. Sethi, supra note 34, at 131-32. For example, in 2002, an Australian computer science student reverse engineered a fingerprint system as part of his honors thesis. Id. Moreover, a 2003 study showed that sample images can be regenerated from face recognition templates. ANDY ADLER, SAMPLE IMAGES CAN BE INDEPENDENTLY RESTORED FROM FACE RECOGNITION TEMPLATES (2003), available at http://www.site.uottawa.ca/~adler/publications/2003/adler- 2003-fr-templates.pdf. See also Int'l Biometric, supra note 67, at 35 (discussing regeneration of face recognition templates).
  • 96
    • 33947637280 scopus 로고    scopus 로고
    • See Tom Sanders, Biometrics Struggles to Go Mainstream, COMPUTING UK, Feb. 17, 2006, available at uggle-mainstream; Sethi, supra note 34, at 131. Prosthetic fingerprint samples can trick nearly all biometric scanners except high-end models employing thermal sensors. See id. at 131-32. These sensors ensure that the sample comes from a live human being. Id. Thermal-sensing machines, however, are not fool-proof as its liveness testing system can be breached and shut down. See TechTarget Expert Answer Center, Expert Knowledgebase, Joel Dubin, Penetrating a Biometric Security System, Sept. 21, 2005, http://expertanswercenter. techtarget.com/eac/knowledgebaseAnswer/0,295199,sid63_gci1142719,00.html . The significant cost of thermal-sensor scanners also suggests that such machines will not be employed when biometric systems are implemented on a grand scale. See
    • See Tom Sanders, Biometrics Struggles to Go Mainstream, COMPUTING UK, Feb. 17, 2006, available at http://www.computing. co.uk/vnunet/news/2150496/biometrics-struggle-mainstream; Sethi, supra note 34, at 131. Prosthetic fingerprint samples can trick nearly all biometric scanners except high-end models employing thermal sensors. See id. at 131-32. These sensors ensure that the sample comes from a live human being. Id. Thermal-sensing machines, however, are not fool-proof as its "liveness" testing system can be breached and shut down. See TechTarget Expert Answer Center, Expert Knowledgebase, Joel Dubin, Penetrating a Biometric Security System, Sept. 21, 2005, http://expertanswercenter. techtarget.com/eac/knowledgebaseAnswer/0,295199,sid63_gci1142719,00.html. The significant cost of thermal-sensor scanners also suggests that such machines will not be employed when biometric systems are implemented on a grand scale. See ELECTRONIC PRIVACY INFO. CTR., COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER, BEFORE THE DEP'T OF THE TREASURY, IN THE MATTER OF FACT ACT BIOMETRIC STUDY, FILE NO. R41105 (Apr. 1, 2004) (submitted by Chris Jay Hoofnagle, Associate Director & W. Neal Hartzog, IPIOP Clerk), available at http://www.epic.org/privacy/ biometrics/factabiometrics.html.
  • 97
    • 33947630876 scopus 로고    scopus 로고
    • See DELOITTE, supra note 41, at 9
    • See DELOITTE, supra note 41, at 9.
  • 98
    • 0346406657 scopus 로고    scopus 로고
    • A thief's use of an individual's biometric data to commit identity theft will create enormous problems for victims seeking to prove the theft, as all identity-theft victims face a certain amount of difficulty in proving that fraudulent expenses are not their own. See Lynn M. LoPucki, Human Identification Theory and the Identity Theft Problem, 80 TEX. L. REV. 89, 107 (2001). But the likely assumption that one's fingerprint does not lie compounds that difficulty for an individual who suffers financial theft as a result of the leak of the individual's biometric.
    • A thief's use of an individual's biometric data to commit identity theft will create enormous problems for victims seeking to prove the theft, as all identity-theft victims face a certain amount of difficulty in proving that fraudulent expenses are not their own. See Lynn M. LoPucki, Human Identification Theory and the Identity Theft Problem, 80 TEX. L. REV. 89, 107 (2001). But the likely assumption that one's fingerprint does not lie compounds that difficulty for an individual who suffers financial theft as a result of the leak of the individual's biometric.
  • 99
    • 25144434312 scopus 로고    scopus 로고
    • See Duncan Graham-Rowe, Privacy and Prejudice: Whose ID Is It Anyway?, NEW SCIENTIST, Sept. 17, 2005, at 20. Moreover, an individual's retina scan provides insight into certain medical conditions, such as high blood pressure and AIDS, placing an individual at risk for discrimination by employers. Sethi, supra note 34, at 125. The image of a fingerprint, if restored from the template, could reveal that an individual suffers from certain genetic disorders.
    • See Duncan Graham-Rowe, Privacy and Prejudice: Whose ID Is It Anyway?, NEW SCIENTIST, Sept. 17, 2005, at 20. Moreover, an individual's retina scan provides insight into certain medical conditions, such as high blood pressure and AIDS, placing an individual at risk for discrimination by employers. Sethi, supra note 34, at 125. The image of a fingerprint, if restored from the template, could reveal that an individual suffers from certain genetic disorders.
  • 100
    • 33947615282 scopus 로고    scopus 로고
    • DAVIDE MALTONI ET AL, HANDBOOK OF FINGERPRINT RECOGNITION 46 (2003, The Americans with Disabilities Act (ADA, 42 U.S.C. § 12112(a, 2000, would prohibit any discrimination on the basis of an employee's medical disability. ADA, however, defines disabilities so narrowly that many serious health conditions are not covered by its protections, perhaps including high blood pressure. See id. § 12102(2, defining disability as a condition that substantially limits one or more major life activities, Murphy v. United Parcel Serv, Inc, 527 U.S. 516, 519 1999, stating that because a terminated employee's life activities suffered no substantial limits when the employee took medication for high blood pressure, the employee was not disabled within the meaning of ADA because under ADA, disability is properly assessed in light of any mitigating measures employed
    • DAVIDE MALTONI ET AL., HANDBOOK OF FINGERPRINT RECOGNITION 46 (2003). The Americans with Disabilities Act ("ADA"), 42 U.S.C. § 12112(a) (2000), would prohibit any discrimination on the basis of an employee's medical disability. ADA, however, defines disabilities so narrowly that many serious health conditions are not covered by its protections, perhaps including high blood pressure. See id. § 12102(2) (defining disability as a condition that substantially limits one or more major life activities); Murphy v. United Parcel Serv., Inc., 527 U.S. 516, 519 (1999) (stating that because a terminated employee's life activities suffered no substantial limits when the employee took medication for high blood pressure, the employee was not "disabled" within the meaning of ADA because under ADA, disability is properly assessed in light of any mitigating measures employed).
  • 101
    • 33947705796 scopus 로고    scopus 로고
    • BRUCE SCHNEIER, SECRETS AND LIES: DIGITAL SECURITY IN A NETWORKED WORLD 144 (2000). As biometric technology develops universal biometric templates capable of recognition in any system, a thief will be able to use a victim's biometric data to access any database on which the victim's template resides. See Int'l Biometric, supra note 67, at 1.
    • BRUCE SCHNEIER, SECRETS AND LIES: DIGITAL SECURITY IN A NETWORKED WORLD 144 (2000). As biometric technology develops universal biometric templates capable of recognition in any system, a thief will be able to use a victim's biometric data to access any database on which the victim's template resides. See Int'l Biometric, supra note 67, at 1.
  • 102
    • 33947675928 scopus 로고    scopus 로고
    • See Federal Information Security Management Act, 44 U.S.C. § 3544(a)(1)(A, Supp. III 2003, requiring security measures to protect information collected and maintained by federal agencies and all information systems used or operated by or for federal agencies, The Privacy Act of 1974, 5 U.S.C. § 552ad, 2000, also regulates the collection and use of records by federal agencies, giving individuals the right to access and correct information in such records
    • See Federal Information Security Management Act, 44 U.S.C. § 3544(a)(1)(A) (Supp. III 2003) (requiring security measures to protect information collected and maintained by federal agencies and all information systems used or operated by or for federal agencies). The Privacy Act of 1974, 5 U.S.C. § 552a(d) (2000), also regulates the collection and use of records by federal agencies, giving individuals the right to access and correct information in such records.
  • 103
    • 33947667918 scopus 로고    scopus 로고
    • See Title V of the Gramm-Leach-Bliley Act (GLBA), 15 U.S.C. §§ 6801-6809 (2000), which prohibits financial institutions from disclosing a consumer's personal information to an unaffiliated third party without giving the consumer the opportunity to opt out of the disclosure. See also 65 Fed. Reg. 33,646 (May 24, 2000) (promulgated pursuant to the GLBA). GLBA also requires financial institutions to implement appropriate physical, technical, and procedural safeguards to protect customer information. 15 U.S.C. § 6801(b). The FTC has set forth standards governing the safeguarding of consumer information stored digitally. See Standards for Safeguarding Customer Information, 16 C.F.R. § 314.1-.5 (2006).
    • See Title V of the Gramm-Leach-Bliley Act ("GLBA"), 15 U.S.C. §§ 6801-6809 (2000), which prohibits financial institutions from disclosing a consumer's personal information to an unaffiliated third party without giving the consumer the opportunity to opt out of the disclosure. See also 65 Fed. Reg. 33,646 (May 24, 2000) (promulgated pursuant to the GLBA). GLBA also requires financial institutions to implement "appropriate" physical, technical, and procedural safeguards to protect customer information. 15 U.S.C. § 6801(b). The FTC has set forth standards governing the safeguarding of consumer information stored digitally. See Standards for Safeguarding Customer Information, 16 C.F.R. § 314.1-.5 (2006).
  • 104
    • 33947646471 scopus 로고    scopus 로고
    • 67 Fed. Reg. 36,484 May 23, discussing standards for safeguarding information
    • See also 67 Fed. Reg. 36,484 (May 23, 2002) (discussing standards for safeguarding information).
    • (2002) See also
  • 105
    • 33947710111 scopus 로고    scopus 로고
    • See The Fair and Accurate Credit Transactions Act of 2003 (FACT Act, 15 U.S.C. § 1681g(a)(1)A, Supp. III 2003, which includes a number of provisions designed to increase the protection of sensitive consumer information, including SSNs
    • See The Fair and Accurate Credit Transactions Act of 2003 ("FACT Act"), 15 U.S.C. § 1681g(a)(1)(A) (Supp. III 2003), which includes a number of provisions designed to increase the protection of sensitive consumer information, including SSNs.
  • 106
    • 33947630368 scopus 로고    scopus 로고
    • See Health Insurance Portability & Accountability Act of 1996 (HIPAA), 42 U.S.C. § 1320d-2 (2000). See also 45 C.F.R. pt. 164 (2005) (prescribing security and privacy regulations pursuant to HIPAA).
    • See Health Insurance Portability & Accountability Act of 1996 ("HIPAA"), 42 U.S.C. § 1320d-2 (2000). See also 45 C.F.R. pt. 164 (2005) (prescribing security and privacy regulations pursuant to HIPAA).
  • 107
    • 33947615281 scopus 로고    scopus 로고
    • E.g., FTC Complaint, In re BJ's Wholesale Club, Inc., Case No. 042 3160 (2005), available at http://www.ftc.gov/os/caselist/0423160/ 0423160.htm.
    • E.g., FTC Complaint, In re BJ's Wholesale Club, Inc., Case No. 042 3160 (2005), available at http://www.ftc.gov/os/caselist/0423160/ 0423160.htm.
  • 108
    • 33947699473 scopus 로고    scopus 로고
    • See also News Release, U.S. Federal Trade Comm'n, ChoicePoint Settles Data Security Breach Charges (Jan. 26, 2006), available at http://www.ftc.gov/opa/2006/01/choicepoint.htm [hereinafter FTC ChoicePoint].
    • See also News Release, U.S. Federal Trade Comm'n, ChoicePoint Settles Data Security Breach Charges (Jan. 26, 2006), available at http://www.ftc.gov/opa/2006/01/choicepoint.htm [hereinafter FTC ChoicePoint].
  • 109
    • 33947701659 scopus 로고    scopus 로고
    • See, e.g, FTC ChoicePoint, supra note 77 requiring ChoicePoint to establish a comprehensive information security program designed to protect sensitive personal information it collects about consumers and to audit its security practices every two years
    • See, e.g., FTC ChoicePoint, supra note 77 (requiring ChoicePoint to establish a comprehensive information security program designed to protect sensitive personal information it collects about consumers and to audit its security practices every two years).
  • 110
    • 33947706857 scopus 로고    scopus 로고
    • Social Security Numbers in Commerce: Reconciling Beneficial Uses with Threats to Privacy: Hearing Before the Subcomm. on Commerce, Trade, and Consumer Protection of the H. Comm. on Energy and Commerce, 109th Cong. (2006) (statement of Jon Leibowitz, Comm'r of the U.S. Federal Trade Comm'n) [hereinafter Leibowitz Statement].
    • Social Security Numbers in Commerce: Reconciling Beneficial Uses with Threats to Privacy: Hearing Before the Subcomm. on Commerce, Trade, and Consumer Protection of the H. Comm. on Energy and Commerce, 109th Cong. (2006) (statement of Jon Leibowitz, Comm'r of the U.S. Federal Trade Comm'n) [hereinafter Leibowitz Statement].
  • 111
    • 33947692854 scopus 로고    scopus 로고
    • SOLOVE, supra note 7, at 73
    • SOLOVE, supra note 7, at 73.
  • 112
    • 33947703223 scopus 로고    scopus 로고
    • See Privacy Rights, Chronology, supra note 9
    • See Privacy Rights, Chronology, supra note 9.
  • 113
    • 33947633076 scopus 로고    scopus 로고
    • See News Release, U.S. Federal Trade Comm'n, Real Estate Services Company Settles Privacy and Security Charge (May 10, 2006), available at http://www.ftc.gov/opa/2006/05/nationstitle.htm;
    • See News Release, U.S. Federal Trade Comm'n, Real Estate Services Company Settles Privacy and Security Charge (May 10, 2006), available at http://www.ftc.gov/opa/2006/05/nationstitle.htm;
  • 116
    • 33947648544 scopus 로고    scopus 로고
    • News Release, U.S. Federal Trade Comm'n, Mortgage Company Settles Information Security Charges (Sept. 28, 2005), available at http://www.ftc.gov/opa/2005/09/Superior.htm; supra text accompanying notes 77-78 (discussing the FTC's settlement with ChoicePoint and BJ's Wholesale Club). See also Leibowitz Statement, supra note 79, at 15 (explaining that since 2001 the FTC has brought thirteen cases challenging businesses that failed to take reasonable steps to protect sensitive consumer information).
    • News Release, U.S. Federal Trade Comm'n, Mortgage Company Settles Information Security Charges (Sept. 28, 2005), available at http://www.ftc.gov/opa/2005/09/Superior.htm; supra text accompanying notes 77-78 (discussing the FTC's settlement with ChoicePoint and BJ's Wholesale Club). See also Leibowitz Statement, supra note 79, at 15 (explaining that since 2001 the FTC has brought thirteen cases challenging businesses that failed to take reasonable steps to protect sensitive consumer information).
  • 117
    • 33947695270 scopus 로고    scopus 로고
    • CAL. CIV. CODE § 1798.81.5(b) (West 2006). See also ARK. CODE ANN. § 4-110-104(b) (Supp. 2005) (requiring reasonable measures to protect sensitive consumer data); R.I. GEN. LAWS § 11-49.2-2(2), (3) (Supp. 2005) (same); NEV. REV. STAT. ANN. § 597.970(1) (LexisNexis Supp. 2004) (requiring businesses to encrypt electronic transmissions that contain consumers' personal information when those transmissions are sent outside the firm).
    • CAL. CIV. CODE § 1798.81.5(b) (West 2006). See also ARK. CODE ANN. § 4-110-104(b) (Supp. 2005) (requiring reasonable measures to protect sensitive consumer data); R.I. GEN. LAWS § 11-49.2-2(2), (3) (Supp. 2005) (same); NEV. REV. STAT. ANN. § 597.970(1) (LexisNexis Supp. 2004) (requiring businesses to encrypt electronic transmissions that contain consumers' personal information when those transmissions are sent outside the firm).
  • 118
    • 33947642172 scopus 로고    scopus 로고
    • CAL. CIV. CODE § 1798.82 (West Supp. 2006).
    • CAL. CIV. CODE § 1798.82 (West Supp. 2006).
  • 119
    • 33947653323 scopus 로고    scopus 로고
    • ARK. CODE ANN. § 4-110-105 (Supp. 2005); CONN. GEN. STAT. ANN. § 36a-701b (West Supp. 2006); DEL. CODE. ANN. tit. 6, § 12B-102 (2005); GA. CODE ANN. § 10-1-912 (Supp. 2006); 815 ILL. COMP. STAT. ANN. 530/10 (West Supp. 2006); IND. CODE ANN. § 4-1-11-5 (LexisNexis Supp. 2005) (applying only to state agencies); LA. REV. STAT. ANN. § 51:3074 (Supp. 2006); ME. REV. STAT. ANN. tit. 10, § 1348 (Supp. 2005); MINN. STAT. ANN. § 325E.61 (West Supp. 2006); MONT. CODE ANN. § 30-14-1704 (2005) (effective Mar. 1, 2006); NEV. REV. STAT. ANN. § 603A.220 (LexisNexis Supp. 2005); N.J. STAT. ANN. § 56:8-163 (West Supp. 2006); N.Y. GEN. BUS. LAW § 899-aa (McKinney Supp. 2006); N.C. GEN. STAT. § 75-65 (2005); N.D. CENT. CODE § 51-30-02 (Supp. 2005); OHIO REV. CODE ANN. §§ 1347.12, 1349.19 (LexisNexis Supp. 2006); 73 PA. CONS. STAT. ANN. § 2303 (West Supp. 2006); R.I. GEN. LAWS § 11-49.2-3 (Supp. 2005);...
    • ARK. CODE ANN. § 4-110-105 (Supp. 2005); CONN. GEN. STAT. ANN. § 36a-701b (West Supp. 2006); DEL. CODE. ANN. tit. 6, § 12B-102 (2005); GA. CODE ANN. § 10-1-912 (Supp. 2006); 815 ILL. COMP. STAT. ANN. 530/10 (West Supp. 2006); IND. CODE ANN. § 4-1-11-5 (LexisNexis Supp. 2005) (applying only to state agencies); LA. REV. STAT. ANN. § 51:3074 (Supp. 2006); ME. REV. STAT. ANN. tit. 10, § 1348 (Supp. 2005); MINN. STAT. ANN. § 325E.61 (West Supp. 2006); MONT. CODE ANN. § 30-14-1704 (2005) (effective Mar. 1, 2006); NEV. REV. STAT. ANN. § 603A.220 (LexisNexis Supp. 2005); N.J. STAT. ANN. § 56:8-163 (West Supp. 2006); N.Y. GEN. BUS. LAW § 899-aa (McKinney Supp. 2006); N.C. GEN. STAT. § 75-65 (2005); N.D. CENT. CODE § 51-30-02 (Supp. 2005); OHIO REV. CODE ANN. §§ 1347.12, 1349.19 (LexisNexis Supp. 2006); 73 PA. CONS. STAT. ANN. § 2303 (West Supp. 2006); R.I. GEN. LAWS § 11-49.2-3 (Supp. 2005); TENN. CODE ANN. § 47-18-2107 (Supp. 2005); TEX. BUS. & COM. CODE ANN. § 48.103 (Vernon Supp. 2006); WASH. REV. CODE ANN. § 19.255.010 (West Supp. 2006).
  • 120
    • 33947675387 scopus 로고    scopus 로고
    • Those states allow consumers to freely freeze their credit reports
    • Those states allow consumers to freely freeze their credit reports without any preconditions except Illinois, Kansas, South Dakota, Texas, Vermont, and Washington, which only permit identity-theft victims to freeze their credit reports. CAL. CIV. CODE § 1785.11.2 (West Supp. 2006); COLO. REV. STAT. ANN. § 12-14.3-106.6 (West Supp. 2005); CONN. GEN. STAT. ANN. § 36a-701a (West Supp. 2006); DEL. CODE ANN. tit. 6, § 2203 (2006); 815 ILL. COMP. STAT. ANN. 505/2MM (West Supp. 2006); LA. REV. STAT. ANN. § 9:3571.1M (Supp. 2006); ME. REV. STAT. ANN. tit. 10, § 1313-C (Supp. 2005); NEV. REV. STAT. ANN. § 598C.300 (LexisNexis Supp. 2005); N.J. STAT. ANN. § 56:11-46 (West Supp. 2006); N.C. GEN. STAT. § 75-63 (2005); TEX. BUS. & COM. CODE ANN. § 20.034 (Vernon Supp. 2006); VT. STAT. ANN. tit. 9, § 2480h (Supp. 2005); WASH. REV. CODE ANN. § 19.182.170 (West Supp. 2006); 75 Del. Laws Ch. 328 (2006); 2006 Fla. Laws Ch. 2006-124, 1 (effective July 1, 2006) (to be codified at FLA. STAT. § 501.005); 2006 Haw. Rev. Stat. Ann. Adv. Legis. Serv. 138 (LexisNexis) (effective Jan. 1, 2007); Act of Apr. 19, 2006, 2006 Kan. Sess. Laws Ch. 149 § 12 (effective Jan. 1, 2007); 2006 Ky. Acts Ch. 42, § 3 (to be codified at KY. REV. STAT. ANN. § 367); 2006 Minn. Laws Ch. 233 (effective Aug. 1, 2006); 2006 N.H. Laws Ch. 208 (effective Jan. 1, 2007); Act of June 7, 2006, 2006 N.Y. Laws 63 (effective Nov. 1, 2006); Oklahoma Consumer Report Security Freeze Act, 2006 Okla. Sess. Laws Ch. 283 (effective Jan. 1, 2007) (to be codified at OKLA. STAT. tit. 24, § 149); Consumer Empowerment and Identity Theft Prevention Act of 2006, 2006 R.I. Pub. Laws 568 (effective Jan. 1, 2007) (to be codified at R.I. GEN. LAWS § 6-48-5); Consumer Credit Protection Act, 2006 Utah Laws Ch. 344 (effective Sept. 1, 2008) (to be codified at UTAH CODE ANN. § 13-42-201); 2005 Wis. Sess. Laws 140 (effective Jan. 1, 2007) (to be codified at WIS. STAT. § 100.54(2)); S.B. 180, 81st Leg. (S.D. 2006).
  • 121
    • 33947692298 scopus 로고    scopus 로고
    • ARK. CODE ANN. § 4-86-107 (Supp. 2005) (effective Jan. 1, 2007); MD. CODE ANN., COM. LAW § 14-3402 (LexisNexis 2005); MINN. STAT. ANN. § 325E.59 (West Supp. 2006); MONT. CODE ANN. § 30-14-1722 (2005); N.C. GEN. STAT. § 75-62 (2005); OHIO REV. CODE ANN. § 1349.17 (LexisNexis 2002); VA. CODE ANN. § 59.1-443.2 (Supp. 2005).
    • ARK. CODE ANN. § 4-86-107 (Supp. 2005) (effective Jan. 1, 2007); MD. CODE ANN., COM. LAW § 14-3402 (LexisNexis 2005); MINN. STAT. ANN. § 325E.59 (West Supp. 2006); MONT. CODE ANN. § 30-14-1722 (2005); N.C. GEN. STAT. § 75-62 (2005); OHIO REV. CODE ANN. § 1349.17 (LexisNexis 2002); VA. CODE ANN. § 59.1-443.2 (Supp. 2005).
  • 122
    • 33947702687 scopus 로고    scopus 로고
    • See S. 1332, 109th Cong. § 2 (2005) (describing databases of personal information as prime targets of hackers, identity thieves, rogue employees, and other criminals, who misuse such data and cause serious or irreparable harm to an individual's livelihood and hurt businesses).
    • See S. 1332, 109th Cong. § 2 (2005) (describing databases of personal information as prime targets of hackers, identity thieves, rogue employees, and other criminals, who misuse such data and cause "serious or irreparable harm to an individual's livelihood" and hurt businesses).
  • 123
    • 33947642169 scopus 로고    scopus 로고
    • E.g, Information Protection and Security Act, S. 500, 109th Cong. §§ 2(b, 3(a)(2, 2005, directing the FTC to promulgate regulations governing the conduct of information brokers and the protection of data held by such brokers without preempting any state law that would provide greater consumer protection, Privacy Act of 2005, S. 116, 109th Cong. § 101 (2005, rendering it unlawful for commercial entities to sell personal identifying information without the individual's notice and opportunity to restrict disclosure, Social Security On-line Privacy Protection Act, H.R. 82, 109th Cong. § 2 2005, preventing interactive computer services from disclosing SSNs or other personally identifiable information without consent, See also Anne Broache, Congress May Slap Restrictions on SSN Use, CNET NEWS.COM, May 12, 2006, noting that at least three pieces of pending legislation in the Hou
    • E.g., Information Protection and Security Act, S. 500, 109th Cong. §§ 2(b), 3(a)(2) (2005) (directing the FTC to promulgate regulations governing the conduct of information brokers and the protection of data held by such brokers without preempting any state law that would provide greater consumer protection); Privacy Act of 2005, S. 116, 109th Cong. § 101 (2005) (rendering it unlawful for commercial entities to sell personal identifying information without the individual's notice and opportunity to restrict disclosure); Social Security On-line Privacy Protection Act, H.R. 82, 109th Cong. § 2 (2005) (preventing interactive computer services from disclosing SSNs or other personally identifiable information without consent). See also Anne Broache, Congress May Slap Restrictions on SSN Use, CNET NEWS.COM, May 12, 2006, http://news.com.com/2100-7348_3- 6071441.html (noting that at least three pieces of pending legislation in the House and Senate would restrict the use and sale of SSNs).
  • 124
    • 33947644931 scopus 로고    scopus 로고
    • S. 768, 109th Cong. § 3 (2005).
    • S. 768, 109th Cong. § 3 (2005).
  • 125
    • 33947615837 scopus 로고    scopus 로고
    • Id. §§ 3, 5 (ordering the FTC to promulgate regulations governing the sale, maintenance, collection, or transfer of sensitive personal information, including a requirement that all commercial entities take reasonable steps to prevent unauthorized access to sensitive personal information they collect, sell, or transfer). Legislation proposed by Senators Specter, Leahy, and Feingold similarly would require all businesses storing personally identifiable data of over 10,000 individuals to implement a comprehensive data privacy security program. S. 1332, 109th Cong. §§ 401(b), 402 (2005).
    • Id. §§ 3, 5 (ordering the FTC to promulgate regulations governing the sale, maintenance, collection, or transfer of sensitive personal information, including a requirement that all commercial entities take reasonable steps to prevent unauthorized access to sensitive personal information they collect, sell, or transfer). Legislation proposed by Senators Specter, Leahy, and Feingold similarly would require all businesses storing personally identifiable data of over 10,000 individuals to implement a comprehensive data privacy security program. S. 1332, 109th Cong. §§ 401(b), 402 (2005).
  • 126
    • 33947702168 scopus 로고    scopus 로고
    • S. 768, § 3
    • S. 768, § 3.
  • 127
    • 33645556143 scopus 로고    scopus 로고
    • See SOLOVE, supra note 7, at 104-05; Daniel J. Solove & Chris Jay Hoofnagle, A Model Regime of Privacy Protection, 2006 U. ILL. L. REV. 357, 368-79.
    • See SOLOVE, supra note 7, at 104-05; Daniel J. Solove & Chris Jay Hoofnagle, A Model Regime of Privacy Protection, 2006 U. ILL. L. REV. 357, 368-79.
  • 128
    • 33947682850 scopus 로고    scopus 로고
    • See generally Joel R. Reidenberg, Setting Standards for Fair Information Practice in the U.S. Private Sector, 80 IOWA L. REV. 497 (1995). The Schumer proposal brings together many of the state-level innovations discussed in notes 83-87, supra.
    • See generally Joel R. Reidenberg, Setting Standards for Fair Information Practice in the U.S. Private Sector, 80 IOWA L. REV. 497 (1995). The Schumer proposal brings together many of the state-level innovations discussed in notes 83-87, supra.
  • 129
    • 33947626696 scopus 로고    scopus 로고
    • Standards for Safeguarding Customer Information, 16 C.F.R. pt. 314 (2006).
    • Standards for Safeguarding Customer Information, 16 C.F.R. pt. 314 (2006).
  • 130
    • 33947698457 scopus 로고    scopus 로고
    • Leibowitz Statement, supra note 79, at 10 n.25.
    • Leibowitz Statement, supra note 79, at 10 n.25.
  • 131
    • 33947649096 scopus 로고    scopus 로고
    • 16 C.F.R. § 314.3
    • 16 C.F.R. § 314.3.
  • 132
    • 33947621212 scopus 로고    scopus 로고
    • See U.S. FEDERAL TRADE COMM'N, FINAL REPORT OF THE FTC ADVISORY COMMITTEE ON ONLINE ACCESS AND SECURITY § 3.5 (May 15, 2000), available at http://www.ftc.gov/acoas/papers/finalreport.htm; Smedinghoff, supra note 28, at 9, 13 (explaining that the FTC and technologists alike agree that information security is a process, not a product, and thus it does not, and cannot, literally dictate what security measures are required);
    • See U.S. FEDERAL TRADE COMM'N, FINAL REPORT OF THE FTC ADVISORY COMMITTEE ON ONLINE ACCESS AND SECURITY § 3.5 (May 15, 2000), available at http://www.ftc.gov/acoas/papers/finalreport.htm; Smedinghoff, supra note 28, at 9, 13 (explaining that the FTC and technologists alike agree that information security is a process, not a product, and thus it does not, and cannot, literally dictate what security measures are required);
  • 133
    • 33947673519 scopus 로고    scopus 로고
    • FTC Testifies on Security Issues in Global Information-based Economy Mar. 16, available at
    • News Release, U.S. Federal Trade Comm'n, FTC Testifies on Security Issues in Global Information-based Economy (Mar. 16, 2006), available at http://www.ftc.gov/opa/2006/03/globalitsecurity.htm.
    • (2006) News Release, U.S. Federal Trade Comm'n
  • 134
    • 33947641164 scopus 로고    scopus 로고
    • Identity Theft Resolution Center, Rutgers University, House Commerce Passes 'Partisan' Bill, but Bachus Seeks Consensus, Nov. 2005, available at http://www.identitytheft911-sunj.com/articles/article.ext?sp=74 (discussing H.R. 3997, 109th Cong. (2005)). That bill received support by the information brokerage industry, which argued that consumers would not want to be bombarded with notices every time a breach occurred. Id.
    • Identity Theft Resolution Center, Rutgers University, House Commerce Passes 'Partisan' Bill, but Bachus Seeks Consensus, Nov. 2005, available at http://www.identitytheft911-sunj.com/articles/article.ext?sp=74 (discussing H.R. 3997, 109th Cong. (2005)). That bill received support by the information brokerage industry, which argued that consumers would not want to be bombarded with notices every time a breach occurred. Id.
  • 135
    • 33947677217 scopus 로고    scopus 로고
    • See David Lazarus, Data Theft Bill a Step Backward, S.F. CHRON., Nov. 6, 2005, at J1 (discussing H.R. 4127, 109th Cong. (2005)).
    • See David Lazarus, Data Theft Bill a Step Backward, S.F. CHRON., Nov. 6, 2005, at J1 (discussing H.R. 4127, 109th Cong. (2005)).
  • 136
    • 0001047705 scopus 로고
    • The Independent Judiciary in an Interest-group Perspective, 18
    • William M. Landes & Richard A. Posner, The Independent Judiciary in an Interest-group Perspective, 18 J.L. & ECON. 875, 877 (1975).
    • (1975) J.L. & ECON , vol.875 , pp. 877
    • Landes, W.M.1    Posner, R.A.2
  • 137
    • 33947654444 scopus 로고    scopus 로고
    • See also Maxwell L. Stearns, The Public Choice Case Against the Item Veto, 49 WASH. & LEE L. REV. 385, 400 (1992).
    • See also Maxwell L. Stearns, The Public Choice Case Against the Item Veto, 49 WASH. & LEE L. REV. 385, 400 (1992).
  • 138
    • 33947641680 scopus 로고    scopus 로고
    • Stearns, supra note 100, at 400. See also ROBERT D. COOTER, THE STRATEGIC CONSTITUTION 67 (2000) (explaining that politicians in a democracy are concerned with the number of votes lobbyists can deliver).
    • Stearns, supra note 100, at 400. See also ROBERT D. COOTER, THE STRATEGIC CONSTITUTION 67 (2000) (explaining that politicians in a democracy are concerned with the number of votes lobbyists can deliver).
  • 139
    • 33947633077 scopus 로고    scopus 로고
    • MANCUR OLSON, JR., THE LOGIC OF COLLECTIVE ACTION: PUBLIC GOODS AND THE THEORY OF GROUPS 64 (1965);
    • MANCUR OLSON, JR., THE LOGIC OF COLLECTIVE ACTION: PUBLIC GOODS AND THE THEORY OF GROUPS 64 (1965);
  • 140
    • 33947616871 scopus 로고    scopus 로고
    • Herbert Hovenkamp, Legislation, Well-being, and Public Choice, 57 U. CHI. L. REV. 63, 87 (1990); Stearns, supra note 100, at 401.
    • Herbert Hovenkamp, Legislation, Well-being, and Public Choice, 57 U. CHI. L. REV. 63, 87 (1990); Stearns, supra note 100, at 401.
  • 141
    • 0036330279 scopus 로고    scopus 로고
    • Foreword: Post-Public Choice?, 87
    • Cynthia R. Farina & Jeffrey J. Rachlinski, Foreword: Post-Public Choice?, 87 CORNELL L. REV. 267, 268 (2002);
    • (2002) CORNELL L. REV , vol.267 , pp. 268
    • Farina, C.R.1    Rachlinski, J.J.2
  • 142
    • 0036324844 scopus 로고    scopus 로고
    • From Cynicism to Positive Theory in Public Choice, 87
    • Saul Levmore, From Cynicism to Positive Theory in Public Choice, 87 CORNELL L. REV. 375 , 375 (2002).
    • (2002) CORNELL L. REV , vol.375 , pp. 375
    • Levmore, S.1
  • 143
    • 33947614803 scopus 로고    scopus 로고
    • See Hearing Before the Subcomm. on Commerce, Trade and Consumer Protection of the H. Comm. on Energy and Commerce, 109th Cong. 2, 11-13 (2006) (prepared statement of Oliver Ireland on behalf of the Financial Services Coordinating Council), available at http://energycommerce.house.gov/108/ Hearings/05112006hearing1871/Ireland.pdf [hereinafter Ireland Statement]; Lively Testimony, supra note 25;
    • See Hearing Before the Subcomm. on Commerce, Trade and Consumer Protection of the H. Comm. on Energy and Commerce, 109th Cong. 2, 11-13 (2006) (prepared statement of Oliver Ireland on behalf of the Financial Services Coordinating Council), available at http://energycommerce.house.gov/108/ Hearings/05112006hearing1871/Ireland.pdf [hereinafter Ireland Statement]; Lively Testimony, supra note 25;
  • 144
    • 33947690314 scopus 로고    scopus 로고
    • Social Security Numbers in Commerce: Reconciling Beneficial Uses with Threats to Privacy: Hearing Before the Subcomm. on Commerce, Trade, and Consumer Protection of the H. Comm. on Energy and Commerce
    • President of Pension Benefit Information, available at
    • Social Security Numbers in Commerce: Reconciling Beneficial Uses with Threats to Privacy: Hearing Before the Subcomm. on Commerce, Trade, and Consumer Protection of the H. Comm. on Energy and Commerce, 109th Cong. 5 (2006) (prepared statement of Susan McDonald, President of Pension Benefit Information), available at http://energycommerce.house.gov/108/Hearings/ 05112006hearing1871/McDonald.pdf;
    • 109th Cong. 5 (2006) (prepared statement of Susan McDonald
  • 145
    • 33947709484 scopus 로고    scopus 로고
    • Social Security Numbers in Commerce: Reconciling Beneficial Uses with Threats to Privacy: Hearing Before the Subcomm. on Commerce, Trade, and Consumer Protection of the H. Comm. on Energy and Commerce, 109th Cong. (2006) (prepared statement of Lauren B. Steinfeld, Chief Privacy Officer of the University of Pennsylvania), available at http://energycommerce.house. gov/108/Hearings/05112006hearing1871/Steinfeld.pdf. Cf. Leland & Zeller, supra note 2 (describing strong business opposition to proposed state laws permitting consumers to freeze their credit reports that led to the defeat of proposed legislation in many states).
    • Social Security Numbers in Commerce: Reconciling Beneficial Uses with Threats to Privacy: Hearing Before the Subcomm. on Commerce, Trade, and Consumer Protection of the H. Comm. on Energy and Commerce, 109th Cong. (2006) (prepared statement of Lauren B. Steinfeld, Chief Privacy Officer of the University of Pennsylvania), available at http://energycommerce.house. gov/108/Hearings/05112006hearing1871/Steinfeld.pdf. Cf. Leland & Zeller, supra note 2 (describing strong business opposition to proposed state laws permitting consumers to freeze their credit reports that led to the defeat of proposed legislation in many states).
  • 146
    • 33947651252 scopus 로고    scopus 로고
    • E.g, Ireland Statement, supra note 104, at 11
    • E.g., Ireland Statement, supra note 104, at 11.
  • 147
    • 33947686031 scopus 로고    scopus 로고
    • supra note 16, at 18. Indeed, the Republican National Committee maintains a Voter Vault database, which allows party activists to track and solicit voters. Peter Wallsten & Tom Hamburger, The GOP Knows You Don't Like Anchovies
    • June 25, at
    • Prieto, supra note 16, at 18. Indeed, the Republican National Committee maintains a Voter Vault database, which allows party activists to track and solicit voters. Peter Wallsten & Tom Hamburger, The GOP Knows You Don't Like Anchovies, L.A. TIMES, June 25, 2006, at M1.
    • (2006) L.A. TIMES
    • Prieto1
  • 148
    • 33947627729 scopus 로고    scopus 로고
    • Prieto, supra note 16, at 18
    • Prieto, supra note 16, at 18.
  • 149
    • 33947671470 scopus 로고    scopus 로고
    • Members of Congress could exempt themselves from any restrictions on the use of voters' cyber-data. That possibility would not diminish the impact that strong interest-group opposition to a comprehensive legislative solution like the Schumer proposal would have on Members' of Congress reluctance to pass such legislation given their self-interest in reelection.
    • Members of Congress could exempt themselves from any restrictions on the use of voters' cyber-data. That possibility would not diminish the impact that strong interest-group opposition to a comprehensive legislative solution like the Schumer proposal would have on Members' of Congress reluctance to pass such legislation given their self-interest in reelection.
  • 150
    • 33947677756 scopus 로고    scopus 로고
    • E.g., Vincent R. Johnson, Cybersecurity, Identity Theft, and the Limits of Tort Liability, 57 S.C. L. REV. 255, 311 (2005) (suggesting a negligence solution for the release of SSNs);
    • E.g., Vincent R. Johnson, Cybersecurity, Identity Theft, and the Limits of Tort Liability, 57 S.C. L. REV. 255, 311 (2005) (suggesting a negligence solution for the release of SSNs);
  • 151
    • 33947647483 scopus 로고    scopus 로고
    • Michael L. Rustad & Thomas H. Koenig, The Tort of Negligent Enablement of Cybercrime, 20 BERKELEY TECH. L.J. 1553, 1557 (2005) (proposing a cause of action against software manufacturers whose software enables cyber-criminals to access information databases).
    • Michael L. Rustad & Thomas H. Koenig, The Tort of Negligent Enablement of Cybercrime, 20 BERKELEY TECH. L.J. 1553, 1557 (2005) (proposing a cause of action against software manufacturers whose software enables cyber-criminals to access information databases).
  • 152
    • 33947668975 scopus 로고    scopus 로고
    • See, e.g., First Amended Complaint for Declaratory and Injunctive Relief at 2, Parke v. Cardsystems Solutions, Inc., No. CGC-05-442624 (Sup. Ct. Cal. July 5, 2005) (alleging that the defendant failed to adequately secure sensitive personal data of over 40 million California residents, thus allowing hackers to steal plaintiffs' SSNs) (currently pending). See also supra note 85 and accompanying text (discussing states that require private entities to employ reasonable security measures over sensitive personal data).
    • See, e.g., First Amended Complaint for Declaratory and Injunctive Relief at 2, Parke v. Cardsystems Solutions, Inc., No. CGC-05-442624 (Sup. Ct. Cal. July 5, 2005) (alleging that the defendant failed to adequately secure sensitive personal data of over 40 million California residents, thus allowing hackers to steal plaintiffs' SSNs) (currently pending). See also supra note 85 and accompanying text (discussing states that require private entities to employ reasonable security measures over sensitive personal data).
  • 153
    • 33947658519 scopus 로고    scopus 로고
    • Kline v. 1500 Mass. Ave. Apartment Corp., 439 F.2d 477, 480-81 (D.C. Cir. 1970).
    • Kline v. 1500 Mass. Ave. Apartment Corp., 439 F.2d 477, 480-81 (D.C. Cir. 1970).
  • 154
    • 33947659037 scopus 로고    scopus 로고
    • Id. at 480
    • Id. at 480.
  • 155
    • 33947657486 scopus 로고    scopus 로고
    • Id. at 481, 483-84.
    • Id. at 481, 483-84.
  • 156
    • 33947645975 scopus 로고    scopus 로고
    • Bell v. Mich. Council 25 of the Am. Fed'n of State, County, & Mun. Employees, Local 1023, No. 246684, 2005 WL 356306, at *1 (Mich. Ct. App. Feb. 15, 2005).
    • Bell v. Mich. Council 25 of the Am. Fed'n of State, County, & Mun. Employees, Local 1023, No. 246684, 2005 WL 356306, at *1 (Mich. Ct. App. Feb. 15, 2005).
  • 157
    • 33947662591 scopus 로고    scopus 로고
    • Id. at *1
    • Id. at *1.
  • 158
    • 33947638559 scopus 로고    scopus 로고
    • Id. at *3-4. See also Johnson, supra note 109, at 273-34 (arguing for the extension of the Kline rule to database operators based on the fiduciary relationship between the operator and the operator's customers). But see Thomas J. Smedinghoff, The Developing U.S. Legal Standard for Cybersecurity, 4 SEDONA CONF. J. 109, 115 (2003) (suggesting that foreseeability is the cornerstone of liability for database breaches).
    • Id. at *3-4. See also Johnson, supra note 109, at 273-34 (arguing for the extension of the Kline rule to database operators based on the fiduciary relationship between the operator and the operator's customers). But see Thomas J. Smedinghoff, The Developing U.S. Legal Standard for Cybersecurity, 4 SEDONA CONF. J. 109, 115 (2003) (suggesting that foreseeability is the cornerstone of liability for database breaches).
  • 159
    • 33947663092 scopus 로고    scopus 로고
    • If Congress adopts a comprehensive bill like the Schumer proposal and the FTC follows its current practices, tort regulation would complement the FTC's performance-based standards, which tell entities what they must accomplish but leave them to decide what technology to use to satisfy the regulation at least cost. See Susan Rose-Ackerman, Tort Law in the Regulatory State, in TORT LAW AND THE PUBLIC INTEREST: COMPETITION, INNOVATION, AND CONSUMER WELFARE 80, 91, 95-96 Peter H. Schuck ed, 1991, This analysis presumes that state law would not be preempted by federal legislation. The Schumer bill and other similar comprehensive proposals signal Congress's intent not to preempt state laws, a view which is consistent with Congress's vow to leave states free to act on data-security issues in FACTA and GLBA. See Identity Theft Resolution Center, supra note 98
    • If Congress adopts a comprehensive bill like the Schumer proposal and the FTC follows its current practices, tort regulation would complement the FTC's performance-based standards, which tell entities what they must accomplish but leave them to decide what technology to use to satisfy the regulation at least cost. See Susan Rose-Ackerman, Tort Law in the Regulatory State, in TORT LAW AND THE PUBLIC INTEREST: COMPETITION, INNOVATION, AND CONSUMER WELFARE 80, 91, 95-96 (Peter H. Schuck ed., 1991). This analysis presumes that state law would not be preempted by federal legislation. The Schumer bill and other similar comprehensive proposals signal Congress's intent not to preempt state laws, a view which is consistent with Congress's vow to leave states free to act on data-security issues in FACTA and GLBA. See Identity Theft Resolution Center, supra note 98.
  • 160
    • 0010080485 scopus 로고
    • A Theory of Negligence, 1
    • E.g
    • E.g., Richard A. Posner, A Theory of Negligence, 1 J. LEG. STUD. 29, 32-34 (1972).
    • (1972) J. LEG. STUD , vol.29 , pp. 32-34
    • Posner, R.A.1
  • 161
    • 33947672472 scopus 로고    scopus 로고
    • E.g., 3 FOWLER V. HARPER, FLEMING JAMES, JR. & OSCAR S. GRAY, THE LAW OF TORTS 131-32 (2d ed. 1986).
    • E.g., 3 FOWLER V. HARPER, FLEMING JAMES, JR. & OSCAR S. GRAY, THE LAW OF TORTS 131-32 (2d ed. 1986).
  • 162
    • 33947650722 scopus 로고    scopus 로고
    • The question of whether a fault-based system or a strict-liability standard is most economically efficient has been long and carefully debated by prominent scholars and jurists. See, e.g, GUIDO CALABRESI, THE COSTS OF ACCIDENTS: A LEGAL AND ECONOMIC ANALYSIS 263, 312 (1970);
    • The question of whether a fault-based system or a strict-liability standard is most economically efficient has been long and carefully debated by prominent scholars and jurists. See, e.g., GUIDO CALABRESI, THE COSTS OF ACCIDENTS: A LEGAL AND ECONOMIC ANALYSIS 263, 312 (1970);
  • 164
    • 33947617378 scopus 로고    scopus 로고
    • RICHARD A. POSNER, ECONOMIC ANALYSIS OF LAW 177-92 (6th ed. 2003);
    • RICHARD A. POSNER, ECONOMIC ANALYSIS OF LAW 177-92 (6th ed. 2003);
  • 165
    • 33947690312 scopus 로고    scopus 로고
    • Izhak Englard, The System Builders: A Critical Appraisal of Modern American Tort Theory, 9 J. LEG. STUD. 27, 51-56 (1980) (comparing the theories of Calabresi and Posner). Although this Article does not endeavor to tackle that abstract question, that debate may be given greater meaning in light of this concrete policy application of efficiency considerations to today's insecure database problem.
    • Izhak Englard, The System Builders: A Critical Appraisal of Modern American Tort Theory, 9 J. LEG. STUD. 27, 51-56 (1980) (comparing the theories of Calabresi and Posner). Although this Article does not endeavor to tackle that abstract question, that debate may be given greater meaning in light of this concrete policy application of efficiency considerations to today's insecure database problem.
  • 166
    • 33947628268 scopus 로고    scopus 로고
    • United States v. Carroll Towing Co., 159 F.2d 169, 173 (2d Cir. 1947) (ruling that if the probability be called P; the injury, L; and the burden, B, liability [in a negligence regime] depends upon whether B is less than L multiplied by P: i.e., whether B < PL.). For a contemporary invocation of the Hand Formula, see Cross v. Berg Lumber Co., 7 P.3d 922, 936 n.3 (Wyo. 2000). Some reject an economic view of optimal deterrence, instead asking whether the social benefits gained by reducing the risk of injury outweigh the social costs incurred to reduce the risk. KENNETH S. ABRAHAM, THE FORMS AND FUNCTIONS OF TORT LAW 15-16 (2d ed. 2002).
    • United States v. Carroll Towing Co., 159 F.2d 169, 173 (2d Cir. 1947) (ruling that "if the probability be called P; the injury, L; and the burden, B, liability [in a negligence regime] depends upon whether B is less than L multiplied by P: i.e., whether B < PL."). For a contemporary invocation of the Hand Formula, see Cross v. Berg Lumber Co., 7 P.3d 922, 936 n.3 (Wyo. 2000). Some reject an economic view of optimal deterrence, instead asking whether the social benefits gained by reducing the risk of injury outweigh the social costs incurred to reduce the risk. KENNETH S. ABRAHAM, THE FORMS AND FUNCTIONS OF TORT LAW 15-16 (2d ed. 2002).
  • 167
    • 33947703712 scopus 로고    scopus 로고
    • See ABRAHAM, supra note 121, at 16; STEVEN SHAVELL, ECONOMIC ANALYSIS OF LAW 46-47, 59 (2004) (explaining that when a due-care level is chosen by courts to equal the socially optimal level of care, the injurers will be led to exercise due care);
    • See ABRAHAM, supra note 121, at 16; STEVEN SHAVELL, ECONOMIC ANALYSIS OF LAW 46-47, 59 (2004) (explaining that when a due-care level is chosen by courts to equal the socially optimal level of care, the injurers will be led to exercise due care);
  • 168
    • 0347609003 scopus 로고    scopus 로고
    • The Trouble with Negligence, 54
    • Kenneth S. Abraham, The Trouble with Negligence, 54 VAND. L. REV. 1187, 1222 (2001).
    • (2001) VAND. L. REV , vol.1187 , pp. 1222
    • Abraham, K.S.1
  • 169
    • 0000525496 scopus 로고
    • Deterrence and Uncertain Legal Standards, 2
    • See
    • See Richard Craswell & John E. Calfee, Deterrence and Uncertain Legal Standards, 2 J.L. ECON. & ORG. 279, 279-80 (1986).
    • (1986) J.L. ECON. & ORG , vol.279 , pp. 279-280
    • Craswell, R.1    Calfee, J.E.2
  • 170
    • 33947615835 scopus 로고    scopus 로고
    • Guiseppe Dari-Mattiacci, Errors and the Functioning of Tort Liability, 13 SUP. CT. ECON. REV. 165, 169, 186 (2005) (explaining how uncertainty in liability rules and damages often yield higher levels of precaution);
    • Guiseppe Dari-Mattiacci, Errors and the Functioning of Tort Liability, 13 SUP. CT. ECON. REV. 165, 169, 186 (2005) (explaining how uncertainty in liability rules and damages often yield higher levels of precaution);
  • 171
    • 33947694384 scopus 로고
    • Uncertainty, Chaos, and the Torts Process: An Economic Analysis of Legal Form, 76
    • Jason Scott Johnston, Uncertainty, Chaos, and the Torts Process: An Economic Analysis of Legal Form, 76 CORNELL L. REV. 341, 359 (1991).
    • (1991) CORNELL L. REV , vol.341 , pp. 359
    • Scott Johnston, J.1
  • 172
    • 33947695269 scopus 로고    scopus 로고
    • See Craswell & Calfee, supra note 123, at 299; Mark F. Grady, A New Positive Economic Theory of Negligence, 92 YALE L.J. 799, 809-12 (1983).
    • See Craswell & Calfee, supra note 123, at 299; Mark F. Grady, A New Positive Economic Theory of Negligence, 92 YALE L.J. 799, 809-12 (1983).
  • 173
    • 33947682825 scopus 로고    scopus 로고
    • See SYMANTEC, COMPREHENSIVE THREAT MANAGEMENT: A SYMANTEC SOLUTION FOR MODERN-DAY ATTACK PROTECTION 4-5 (2006), http://wp.bitpipe.com/resource/org_939987896_418/10510712_CTM_wp_edp.pdf ? site_cd=fbs (explaining that hacker motivation to make money, coupled with a lower bar for developing malicious software, has steadily increased the number of threats to computer security);
    • See SYMANTEC, COMPREHENSIVE THREAT MANAGEMENT: A SYMANTEC SOLUTION FOR MODERN-DAY ATTACK PROTECTION 4-5 (2006), http://wp.bitpipe.com/resource/org_939987896_418/10510712_CTM_wp_edp.pdf? site_cd=fbs (explaining that hacker motivation to make money, coupled with a lower bar for developing malicious software, has steadily increased the number of threats to computer security);
  • 174
    • 33947703222 scopus 로고    scopus 로고
    • THE WHITE HOUSE, THE NATIONAL STRATEGY TO SECURE CYBERSPACE 8 (Feb. 2003), available at http://www.whitehouse.gov/pcipb/ cyberspace_strategy.pdf [hereinafter NATIONAL STRATEGY]; Smedinghoff, supra note 28, at 17. Due to the plethora of tools used by hackers, there has been a precipitous drop in the time that it takes for a new threat to be developed. SYMANTEC, supra, at 5.
    • THE WHITE HOUSE, THE NATIONAL STRATEGY TO SECURE CYBERSPACE 8 (Feb. 2003), available at http://www.whitehouse.gov/pcipb/ cyberspace_strategy.pdf [hereinafter NATIONAL STRATEGY]; Smedinghoff, supra note 28, at 17. Due to the plethora of tools used by hackers, there has been a "precipitous drop in the time that it takes for a new threat to be developed." SYMANTEC, supra, at 5.
  • 175
    • 33947627728 scopus 로고    scopus 로고
    • See also DAVID SANCHO, ROOTKITS: THE NEW WAVE OF INVISIBLE MALWARE IS HERE (2005), http://www.trendmicro.com/NR/rdonlyres/ 388874B6-C27C-4354-9078-42771EABEBB1/18503/rootkitwp.pdf (explaining the emergence of rootkits technology used by malware developers to infiltrate computers that is difficult to detect with antiviral software);
    • See also DAVID SANCHO, ROOTKITS: THE NEW WAVE OF INVISIBLE MALWARE IS HERE (2005), http://www.trendmicro.com/NR/rdonlyres/ 388874B6-C27C-4354-9078-42771EABEBB1/18503/rootkitwp.pdf (explaining the emergence of rootkits technology used by malware developers to infiltrate computers that is difficult to detect with antiviral software);
  • 176
    • 33947698947 scopus 로고    scopus 로고
    • Joris Evers, Office Hit by Another Security Problem, CNET NEWS.COM, June 22, 2006, http://news.zdnet.com/ Office+hit+by+another+security+problem/2100-1009_22-6087161.html (explaining a weakness in software that allows cyber-attackers to access sensitive information).
    • Joris Evers, Office Hit by Another Security Problem, CNET NEWS.COM, June 22, 2006, http://news.zdnet.com/ Office+hit+by+another+security+problem/2100-1009_22-6087161.html (explaining a weakness in software that allows cyber-attackers to access sensitive information).
  • 177
    • 33947648541 scopus 로고    scopus 로고
    • See NATIONAL STRATEGY, supra note 126, at 5, 8-9; Smedinghoff, supra note 28, at 17 (explaining that information security is a moving target).
    • See NATIONAL STRATEGY, supra note 126, at 5, 8-9; Smedinghoff, supra note 28, at 17 (explaining that information security is a "moving target").
  • 178
    • 33947615811 scopus 로고    scopus 로고
    • Uncertainty in the negligence standard also compounds the challenges faced by jurors assessing the care taken by a defendant in its information-security practices. While lay juries ordinarily have difficulty assessing negligence in complicated technical cases, juries may have an especially challenging time assessing a database operator's care over its security system given the rapid changes in technologies and new risks, which will cause experts to present diverging, yet convincing, views. See STEPHEN BREYER, ECONOMIC REASONING AND JUDICIAL REVIEW, AEI-BROOKINGS JOINT CENTER 2003 DISTINGUISHED LECTURE 12 Dec. 4, 2003, 2004, noting the difficulty courts have in assessing the outer bounds of what is reasonable in technical subject matter areas such as those involving computers where the parties offer warring expert testimony, Although judges serve as gatekeepers over
    • Uncertainty in the negligence standard also compounds the challenges faced by jurors assessing the care taken by a defendant in its information-security practices. While lay juries ordinarily have difficulty assessing negligence in complicated technical cases, juries may have an especially challenging time assessing a database operator's care over its security system given the rapid changes in technologies and new risks, which will cause experts to present diverging, yet convincing, views. See STEPHEN BREYER, ECONOMIC REASONING AND JUDICIAL REVIEW, AEI-BROOKINGS JOINT CENTER 2003 DISTINGUISHED LECTURE 12 (Dec. 4, 2003) (2004) (noting the difficulty courts have in assessing the "outer bounds of what is reasonable in technical subject matter areas" such as those involving computers where the parties offer warring expert testimony). Although judges serve as gatekeepers over the admissibility of technical expert testimony under Kumho Tire Co. v. Carmichael, 526 U.S. 137, 147 (1999), jurors will still wrestle with the clashing views of computer security experts whose testimony is deemed admissible.
  • 179
    • 33947616851 scopus 로고    scopus 로고
    • See LAWRENCE A. GORDON ET AL., COMPUTER SECURITY INSTITUTE, 2005 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY 11 (2005), available at http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2005.pdf (explaining that [t]echnical computer security measures such as use of passwords, biometrics, anti-virus software and intrusion detection systems cannot totally reduce an organization's risk of computer security breaches and the associated financial losses);
    • See LAWRENCE A. GORDON ET AL., COMPUTER SECURITY INSTITUTE, 2005 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY 11 (2005), available at http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2005.pdf (explaining that "[t]echnical computer security measures such as use of passwords, biometrics, anti-virus software and intrusion detection systems cannot totally reduce an organization's risk of computer security breaches and the associated financial losses");
  • 180
    • 33947684942 scopus 로고    scopus 로고
    • PHOENIX TRUSTCONNECTOR, THE TRUSTED-CONNECTION LANDSCAPE 1 (Sept. 1, 2005), http://research.telephonyonline.com/detail/RES/1126533537_228.html&s rc= TRM_TOPN (explaining that despite firewalls, intrusion detection systems, and user authentication tools, information systems are being successfully penetrated due to rapid growth of malicious software and innovative hackers);
    • PHOENIX TRUSTCONNECTOR, THE TRUSTED-CONNECTION LANDSCAPE 1 (Sept. 1, 2005), http://research.telephonyonline.com/detail/RES/1126533537_228.html&src= TRM_TOPN (explaining that despite firewalls, intrusion detection systems, and user authentication tools, information systems are being successfully penetrated due to rapid growth of malicious software and innovative hackers);
  • 181
    • 33947670529 scopus 로고    scopus 로고
    • John Dobberstein, Crime Online: State Businesses, Law Enforcement Officials and Other Groups Are Trying to Stop Hackers and Cyber Terrorists, TULSA WORLD, July 23, 2006, at E1 (citing survey results establishing that passwords, biometrics, anti-virus software, and intrusion detection systems cannot totally reduce an organization's risk of computer security breaches); Smedinghoff, supra note 28, at 19 (noting that [a]t some level, security breaches may be inevitable).
    • John Dobberstein, Crime Online: State Businesses, Law Enforcement Officials and Other Groups Are Trying to Stop Hackers and Cyber Terrorists, TULSA WORLD, July 23, 2006, at E1 (citing survey results establishing that passwords, biometrics, anti-virus software, and intrusion detection systems "cannot totally reduce an organization's risk of computer security breaches"); Smedinghoff, supra note 28, at 19 (noting that "[a]t some level, security breaches may be inevitable").
  • 182
    • 33947652271 scopus 로고    scopus 로고
    • See SHAVELL, supra note 122, at 46
    • See SHAVELL, supra note 122, at 46.
  • 183
    • 33947641145 scopus 로고    scopus 로고
    • Today's hazardous cyber-reservoirs would fall outside the current Restatement's description of abnormally dangerous activities. See, e.g, RESTATEMENT (THIRD) OF TORTS: LIABILITY FOR PHYSICAL HARM § 20 (Proposed Final Draft No. 1, Apr. 6, 2005, abnormally dangerous activities must involve a, risk of physical harm (emphasis added, Rosenblatt v. Exxon Co, U.S.A, 642 A.2d 180, 188 Md. 1994, declining to extend the doctrine of strict liability to embrace economic harm, Nonetheless, information reservoirs share the defining characteristics of the Restatement's abnormally dangerous activities such as blasting and water reservoirs, high utility and high risk. In Kenneth Abraham's view, abnormally dangerous activities are governed by strict liability so as to protect victims who are unlikely to know much about the activity and cannot protect themselves against its risks
    • Today's hazardous cyber-reservoirs would fall outside the current Restatement's description of abnormally dangerous activities. See, e.g., RESTATEMENT (THIRD) OF TORTS: LIABILITY FOR PHYSICAL HARM § 20 (Proposed Final Draft No. 1, Apr. 6, 2005) (abnormally dangerous activities must involve "a . . . risk of physical harm" (emphasis added)); Rosenblatt v. Exxon Co., U.S.A., 642 A.2d 180, 188 (Md. 1994) (declining to extend the doctrine of strict liability to embrace economic harm). Nonetheless, information reservoirs share the defining characteristics of the Restatement's abnormally dangerous activities such as blasting and water reservoirs - high utility and high risk. In Kenneth Abraham's view, abnormally dangerous activities are governed by strict liability so as to protect victims who "are unlikely to know much about" the activity and cannot protect themselves against its risks. ABRAHAM, supra note 121, at 169. This rationale applies to information reservoirs as individuals whose data is collected by data brokers know little about where their data resides and can do nothing to prevent database operators from amassing their sensitive data. Although hazardous information reservoirs do not fall within the Restatement prescription of an abnormally dangerous activity, a strong argument exists for extending that definition of abnormally dangerous activities to include bursting cyber-reservoirs. In revisiting the Restatement view of abnormally dangerous activities, the American Law Institute ought to consider compensable harm in the twenty-first century to include injuries to our market identity caused by the release of sensitive personal data. See infra Part IV.D. (discussing the need for a change in our conception of harm in the Information Age).
  • 184
    • 33947627727 scopus 로고    scopus 로고
    • Ind. Harbor Belt R.R. v. Am. Cyanamid Co., 916 F.2d 1174, 1177 (7th Cir. 1990) (Posner, J.); POSNER, supra note 120, at 180 (citing A.W.B. Simpson, Legal Liability for Bursting Reservoirs: The Historical Context of Rylands v. Fletcher, 13 J. LEGAL STUD. 209 (1984)).
    • Ind. Harbor Belt R.R. v. Am. Cyanamid Co., 916 F.2d 1174, 1177 (7th Cir. 1990) (Posner, J.); POSNER, supra note 120, at 180 (citing A.W.B. Simpson, Legal Liability for Bursting Reservoirs: The Historical Context of Rylands v. Fletcher, 13 J. LEGAL STUD. 209 (1984)).
  • 185
    • 33947649643 scopus 로고    scopus 로고
    • POSNER, supra note 120, at 180
    • POSNER, supra note 120, at 180.
  • 186
    • 33947704244 scopus 로고    scopus 로고
    • Id
    • Id.
  • 187
    • 33947671981 scopus 로고    scopus 로고
    • See supra Part IV.A-B (discussing cyber-security).
    • See supra Part IV.A-B (discussing cyber-security).
  • 188
    • 33947695761 scopus 로고    scopus 로고
    • See Smedinghoff, supra note 28, at 19
    • See Smedinghoff, supra note 28, at 19.
  • 189
    • 33947661509 scopus 로고    scopus 로고
    • For example, employers storing employee SSNs for tax reporting can discontinue using them as a form of employee identification. See Stolen Social Security Number Records Prompt Lawsuit Against Union Pacific, 29 U.S. RAIL NEWS 111 2006, describing a complaint asserting that a data-security breach resulted from a company's use of employee SSNs for identification and arguing that the employer should only have used SSNs for tax reporting, Organizations can also disconnect databases containing ultrasensitive information from the Internet to prevent hacking. Additionally, organizations can store biometric information on Smart Cards, which permit individuals to carry their biometrics on a card, instead of in centralized databases subject to theft. See Int'l Biometric, supra note 67, at 22, 24; Sethi, supra note 34, at 120-21
    • For example, employers storing employee SSNs for tax reporting can discontinue using them as a form of employee identification. See Stolen Social Security Number Records Prompt Lawsuit Against Union Pacific, 29 U.S. RAIL NEWS 111 (2006) (describing a complaint asserting that a data-security breach resulted from a company's use of employee SSNs for identification and arguing that the employer should only have used SSNs for tax reporting). Organizations can also disconnect databases containing ultrasensitive information from the Internet to prevent hacking. Additionally, organizations can store biometric information on Smart Cards, which permit individuals to carry their biometrics on a card, instead of in centralized databases subject to theft. See Int'l Biometric, supra note 67, at 22, 24; Sethi, supra note 34, at 120-21.
  • 190
    • 33947634590 scopus 로고
    • The First-party Insurance Externality: An Economic Justification for Enterprise Liability, 76
    • See
    • See Jon D. Hanson & Kyle D. Logue, The First-party Insurance Externality: An Economic Justification for Enterprise Liability, 76 CORNELL L. REV. 129, 135, 137-38 (1991).
    • (1991) CORNELL L. REV , vol.129 , Issue.135 , pp. 137-138
    • Hanson, J.D.1    Logue, K.D.2
  • 191
    • 33947683931 scopus 로고    scopus 로고
    • E.g., id.; John E. Calfee & Clifford Winston, Economic Aspects of Liability Rules and Liability Insurance, in LIABILITY: PERSPECTIVES AND POLICY 16, 16 (Robert E. Litan & Clifford Winston eds., 1988).
    • E.g., id.; John E. Calfee & Clifford Winston, Economic Aspects of Liability Rules and Liability Insurance, in LIABILITY: PERSPECTIVES AND POLICY 16, 16 (Robert E. Litan & Clifford Winston eds., 1988).
  • 192
    • 33947620137 scopus 로고    scopus 로고
    • See POSNER, supra note 120, at 181
    • See POSNER, supra note 120, at 181.
  • 193
    • 33947663065 scopus 로고    scopus 로고
    • See infra note 239 (discussing the availability of cyber-risk insurance to database operators that covers third-party losses due to leaks of sensitive data and identity-theft insurance available to individuals, When the demand for a good is inelastic, a seller's ability to pass on the cost of insurance to consumers is strong. Emerging technologies that offer highly valued services in thin markets, meaning that there are few substitutes, including massive computer databases containing sensitive information, are paradigmatic illustrations of markets characterized by inelastic demand. For a discussion of the concept of elasticity, see RICHARD A. IPPOLITO, ECONOMICS FOR LAWYERS 131-39 (2005, PAUL A. SAMUELSON & WILLIAM D. NORDHAUS, ECONOMICS 64-70 16th ed. 1998
    • See infra note 239 (discussing the availability of cyber-risk insurance to database operators that covers third-party losses due to leaks of sensitive data and identity-theft insurance available to individuals). When the demand for a good is inelastic, a seller's ability to pass on the cost of insurance to consumers is strong. Emerging technologies that offer highly valued services in thin markets, meaning that there are few substitutes, including massive computer databases containing sensitive information, are paradigmatic illustrations of markets characterized by inelastic demand. For a discussion of the concept of elasticity, see RICHARD A. IPPOLITO, ECONOMICS FOR LAWYERS 131-39 (2005); PAUL A. SAMUELSON & WILLIAM D. NORDHAUS, ECONOMICS 64-70 (16th ed. 1998).
  • 194
    • 33947669948 scopus 로고    scopus 로고
    • Escola v. Coca Cola Bottling Co. of Fresno, 150 P.2d 436, 441 (Cal. 1944, Traynor, J, concurring, The maintenance of hazardous information reservoirs parallels the manufacture of defective products in other ways as well. Just as a person injured by a product is not ordinarily in a position to refute, evidence [about a manufacturing process] or identify the cause of the defect, id, here, too, individuals will have great difficulty identifying the flaws in a database operator's security system and proving a database operator's negligence. And like the consumer who lacks the skill to investigate the soundness of a product, individuals have no knowledge about where their data resides, let alone the ability to assess the security provided their personal data. See generally KENNETH S. ABRAHAM, DISTRIBUTING RISK: INSURANCE, LEGAL THEORY, AND PUBLIC POLICY 64-100 (1986) and Kenneth S. A
    • Escola v. Coca Cola Bottling Co. of Fresno, 150 P.2d 436, 441 (Cal. 1944) (Traynor, J., concurring). The maintenance of hazardous information reservoirs parallels the manufacture of defective products in other ways as well. Just as a person injured by a product is "not ordinarily in a position to refute . . . evidence [about a manufacturing process] or identify the cause of the defect," id., here, too, individuals will have great difficulty identifying the flaws in a database operator's security system and proving a database operator's negligence. And like the consumer who lacks the skill to investigate the soundness of a product, individuals have no knowledge about where their data resides, let alone the ability to assess the security provided their personal data. See generally KENNETH S. ABRAHAM, DISTRIBUTING RISK: INSURANCE, LEGAL THEORY, AND PUBLIC POLICY 64-100 (1986) and Kenneth S. Abraham, Liability Insurance and Accident Prevention: The Evolution of an Idea, 64 MD. L. REV. 573 (2005) for insightful discussions of liability insurance.
  • 195
    • 33947683394 scopus 로고    scopus 로고
    • See Abraham, supra note 122, at 1191; Robert E. Keeton, Is There a Place for Negligence in Modern Tort Law?, 53 VA. L. REV. 886, 889-90 (1967) (explaining that adjudications of negligence place [a] mark of legal disapproval, with all its practical consequences, on identifiable types of conduct [that] may influence the attitudes and future behavior of others);
    • See Abraham, supra note 122, at 1191; Robert E. Keeton, Is There a Place for Negligence in Modern Tort Law?, 53 VA. L. REV. 886, 889-90 (1967) (explaining that adjudications of negligence "place [a] mark of legal disapproval, with all its practical consequences, on identifiable types of conduct [that] may influence the attitudes and future behavior" of others);
  • 196
    • 0142138821 scopus 로고    scopus 로고
    • Benjamin C. Zipursky, Civil Recourse, Not Corrective Justice, 91 GEO. L.J. 695, 743 (2003) (explaining that the norms of tort law are directive and conduct-oriented: they enjoin persons from treating others in certain ways and from interfering with others' interests in certain ways, serving as guidance rules).
    • Benjamin C. Zipursky, Civil Recourse, Not Corrective Justice, 91 GEO. L.J. 695, 743 (2003) (explaining that the norms of tort law are "directive and conduct-oriented: they enjoin persons from treating others in certain ways and from interfering with others' interests in certain ways," serving as "guidance rules").
  • 197
    • 33947653293 scopus 로고    scopus 로고
    • See NATIONAL STRATEGY, supra note 126, at 8; SYMANTEC, supra note 126, at 4-5 (explaining that hacker motivation to make money, coupled with a lower bar for developing malicious software, has steadily increased the number of threats to computer security).
    • See NATIONAL STRATEGY, supra note 126, at 8; SYMANTEC, supra note 126, at 4-5 (explaining that hacker motivation to make money, coupled with a lower bar for developing malicious software, has steadily increased the number of threats to computer security).
  • 198
    • 33947630343 scopus 로고    scopus 로고
    • See Smedinghoff, supra note 28, at 17
    • See Smedinghoff, supra note 28, at 17.
  • 199
    • 33947684934 scopus 로고    scopus 로고
    • Abraham, supra note 122, at 1203, 1223
    • Abraham, supra note 122, at 1203, 1223.
  • 200
    • 0142200446 scopus 로고    scopus 로고
    • Negligence, Compensation, and the Coherence of Tort Law, 91
    • Mark Geistfeld, Negligence, Compensation, and the Coherence of Tort Law, 91 GEO. L.J. 585, 618 (2003).
    • (2003) GEO. L.J , vol.585 , pp. 618
    • Geistfeld, M.1
  • 201
    • 33947672438 scopus 로고    scopus 로고
    • O.W. HOLMES, JR., THE COMMON LAW 117 (Boston, Little, Brown, & Co. 1881); Abraham, supra note 122, at 1222 (explaining that flaws in the negligence standard should make us much more willing to consider proposals for no-fault alternatives to liability for negligence). Although Holmes is widely regarded as a proponent of negligence and a foe of strict liability, Holmes approved of strict liability for the foreseeable risks of high risk and high social utility activities such as the maintenance of reservoirs.
    • O.W. HOLMES, JR., THE COMMON LAW 117 (Boston, Little, Brown, & Co. 1881); Abraham, supra note 122, at 1222 (explaining that "flaws in the negligence standard should make us much more willing to consider proposals for no-fault alternatives to liability for negligence"). Although Holmes is widely regarded as a proponent of negligence and a foe of strict liability, Holmes approved of strict liability for the foreseeable risks of high risk and high social utility activities such as the maintenance of reservoirs.
  • 202
    • 33947615804 scopus 로고    scopus 로고
    • See The Theory of Torts, 7 AM. L. REV. 652, 653, 663 (1873) (wherein Holmes discusses the justifications for strict liability vis-à-vis Rylands v. Fletcher);
    • See The Theory of Torts, 7 AM. L. REV. 652, 653, 663 (1873) (wherein Holmes discusses the justifications for strict liability vis-à-vis Rylands v. Fletcher);
  • 203
    • 33947629266 scopus 로고    scopus 로고
    • DAVID ROSENBERG, THE HIDDEN HOLMES: HIS THEORY OF TORTS IN HISTORY 9 (1995) (noting that many scholars overlooked Holmes's approval of Rylands).
    • DAVID ROSENBERG, THE HIDDEN HOLMES: HIS THEORY OF TORTS IN HISTORY 9 (1995) (noting that many scholars overlooked Holmes's approval of Rylands).
  • 205
    • 33947679341 scopus 로고    scopus 로고
    • See FRIEDMAN, supra note 3, at 356-66, 519. See also MORTON J. HORWITZ, THE TRANSFORMATION OF AMERICAN LAW 1870-1960: THE CRISIS OF LEGAL ORTHODOXY 142 (1992) (discussing how social and economic necessities influence legal decisions).
    • See FRIEDMAN, supra note 3, at 356-66, 519. See also MORTON J. HORWITZ, THE TRANSFORMATION OF AMERICAN LAW 1870-1960: THE CRISIS OF LEGAL ORTHODOXY 142 (1992) (discussing how social and economic necessities influence legal decisions).
  • 206
    • 33947657451 scopus 로고    scopus 로고
    • BENJAMIN M. FRIEDMAN, THE MORAL CONSEQUENCES OF ECONOMIC GROWTH 224 (2005).
    • BENJAMIN M. FRIEDMAN, THE MORAL CONSEQUENCES OF ECONOMIC GROWTH 224 (2005).
  • 207
    • 33947660969 scopus 로고    scopus 로고
    • Id. at 54
    • Id. at 54.
  • 208
    • 33947688759 scopus 로고    scopus 로고
    • See id
    • See id.
  • 209
    • 33947616310 scopus 로고    scopus 로고
    • See infra notes 208-16. The evolving law of water rights in the nineteenth century similarly illustrates the profound role played by economic concerns in the shaping of law. See MORTON J. HORWITZ, THE TRANSFORMATION OF AMERICAN LAW 1780-1860, at 34-35 1977, In the early nineteenth century, courts viewed land not as a productive asset but as a private estate to be enjoyed for its own sake, finding any nonconsensual interference with the natural flow of water illegal. Id. at 36. As industrialization began to take root, however, courts eroded the restrictive common law rules to permit extensive, uncompensated use of water for business purposes. Id. at 36-37. As the economy strengthened during the second quarter of the nineteenth century, courts began to strike a balance between competing land uses, only freeing economically desirable but injurious activities from legal liability if they were exercised with
    • See infra notes 208-16. The evolving law of water rights in the nineteenth century similarly illustrates the profound role played by economic concerns in the shaping of law. See MORTON J. HORWITZ, THE TRANSFORMATION OF AMERICAN LAW 1780-1860, at 34-35 (1977). In the early nineteenth century, courts viewed land not as a productive asset but as a private estate to be enjoyed for its own sake, finding any nonconsensual interference with the natural flow of water illegal. Id. at 36. As industrialization began to take root, however, courts eroded the restrictive common law rules to permit extensive, uncompensated use of water for business purposes. Id. at 36-37. As the economy strengthened during the second quarter of the nineteenth century, courts began to strike a balance between competing land uses, only freeing economically desirable but injurious activities from legal liability if they were exercised with due care. Id. at 102.
  • 210
    • 33947652243 scopus 로고    scopus 로고
    • See Rylands v. Fletcher, (1868) 3 L.R.E. & I. App. 330, 338-40 (H.L.); Kenneth S. Abraham, Rylands v. Fletcher: Tort Law's Conscience, in TORTS STORIES 207, 207 (Robert L. Rabin & Stephen D. Sugarman eds., 2003).
    • See Rylands v. Fletcher, (1868) 3 L.R.E. & I. App. 330, 338-40 (H.L.); Kenneth S. Abraham, Rylands v. Fletcher: Tort Law's Conscience, in TORTS STORIES 207, 207 (Robert L. Rabin & Stephen D. Sugarman eds., 2003).
  • 211
    • 33947662039 scopus 로고    scopus 로고
    • Fletcher v. Rylands, (1865) 159 Eng. Rep. 737, 739-40 (Exch.).
    • Fletcher v. Rylands, (1865) 159 Eng. Rep. 737, 739-40 (Exch.).
  • 212
    • 33947650130 scopus 로고    scopus 로고
    • Id
    • Id.
  • 213
    • 33947671447 scopus 로고    scopus 로고
    • Simpson, supra note 132, at 241-42
    • Simpson, supra note 132, at 241-42.
  • 214
    • 33947675908 scopus 로고    scopus 로고
    • Fletcher, 159 Eng. Rep. at 743-47.
    • Fletcher, 159 Eng. Rep. at 743-47.
  • 215
    • 33947687252 scopus 로고    scopus 로고
    • Fletcher v. Rylands, (1866) 1 L.R. Exch. 265, 279 (Exch.).
    • Fletcher v. Rylands, (1866) 1 L.R. Exch. 265, 279 (Exch.).
  • 216
    • 33947664553 scopus 로고    scopus 로고
    • 3 HARPER ET AL, supra note 119, at 191
    • 3 HARPER ET AL., supra note 119, at 191.
  • 217
    • 33947675357 scopus 로고    scopus 로고
    • Fletcher, 1 L.R. Exch. at 279.
    • Fletcher, 1 L.R. Exch. at 279.
  • 218
    • 33947657046 scopus 로고    scopus 로고
    • Rylands v. Fletcher, (1868) 3 L.R.E. & I. App. 330, 338-40, 342 (H.L.).
    • Rylands v. Fletcher, (1868) 3 L.R.E. & I. App. 330, 338-40, 342 (H.L.).
  • 219
    • 33947684421 scopus 로고    scopus 로고
    • Id. (quoting Fletcher, 1 L.R. Exch. at 279).
    • Id. (quoting Fletcher, 1 L.R. Exch. at 279).
  • 220
    • 84888442523 scopus 로고    scopus 로고
    • text accompanying notes 46-72 discussing the ultrahazardous nature of computer databases
    • See supra text accompanying notes 46-72 (discussing the ultrahazardous nature of computer databases).
    • See supra
  • 222
    • 33947637255 scopus 로고    scopus 로고
    • See. e.g., Brown v. Collins, 53 N.H. 442, 449-50 (1873) (finding Rylands contrary to American authority, as well as to [the Court's] understanding of legal principles).
    • See. e.g., Brown v. Collins, 53 N.H. 442, 449-50 (1873) (finding Rylands "contrary to American authority, as well as to [the Court's] understanding of legal principles").
  • 223
    • 33947666707 scopus 로고    scopus 로고
    • See LOUIS MENAND, THE METAPHYSICAL CLUB 339 (2001);
    • See LOUIS MENAND, THE METAPHYSICAL CLUB 339 (2001);
  • 224
    • 33947705762 scopus 로고    scopus 로고
    • Roscoe Pound, The End of Law as Developed in Legal Rules and Doctrines, 27 HARV. L. REV. 195, 204 (1914). [F]ormalism maintains that because law is internally intelligible, it does not require, nor would it be useful for it to have, the assistance of any external discipline, such as history, economics, social science, or philosophy, as part of its understanding or justification.
    • Roscoe Pound, The End of Law as Developed in Legal Rules and Doctrines, 27 HARV. L. REV. 195, 204 (1914). "[F]ormalism maintains that because law is internally intelligible, it does not require, nor would it be useful for it to have, the assistance of any external discipline, such as history, economics, social science, or philosophy, as part of its understanding or justification."
  • 225
    • 0347958907 scopus 로고
    • Formalism, Corrective Justice and Tort Law, 77
    • Ken Kress, Formalism, Corrective Justice and Tort Law, 77 IOWA L. REV. i, i (1992).
    • (1992) IOWA L. REV , Issue.Iand I
    • Kress, K.1
  • 226
    • 33947678811 scopus 로고    scopus 로고
    • See 3 HARPER ET AL., supra note 119, at 190; F.H. Newark, The Boundaries of Nuisance, 65 L.Q. REV. 480, 487 (1949).
    • See 3 HARPER ET AL., supra note 119, at 190; F.H. Newark, The Boundaries of Nuisance, 65 L.Q. REV. 480, 487 (1949).
  • 227
    • 33947708458 scopus 로고    scopus 로고
    • Rylands v. Fletcher, (1868) 3 L.R.E. & I. App. 330, 338 (H.L.).
    • Rylands v. Fletcher, (1868) 3 L.R.E. & I. App. 330, 338 (H.L.).
  • 228
    • 33947623199 scopus 로고    scopus 로고
    • See Fletcher v. Rylands, (1866) 1 L.R. Exch. 265, 279-81 (Exch.); 3 HARPER ET AL., supra note 119, at 191-92.
    • See Fletcher v. Rylands, (1866) 1 L.R. Exch. 265, 279-81 (Exch.); 3 HARPER ET AL., supra note 119, at 191-92.
  • 229
    • 33947699438 scopus 로고    scopus 로고
    • But cf. Ezra R. Thayer, Judicial Legislation: Its Legitimate Function in the Development of the Common Law, 5 HARV. L. REV. 172, 184-85 (1892) (embracing a scientific approach to tort law, a subspecies of formalism, which questions the extent to which Rylands truly follows from established tort law involving fire and escaping cows).
    • But cf. Ezra R. Thayer, Judicial Legislation: Its Legitimate Function in the Development of the Common Law, 5 HARV. L. REV. 172, 184-85 (1892) (embracing a scientific approach to tort law, a subspecies of formalism, which questions the extent to which Rylands truly follows from established tort law involving fire and escaping cows).
  • 230
    • 33947638009 scopus 로고    scopus 로고
    • See Newark, supra note 169, at 487. At the time of Rylands, the English tradition distinguishing trespass and trespass on the case prevailed, a distinction that is largely extinct in contemporary times. I do not mean to equate the nature of the interest invaded in Rylands - land - with that harmed by the release of cyber-data today. Instead, this Article discusses why Rylands serves as a powerful metaphor for the release of sensitive personal data from the Information Age's cyber-reservoirs.
    • See Newark, supra note 169, at 487. At the time of Rylands, the English tradition distinguishing trespass and trespass on the case prevailed, a distinction that is largely extinct in contemporary times. I do not mean to equate the nature of the interest invaded in Rylands - land - with that harmed by the release of cyber-data today. Instead, this Article discusses why Rylands serves as a powerful metaphor for the release of sensitive personal data from the Information Age's cyber-reservoirs.
  • 231
    • 33947701633 scopus 로고    scopus 로고
    • See MENAND, supra note 168, at 339 (grouping legal theories that emphasize social consequences of the law under the rubric utilitarian); 1 ROSCOE POUND, JURISPRUDENCE 512-13 (1959); Zipursky, supra note 143, at 696. Utilitarian judges fashioned rules to prevent future harms.
    • See MENAND, supra note 168, at 339 (grouping legal theories that emphasize social consequences of the law under the rubric "utilitarian"); 1 ROSCOE POUND, JURISPRUDENCE 512-13 (1959); Zipursky, supra note 143, at 696. Utilitarian judges "fashioned rules" to prevent "future harms."
  • 232
    • 1842487405 scopus 로고
    • The Duty Problem in Negligence Cases: II, 29
    • See
    • See Leon Green, The Duty Problem in Negligence Cases: II, 29 COLUM. L. REV. 255, 255-56 (1929).
    • (1929) COLUM. L. REV , vol.255 , pp. 255-256
    • Green, L.1
  • 233
    • 33947682820 scopus 로고    scopus 로고
    • FREDERICK POLLOCK, THE LAW OF TORTS 307 (Phila., Blackstone Publ'g Co. 1887); Frederick Pollock, Duties of Insuring Safety: The Rule in Rylands v. Fletcher, 2 L.Q. REV. 52 (1886) [hereinafter Pollock, Duties].
    • FREDERICK POLLOCK, THE LAW OF TORTS 307 (Phila., Blackstone Publ'g Co. 1887); Frederick Pollock, Duties of Insuring Safety: The Rule in Rylands v. Fletcher, 2 L.Q. REV. 52 (1886) [hereinafter Pollock, Duties].
  • 234
    • 33947639060 scopus 로고    scopus 로고
    • See John Murphy, The Merits of Rylands v. Fletcher, 24 OXFORD J. LEGAL STUD. 643, 649 (2004) (explaining that three references to alkali works in the Exchequer Chamber's decision in Rylands illustrate that concerns of industrial harms were on the forefront of judges' minds). Deadly reservoir failures occurred just before, and during, the Rylands decisions, raising the public's fear about the collection of water in reservoirs. Simpson, supra note 132, at 244-51 (arguing that well-known dam failures prompted Rylands).
    • See John Murphy, The Merits of Rylands v. Fletcher, 24 OXFORD J. LEGAL STUD. 643, 649 (2004) (explaining that three references to alkali works in the Exchequer Chamber's decision in Rylands illustrate that concerns of industrial harms were on the forefront of judges' minds). Deadly reservoir failures occurred just before, and during, the Rylands decisions, raising the public's fear about the collection of water in reservoirs. Simpson, supra note 132, at 244-51 (arguing that well-known dam failures prompted Rylands).
  • 235
    • 33947638007 scopus 로고    scopus 로고
    • See also ROSCOE POUND, INTERPRETATIONS OF LEGAL HISTORY 109 (1923) (explaining that Rylands reflected a social-justice ethic prominent in 1860s England that sought to protect individuals from industrial harm and provided for the public's general security).
    • See also ROSCOE POUND, INTERPRETATIONS OF LEGAL HISTORY 109 (1923) (explaining that Rylands reflected a social-justice ethic prominent in 1860s England that sought to protect individuals from industrial harm and provided for the public's "general security").
  • 236
    • 33947647450 scopus 로고    scopus 로고
    • See POLLOCK, supra note 174, at 307;
    • See POLLOCK, supra note 174, at 307;
  • 238
    • 33947634586 scopus 로고    scopus 로고
    • POLLOCK, supra note 174, at 307
    • POLLOCK, supra note 174, at 307.
  • 239
    • 33947640633 scopus 로고    scopus 로고
    • Id. at 311
    • Id. at 311.
  • 240
    • 33947688762 scopus 로고    scopus 로고
    • See id.; POUND, supra note 175, at 109.
    • See id.; POUND, supra note 175, at 109.
  • 241
    • 33947689240 scopus 로고    scopus 로고
    • See JOHN FABIAN WITT, THE ACCIDENTAL REPUBLIC: CRIPPLED WORKINGMEN, DESTITUTE WIDOWS, AND THE REMAKING OF AMERICAN LAW 8 (2004).
    • See JOHN FABIAN WITT, THE ACCIDENTAL REPUBLIC: CRIPPLED WORKINGMEN, DESTITUTE WIDOWS, AND THE REMAKING OF AMERICAN LAW 8 (2004).
  • 242
    • 33947614214 scopus 로고    scopus 로고
    • See FRANCIS H. BOHLEN, STUDIES IN THE LAW OF TORTS 351 (1926) [hereinafter BOHLEN, STUDIES];
    • See FRANCIS H. BOHLEN, STUDIES IN THE LAW OF TORTS 351 (1926) [hereinafter BOHLEN, STUDIES];
  • 243
    • 33947636176 scopus 로고
    • The Rule in Rylands v. Fletcher: Part I, 59
    • Francis H. Bohlen, The Rule in Rylands v. Fletcher: Part I, 59 U. PA. L. REV. 298, 303 (1911);
    • (1911) U. PA. L. REV , vol.298 , pp. 303
    • Bohlen, F.H.1
  • 244
    • 0040294747 scopus 로고
    • Tort Law Public Law in Disguise, 38
    • Leon Green, Tort Law Public Law in Disguise, 38 TEX. L. REV. 1, 5 (1960).
    • (1960) TEX. L. REV , vol.1 , pp. 5
    • Green, L.1
  • 245
    • 33947658498 scopus 로고    scopus 로고
    • See BOHLEN, STUDIES, supra note 181, at 368-69 (What may appear desirable in an ancient and highly organized society whose natural resources have been gradually and fully developed may be utterly inappropriate and harmful in a newly settled country whose natural resources still require exploitation, Green, supra note 181, at 5, W]e do know that in England at this time a new and prosperous industry as milling could well afford to bear the risks it imposed on the older and equally if not more important mining industry, Kenzo Takayanagi, Liability Without Fault in the Modern Civil and Common Law, 16 ILL. L. REV. 163, 168 1921, attributing the Rylands decision to the growth of commerce and the rise of large-scale enterprises that could spread the cost of accidents, Bohlen also suggested, to much criticism, that the judges hearing the case in the House of Lords hailed from or aspired to the lande
    • See BOHLEN, STUDIES, supra note 181, at 368-69 ("What may appear desirable in an ancient and highly organized society whose natural resources have been gradually and fully developed may be utterly inappropriate and harmful in a newly settled country whose natural resources still require exploitation."); Green, supra note 181, at 5 ("[W]e do know that in England at this time a new and prosperous industry as milling could well afford to bear the risks it imposed on the older and equally if not more important mining industry."); Kenzo Takayanagi, Liability Without Fault in the Modern Civil and Common Law, 16 ILL. L. REV. 163, 168 (1921) (attributing the Rylands decision to the growth of commerce and the rise of large-scale enterprises that could spread the cost of accidents). Bohlen also suggested, to much criticism, that the judges hearing the case in the House of Lords hailed from or aspired to the landed gentry and thus adopted a rule that would advance the protection of their interests over the commercial interests of the enterprising middle class. BOHLEN, STUDIES, supra note 181, at 369. Others have refuted this classist explanation of Rylands. See POUND, supra note 175, at 106-07.
  • 246
    • 33947618554 scopus 로고    scopus 로고
    • See generally Robert Thomas Molloy, Fletcher v. Rylands: A Reexamination of Juristic Origins, 9 U. CHI. L. REV. 266 (1942) (explaining that the middle-class backgrounds of some House of Lords judges refutes Bohlen's class thesis).
    • See generally Robert Thomas Molloy, Fletcher v. Rylands: A Reexamination of Juristic Origins, 9 U. CHI. L. REV. 266 (1942) (explaining that the middle-class backgrounds of some House of Lords judges refutes Bohlen's class thesis).
  • 247
    • 33947679346 scopus 로고    scopus 로고
    • See BOHLEN, STUDIES, supra note 181, at 369 (explaining the U.S. rejection of Rylands as partly attributable to the country's pressing need to encourage material development); Green, supra note 181, at 5 (same).
    • See BOHLEN, STUDIES, supra note 181, at 369 (explaining the U.S. rejection of Rylands as partly attributable to the country's pressing need to encourage material development); Green, supra note 181, at 5 (same).
  • 248
    • 33947633050 scopus 로고    scopus 로고
    • FRIEDMAN, supra note 3, at 351 (explaining that absolute liability rules like that imposed in Rylands were initially rejected in the United States because they risked strangling the economy); W. PAGE KEETON ET AL., PROSSER AND KEETON ON THE LAW OF TORTS 548-49 (5th ed. 1984) (explaining that late-nineteenth-century courts rejected the strict-liability standard because it would be too great a burden on the industrial and commercial development of the country).
    • FRIEDMAN, supra note 3, at 351 (explaining that absolute liability rules like that imposed in Rylands were initially rejected in the United States because they risked strangling the economy); W. PAGE KEETON ET AL., PROSSER AND KEETON ON THE LAW OF TORTS 548-49 (5th ed. 1984) (explaining that late-nineteenth-century courts rejected the strict-liability standard because it would be too great a burden on the industrial and commercial development of the country).
  • 249
    • 33947631982 scopus 로고    scopus 로고
    • But see generally Gary T. Schwartz, Tort Law and the Economy in Nineteenth-century America: A Reinterpretation, 90 YALE L.J. 1717 (1981) (rejecting the thesis that tort law of the nineteenth century adopted a fault-based standard in order to subsidize industry).
    • But see generally Gary T. Schwartz, Tort Law and the Economy in Nineteenth-century America: A Reinterpretation, 90 YALE L.J. 1717 (1981) (rejecting the thesis that tort law of the nineteenth century adopted a fault-based standard in order to subsidize industry).
  • 250
    • 33947711316 scopus 로고    scopus 로고
    • Brown v. Collins, 53 N.H. 442 (1873).
    • Brown v. Collins, 53 N.H. 442 (1873).
  • 251
    • 33947656525 scopus 로고    scopus 로고
    • Id. at 448. See also Losee v. Buchanan, 51 N.Y. 476, 484 (1873) (condemning the strict-liability rule of Rylands as incompatible with the development of factories, machinery, dams, canals and railroads); Pa. Coal Co. v. Sanderson, 6 A. 453, 459-60 (Pa. 1886) (rejecting Rylands as wholly inapplicable to the case at bar and noting that the coal industry serves a great public interest).
    • Id. at 448. See also Losee v. Buchanan, 51 N.Y. 476, 484 (1873) (condemning the strict-liability rule of Rylands as incompatible with the development of "factories, machinery, dams, canals and railroads"); Pa. Coal Co. v. Sanderson, 6 A. 453, 459-60 (Pa. 1886) (rejecting Rylands as "wholly inapplicable" to the case at bar and noting that the coal industry serves "a great public interest").
  • 252
    • 33947700459 scopus 로고    scopus 로고
    • II SEYMOUR D. THOMPSON, THE LAW OF NEGLIGENCE IN RELATIONS NOT RESTING IN CONTRACT 1234-35 (St. Louis, F.H. Thomas & Co. 1880). See also Jed Handelsman Shugerman, Note, The Floodgates of Strict Liability: Bursting Reservoirs and the Adoption of Fletcher v. Rylands in the Gilded Age, 110 YALE L.J. 333, 348-49, 350 (2000) (explaining that New York and New Hampshire court decisions in the late nineteenth century suggested a concern for economic growth that outweighed the desire to protect urban populations from industrial risks).
    • II SEYMOUR D. THOMPSON, THE LAW OF NEGLIGENCE IN RELATIONS NOT RESTING IN CONTRACT 1234-35 (St. Louis, F.H. Thomas & Co. 1880). See also Jed Handelsman Shugerman, Note, The Floodgates of Strict Liability: Bursting Reservoirs and the Adoption of Fletcher v. Rylands in the Gilded Age, 110 YALE L.J. 333, 348-49, 350 (2000) (explaining that New York and New Hampshire court decisions in the late nineteenth century suggested a concern for economic growth that outweighed the desire to protect urban populations from industrial risks).
  • 253
    • 33947617353 scopus 로고    scopus 로고
    • WITT, supra note 180, at 48. See also FOWLER VINCENT HARPER, A TREATISE ON THE LAW OF TORTS 338 (1933) (explaining that the early rejection of Rylands in the U.S. grew out of concern for the business community).
    • WITT, supra note 180, at 48. See also FOWLER VINCENT HARPER, A TREATISE ON THE LAW OF TORTS 338 (1933) (explaining that the early rejection of Rylands in the U.S. grew out of concern for the business community).
  • 254
    • 33947699439 scopus 로고    scopus 로고
    • See POUND supra note 175, at 109-10
    • See POUND supra note 175, at 109-10.
  • 255
    • 33947613148 scopus 로고    scopus 로고
    • Davis v. Rich, 62 N.E. 375, 377 (Mass. 1902) (Holmes, C.J.) (When knowledge of the damage done or threatened to the public is established, the strict rule of Rylands v. Fletcher is not in question.); The Theory of Torts, supra note 148, at 653, 663. As Louis Menand explains, Holmes did not view the law from a monolithic utilitarian lens. MENAND, supra note 168, at 341 (explaining that Holmes saw law's development as guided by utility, morality, doctrinal consistency, and historical concerns). See supra note 148 and accompanying text (describing scholarly interpretations of Holmes's views on negligence and strict liability).
    • Davis v. Rich, 62 N.E. 375, 377 (Mass. 1902) (Holmes, C.J.) ("When knowledge of the damage done or threatened to the public is established, the strict rule of Rylands v. Fletcher is not in question."); The Theory of Torts, supra note 148, at 653, 663. As Louis Menand explains, Holmes did not view the law from a monolithic utilitarian lens. MENAND, supra note 168, at 341 (explaining that Holmes saw law's development as guided by utility, morality, doctrinal consistency, and historical concerns). See supra note 148 and accompanying text (describing scholarly interpretations of Holmes's views on negligence and strict liability).
  • 256
    • 33947671952 scopus 로고    scopus 로고
    • The Theory of Torts, supra note 148, at 663. Holmes's extra-hazardous activities bear a strong connection to contemporary concepts of abnormally dangerous or ultrahazardous activities. Compare id. at 653, 666, with RESTATEMENT (THIRD) OF TORTS: LIABILITY FOR PHYSICAL HARM § 20 (Proposed Final Draft No. 1, Apr. 6, 2005, stating that abnormally dangerous activities subject the actor to strict liability for physical harm caused by that activity, and RESTATEMENT (SECOND) OF TORTS § 520 (1977, explaining that courts, in determining whether an activity is abnormally dangerous, should consider, among other things, the high degree of risk of harm to the person, land, or chattel and the extent to which the activity is not a matter of common usage, See supra note 131 discussing how a Rylands approach to today's insecure cyber-reservoirs might accor
    • The Theory of Torts, supra note 148, at 663. Holmes's "extra-hazardous" activities bear a strong connection to contemporary concepts of abnormally dangerous or ultrahazardous activities. Compare id. at 653, 666, with RESTATEMENT (THIRD) OF TORTS: LIABILITY FOR PHYSICAL HARM § 20 (Proposed Final Draft No. 1, Apr. 6, 2005) (stating that abnormally dangerous activities subject the actor to strict liability for physical harm caused by that activity), and RESTATEMENT (SECOND) OF TORTS § 520 (1977) (explaining that courts, in determining whether an activity is abnormally dangerous, should consider, among other things, the high degree of risk of harm to the person, land, or chattel and the extent to which the activity is not a matter of common usage). See supra note 131 (discussing how a Rylands approach to today's insecure cyber-reservoirs might accord with the Restatement view).
  • 258
    • 33947702150 scopus 로고    scopus 로고
    • NORMAN SMITH, A HISTORY OF DAMS 177-78 (1971).
    • NORMAN SMITH, A HISTORY OF DAMS 177-78 (1971).
  • 259
    • 33947708466 scopus 로고    scopus 로고
    • MCCULLOUGH, supra note 192, at 264; SMITH, supra note 192, at 177-78.
    • MCCULLOUGH, supra note 192, at 264; SMITH, supra note 192, at 177-78.
  • 260
    • 33947614770 scopus 로고    scopus 로고
    • The American Law Review, a bimonthly publication, was probably the most influential legal periodical of the nineteenth century. THOMAS A. WOXLAND & PATTI J. OGDEN, LANDMARKS IN AMERICAN LEGAL PUBLISHING 48 (1990).
    • The American Law Review, a bimonthly publication, was probably "the most influential legal periodical of the nineteenth century." THOMAS A. WOXLAND & PATTI J. OGDEN, LANDMARKS IN AMERICAN LEGAL PUBLISHING 48 (1990).
  • 261
    • 33947612646 scopus 로고    scopus 로고
    • Note, The Law of Bursting Reservoirs, 23 AM. L. REV. 643, 646 (1889).
    • Note, The Law of Bursting Reservoirs, 23 AM. L. REV. 643, 646 (1889).
  • 262
    • 33947649619 scopus 로고    scopus 로고
    • Id. at 647. See also Ariz. Employers' Liab. Cases, 250 U.S. 400, 432-33 (1919) (Holmes, J., concurring) (There is no more certain way of securing attention to the safety of the men . . . than by holding the employer liable for accidents. . . . [T]hey probably will happen a good deal less often when the employer knows that he must answer for them if they do.); Robert J. Kaczorowski, The Commonlaw Background of Nineteenth-century Tort Law, 51 OHIO ST. L.J. 1127, 1128 (1990) (explaining that nineteenth-century judges used tort law as a tool to encourage moral behavior, minimize injuries, and promote honesty and fair dealing in economic relationships); Takayanagi, supra note 182, at 172.
    • Id. at 647. See also Ariz. Employers' Liab. Cases, 250 U.S. 400, 432-33 (1919) (Holmes, J., concurring) ("There is no more certain way of securing attention to the safety of the men . . . than by holding the employer liable for accidents. . . . [T]hey probably will happen a good deal less often when the employer knows that he must answer for them if they do."); Robert J. Kaczorowski, The Commonlaw Background of Nineteenth-century Tort Law, 51 OHIO ST. L.J. 1127, 1128 (1990) (explaining that nineteenth-century judges used tort law as a tool to encourage moral behavior, minimize injuries, and promote honesty and fair dealing in economic relationships); Takayanagi, supra note 182, at 172.
  • 263
    • 33947663061 scopus 로고    scopus 로고
    • See BERNARD SCHWARTZ, THE LAW IN AMERICA 78 (1974) (explaining nineteenth-century tort law's deference to free individual action and decision).
    • See BERNARD SCHWARTZ, THE LAW IN AMERICA 78 (1974) (explaining nineteenth-century tort law's deference to free individual action and decision).
  • 264
    • 33947705263 scopus 로고    scopus 로고
    • See WITT, supra note 180, at 47 (explaining the view that strict liability unethically fined the free exercise of the nonnegligent injurer's rights); James Barr Ames, Law and Morals, 22 HARV. L. REV. 97, 99, 103 (1908).
    • See WITT, supra note 180, at 47 (explaining the view that strict liability unethically fined the "free exercise of the nonnegligent injurer's rights"); James Barr Ames, Law and Morals, 22 HARV. L. REV. 97, 99, 103 (1908).
  • 265
    • 33947693341 scopus 로고    scopus 로고
    • Green, supra note 173, at 255. See also YEHOSHUA ARIELI, INDIVIDUALISM AND NATIONALISM IN AMERICAN IDEOLOGY 334 (1964) (Competitive economic activity was . . . not only the way to progress but the principle of natural justice.); WITT, supra note 180, at 46-47.
    • Green, supra note 173, at 255. See also YEHOSHUA ARIELI, INDIVIDUALISM AND NATIONALISM IN AMERICAN IDEOLOGY 334 (1964) ("Competitive economic activity was . . . not only the way to progress but the principle of natural justice."); WITT, supra note 180, at 46-47.
  • 266
    • 33947706290 scopus 로고    scopus 로고
    • Ames, supra note 198, at 103
    • Ames, supra note 198, at 103.
  • 267
    • 33947654441 scopus 로고    scopus 로고
    • See JOHN G. FLEMING, THE LAW OF TORTS 368 (9th ed. 1998); Murphy, supra note 175, at 665.
    • See JOHN G. FLEMING, THE LAW OF TORTS 368 (9th ed. 1998); Murphy, supra note 175, at 665.
  • 268
    • 33947659010 scopus 로고    scopus 로고
    • Murphy, supra note 175, at 665 (internal footnote omitted). See also John H. Wigmore, Responsibility for Tortious Acts: Its History - III.,
    • Murphy, supra note 175, at 665 (internal footnote omitted). See also John H. Wigmore, Responsibility for Tortious Acts: Its History - III.,
  • 269
    • 33947681803 scopus 로고    scopus 로고
    • HARV. L. REV. 441, 452-56 (1894) (discussing the progression of tort liability standards from negligence to the no-fault rule of Rylands).
    • HARV. L. REV. 441, 452-56 (1894) (discussing the progression of tort liability standards from negligence to the no-fault rule of Rylands).
  • 271
    • 33947709461 scopus 로고    scopus 로고
    • See FRIEDMAN, supra note 3, at 365 (stating that Rylands was too much, too soon for the American economy); KEETON ET AL., supra note 184, at 549.
    • See FRIEDMAN, supra note 3, at 365 (stating that Rylands was "too much, too soon" for the American economy); KEETON ET AL., supra note 184, at 549.
  • 272
    • 33947673496 scopus 로고    scopus 로고
    • Ames, supra note 198, at 99
    • Ames, supra note 198, at 99.
  • 273
    • 33947696752 scopus 로고    scopus 로고
    • See 3 HARPER ET AL., supra note 119, at 195 (the prevailing twentieth-century view of the rule in Rylands was one of acceptance, rather than rejection); Shugerman, supra note 187, at 345.
    • See 3 HARPER ET AL., supra note 119, at 195 (the "prevailing" twentieth-century view of the rule in Rylands was one of acceptance, rather than rejection); Shugerman, supra note 187, at 345.
  • 274
    • 33947700458 scopus 로고    scopus 로고
    • Shugerman, supra note 187, at 345
    • Shugerman, supra note 187, at 345.
  • 275
    • 33947628246 scopus 로고    scopus 로고
    • Id. See KEETON ET AL., supra note 184, at 549.
    • Id. See KEETON ET AL., supra note 184, at 549.
  • 276
    • 33947626666 scopus 로고    scopus 로고
    • KEETON ET AL., supra note 184, at 549; Charles O. Gregory, Trespass to Negligence to Absolute Liability, 37 VA. L. REV. 359, 382-83 (1951). See also Robb v. Carnegie Bros. & Co., 22 A. 649, 651 (Pa. 1891) (holding the production of iron or steel or glass while of great public importance is the result[] of private enterprise which has no right to claim exemption from the natural consequences of its acts).
    • KEETON ET AL., supra note 184, at 549; Charles O. Gregory, Trespass to Negligence to Absolute Liability, 37 VA. L. REV. 359, 382-83 (1951). See also Robb v. Carnegie Bros. & Co., 22 A. 649, 651 (Pa. 1891) (holding "the production of iron or steel or glass" while of great public importance is "the result[] of private enterprise" which "has no right to claim exemption from the natural consequences" of its acts).
  • 277
    • 33947659014 scopus 로고    scopus 로고
    • Green, supra note 181, at 5
    • Green, supra note 181, at 5.
  • 278
    • 33947657458 scopus 로고    scopus 로고
    • Pound, supra note 168, at 233. See also Bridgeman-Russell Co. v. City of Duluth, 197 N.W. 971, 972 (Minn. 1924) (articulating a social justice rationale for the adoption of Rylands); Green, supra note 181, at 258 (discussing the implications for moral change upon the development of tort law).
    • Pound, supra note 168, at 233. See also Bridgeman-Russell Co. v. City of Duluth, 197 N.W. 971, 972 (Minn. 1924) (articulating a social justice rationale for the adoption of Rylands); Green, supra note 181, at 258 (discussing the implications for moral change upon the development of tort law).
  • 279
    • 33947672446 scopus 로고    scopus 로고
    • E.g., Davis v. Rich, 62 N.E. 375, 377 (Mass. 1902) (Holmes, C.J.) (discussing a leaking pipe that created an icy city sidewalk); Gorham v. Gross, 125 Mass. 232, 238-40 (1878) (stating that an employer was strictly liable for a collapsing wall that was negligently constructed by its employee); Wiltse v. City of Red Wing, 109 N.W. 114, 115 (Minn. 1906) (discussing a bursting city reservoir).
    • E.g., Davis v. Rich, 62 N.E. 375, 377 (Mass. 1902) (Holmes, C.J.) (discussing a leaking pipe that created an icy city sidewalk); Gorham v. Gross, 125 Mass. 232, 238-40 (1878) (stating that an employer was strictly liable for a collapsing wall that was negligently constructed by its employee); Wiltse v. City of Red Wing, 109 N.W. 114, 115 (Minn. 1906) (discussing a bursting city reservoir).
  • 280
    • 33947655451 scopus 로고    scopus 로고
    • E.g., Balt. Breweries' Co. v. Ranstead, 28 A. 273, 274 (Md. Ct. App. 1894); Bradford Glycerine Co. v. St. Marys Woolen Mfg. Co., 54 N.E. 528, 531 (Ohio 1899) (discussing exploding nitroglycerine); Green v. Sun Co., 32 Pa. Super. 521, 529-30 (1907) (discussing an oil refinery).
    • E.g., Balt. Breweries' Co. v. Ranstead, 28 A. 273, 274 (Md. Ct. App. 1894); Bradford Glycerine Co. v. St. Marys Woolen Mfg. Co., 54 N.E. 528, 531 (Ohio 1899) (discussing exploding nitroglycerine); Green v. Sun Co., 32 Pa. Super. 521, 529-30 (1907) (discussing an oil refinery).
  • 281
    • 33947644914 scopus 로고    scopus 로고
    • Holmes, supra note 3, at 467
    • Holmes, supra note 3, at 467.
  • 283
    • 84963456897 scopus 로고    scopus 로고
    • notes 109-19 and accompanying text
    • See supra notes 109-19 and accompanying text.
    • See supra
  • 284
    • 33947663064 scopus 로고    scopus 로고
    • See, e.g., J.M. BALKIN, CULTURAL SOFTWARE: A THEORY OF IDEOLOGY 247 (1998) (discussing the use of metaphors and their effects); SOLOVE, supra note 7, at 27-28, 36-38, 55 (invoking the tyrannical bureaucracy of Franz Kafka's The Trial to describe commercial collection of personal data); Shyamkrishna Balganesh, Common Law Property Metaphors on the Internet: The Real Problem with the Doctrine of Cybertrespass, 12 MICH. TELECOMM. & TECH. L. REV. 265, 268 (2006) (arguing that the judicial doctrine of cybertrespass resulted from the law's reliance on metaphor);
    • See, e.g., J.M. BALKIN, CULTURAL SOFTWARE: A THEORY OF IDEOLOGY 247 (1998) (discussing the use of metaphors and their effects); SOLOVE, supra note 7, at 27-28, 36-38, 55 (invoking the tyrannical bureaucracy of Franz Kafka's The Trial to describe commercial collection of personal data); Shyamkrishna Balganesh, Common Law Property Metaphors on the Internet: The Real Problem with the Doctrine of Cybertrespass, 12 MICH. TELECOMM. & TECH. L. REV. 265, 268 (2006) (arguing that the judicial doctrine of cybertrespass resulted from the law's reliance on metaphor);
  • 285
    • 33947615810 scopus 로고    scopus 로고
    • Michael Froomkin, The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution, 143 U. PA. L. REV. 709, 718 (1995) (explaining that the nature of Internet law depend[s] critically on the legal metaphors used to describe the Internet and its functions);
    • Michael Froomkin, The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution, 143 U. PA. L. REV. 709, 718 (1995) (explaining that the nature of Internet law "depend[s] critically on the legal metaphors" used to describe the Internet and its functions);
  • 286
    • 0037986424 scopus 로고    scopus 로고
    • Dan Hunter, Cyberspace as Place and the Tragedy of the Digital Anticommons, 91 CAL. L. REV. 439, 459 (2003) [hereinafter Hunter, Cyberspace] (arguing that metaphors are central to legal thinking and profoundly influence judicial decisionmaking).
    • Dan Hunter, Cyberspace as Place and the Tragedy of the Digital Anticommons, 91 CAL. L. REV. 439, 459 (2003) [hereinafter Hunter, Cyberspace] (arguing that metaphors are "central to legal thinking" and profoundly influence judicial decisionmaking).
  • 287
    • 33947612116 scopus 로고    scopus 로고
    • See generally Dan Hunter, Reason Is Too Large: Analogy and Precedent in Law, 50 EMORY L.J. 1197, 1197 (2001) (arguing that cognitive science models of human thinking explain how analogical reasoning and precedential reasoning operate in law). But see RICHARD A. POSNER, OVERCOMING LAW 523-24 (1995) (A way of thinking, metaphor, yes, but often of an undisciplined and misleading character.).
    • See generally Dan Hunter, Reason Is Too Large: Analogy and Precedent in Law, 50 EMORY L.J. 1197, 1197 (2001) (arguing that "cognitive science models of human thinking explain how analogical reasoning and precedential reasoning operate in law"). But see RICHARD A. POSNER, OVERCOMING LAW 523-24 (1995) ("A way of thinking, metaphor, yes, but often of an undisciplined and misleading character.").
  • 288
    • 33947620683 scopus 로고    scopus 로고
    • See O'HARROW, supra note 12, at 137-38 (recounting privacy expert Chris Hoofnagle's explanation that extraordinary reservoirs of cyber-data constitute infrastructure of our surveillance society).
    • See O'HARROW, supra note 12, at 137-38 (recounting privacy expert Chris Hoofnagle's explanation that extraordinary "reservoirs" of cyber-data constitute infrastructure of our surveillance society).
  • 289
    • 0038662851 scopus 로고    scopus 로고
    • See Mark A. Lemley, Place and Cyberspace, 91 CAL. L. REV. 521, 538 (2003) (noting that Internet trespass cases, which involve electrical charges, are all about chasing down electronic 'water' in order to reclaim it).
    • See Mark A. Lemley, Place and Cyberspace, 91 CAL. L. REV. 521, 538 (2003) (noting that Internet trespass cases, which involve electrical charges, "are all about chasing down electronic 'water' in order to reclaim it").
  • 290
    • 33947650135 scopus 로고    scopus 로고
    • See SOLOVE, supra note 7, at 3, 19. See also Eric Lichtblau & James Risen, Bank Data Sifted in Secret by U.S. to Block Terror, N.Y. TIMES, June 23, 2006, at A1 (quoting an official describing the U.S. Government's search of a massive database containing financial records turning on every spigot . . . and seeing what water would come out).
    • See SOLOVE, supra note 7, at 3, 19. See also Eric Lichtblau & James Risen, Bank Data Sifted in Secret by U.S. to Block Terror, N.Y. TIMES, June 23, 2006, at A1 (quoting an official describing the U.S. Government's search of a massive database containing financial records "turning on every spigot . . . and seeing what water would come out").
  • 291
    • 33947697261 scopus 로고    scopus 로고
    • E.g., WILLIAM J. MITCHELL, CITY OF BITS: SPACE, PLACE, AND THE INFOBAHN 23 (1995) (analogizing the physical world to the world of the Internet);
    • E.g., WILLIAM J. MITCHELL, CITY OF BITS: SPACE, PLACE, AND THE INFOBAHN 23 (1995) (analogizing the physical world to the world of the Internet);
  • 292
    • 0037412597 scopus 로고    scopus 로고
    • Richard A. Epstein, Cybertrespass, 70 U. CHI. L. REV. 73, 82-83 (2003) (arguing that websites look more like real property than ordinary chattel given the land-like descriptions of cyberspace and thus the rules of real property offer a better fit for the analysis of cyberspace issues);
    • Richard A. Epstein, Cybertrespass, 70 U. CHI. L. REV. 73, 82-83 (2003) (arguing that websites look more like real property than ordinary chattel given the land-like descriptions of cyberspace and thus the rules of "real property" offer a "better fit" for the analysis of cyberspace issues);
  • 293
    • 33947700977 scopus 로고    scopus 로고
    • Hunter, Cyberspace, supra note 217, at 452, 516 (stating that many treat cyberspace as if it were a physical place. . . . [It] may be inchoate and virtual, but no less real in our minds, rendering attempts to supplant the metaphor tragically doomed to failure);
    • Hunter, Cyberspace, supra note 217, at 452, 516 (stating that many "treat cyberspace as if it were a physical place. . . . [It] may be inchoate and virtual, but no less real in our minds," rendering attempts to supplant the metaphor tragically "doomed to failure");
  • 294
    • 0347247737 scopus 로고    scopus 로고
    • Harold Smith Reeves, Comment, Property in Cyberspace, 63 U. CHI. L. REV. 761, 762 (1996) (Current judicial and legislative approaches to Cyberspace rely on a conception of bounded property developed to regulate the ownership of land.).
    • Harold Smith Reeves, Comment, Property in Cyberspace, 63 U. CHI. L. REV. 761, 762 (1996) ("Current judicial and legislative approaches to Cyberspace rely on a conception of bounded property developed to regulate the ownership of land.").
  • 295
    • 33947616848 scopus 로고    scopus 로고
    • Mark Lemley offers a powerful critique of the cyberspace as place metaphor adopted by courts and scholars to justify applying real property laws to Internet law issues. See generally Lemley, supra note 219, at 521. But see Hunter, Cyberspace, supra note 217, at 452-53, 511-13 challenging the perceived wisdom of those who conflate the idea that cyberspace has the characteristics of a place because it risks fencing off of the Internet, a tragedy of the anticommons, For Lemley, the metaphor should begin the inquiry, not end it. See Lemley, supra note 219, at 523. Lemley argues that courts ought to consider the context and effect of the proposed rules addressing cyberspace instead of reflexively applying real property rules to cyberspace law issues. Id. My analysis endeavors to avoid that blunder, offering the metaphor of water reservoirs to frame my discussion of the historical and theoretical reasons that support
    • Mark Lemley offers a powerful critique of the "cyberspace as place" metaphor adopted by courts and scholars to justify applying real property laws to Internet law issues. See generally Lemley, supra note 219, at 521. But see Hunter, Cyberspace, supra note 217, at 452-53, 511-13 (challenging the perceived wisdom of those who conflate the idea that cyberspace has the characteristics of a place because it risks fencing off of the Internet, a tragedy of the "anticommons"). For Lemley, the metaphor should begin the inquiry, not end it. See Lemley, supra note 219, at 523. Lemley argues that courts ought to consider the context and effect of the proposed rules addressing cyberspace instead of reflexively applying real property rules to cyberspace law issues. Id. My analysis endeavors to avoid that blunder, offering the metaphor of water reservoirs to frame my discussion of the historical and theoretical reasons that support the application of Rylands to the problem of escaping valuable data.
  • 296
    • 33947708963 scopus 로고    scopus 로고
    • In this analysis, I borrow from Mark Lemley's notion that private and public spaces must coexist on the Internet, just as they do in the physical world. Lemley, supra note 219, at 537. See also MITCHELL, supra note 221, at 23 (Many of the places in cyberspace are public, like streets and squares; access to them is uncontrolled. Others are private, like mailboxes and houses, and you can enter only if you have the key or can demonstrate that you belong.).
    • In this analysis, I borrow from Mark Lemley's notion that "private and public spaces must coexist on the Internet, just as they do in the physical world." Lemley, supra note 219, at 537. See also MITCHELL, supra note 221, at 23 ("Many of the places in cyberspace are public, like streets and squares; access to them is uncontrolled. Others are private, like mailboxes and houses, and you can enter only if you have the key or can demonstrate that you belong.").
  • 297
    • 33947674814 scopus 로고    scopus 로고
    • In analogizing computer databases to reservoirs of valuable personal data, I do not mean to simply equate cyberspace with real property and databases with reservoirs. See Hunter, Cyberspace, supra note 217, at 487-88 criticizing judicial decisions that treat a defendant's damage to a plaintiff's computer system as one involving real property, not personal property, due to the oversimplification of all tortious cyber-harm as involving real property law, I use the image of the water reservoir instead to illuminate how contemporary technologies are akin to those in Rylands's time. To that end, I rely on the interaction theory of metaphor, which suggests that the combination of the source of the comparison and the target to which it is compared results in a unique agent of meaning that enriches our conceptualization of the dangers associated with the collection of personal identifying data at this juncture in our economic history
    • In analogizing computer databases to reservoirs of valuable personal data, I do not mean to simply equate cyberspace with real property and databases with reservoirs. See Hunter, Cyberspace, supra note 217, at 487-88 (criticizing judicial decisions that treat a defendant's damage to a plaintiff's computer system as one involving real property, not personal property, due to the oversimplification of all tortious cyber-harm as involving real property law). I use the image of the water reservoir instead to illuminate how contemporary technologies are akin to those in Rylands's time. To that end, I rely on the "interaction" theory of metaphor, which suggests that the combination of the "source" of the comparison and the target to which it is compared results in a "unique agent of meaning" that enriches our conceptualization of the dangers associated with the collection of personal identifying data at this juncture in our economic history. Janet Martin Soskice & Rom Harré, Metaphor in Science, in FROM A METAPHORICAL POINT OF VIEW: A MULTI-DISCIPLINARY APPROACH TO THE COGNITIVE CONTENT OF METAPHOR 289, 291 (Zdravko Radman ed., 1995).
  • 298
    • 33947669449 scopus 로고    scopus 로고
    • See T.S. ASHTON, THE INDUSTRIAL REVOLUTION: 1760-1830, at 114-15 (1968); FRIEDMAN, supra note 151, at 53-54. See also Christine MacLeod, Britain as Workshop of the World (Feb. 11, 2004), http://www.bbc.co.uk/history/trail/ victorian_britain/industry-invention/britain-workshop-world-01.shtml (explaining that by the Great Crystal Palace Exhibition of 1851, Britain was the world's industrial power, producing more than half of the world's iron, coal, and cotton).
    • See T.S. ASHTON, THE INDUSTRIAL REVOLUTION: 1760-1830, at 114-15 (1968); FRIEDMAN, supra note 151, at 53-54. See also Christine MacLeod, Britain as Workshop of the World (Feb. 11, 2004), http://www.bbc.co.uk/history/trail/ victorian_britain/industry-invention/britain-workshop-world-01.shtml (explaining that by the Great Crystal Palace Exhibition of 1851, Britain was the world's industrial power, producing more than half of the world's iron, coal, and cotton).
  • 299
    • 33947711843 scopus 로고    scopus 로고
    • FRIEDMAN, supra note 151, at 53-54
    • FRIEDMAN, supra note 151, at 53-54.
  • 300
    • 33947681805 scopus 로고    scopus 로고
    • Id. at 53-54, 228.
    • Id. at 53-54, 228.
  • 301
    • 33947649615 scopus 로고    scopus 로고
    • Murphy, supra note 175, at 665
    • Murphy, supra note 175, at 665.
  • 302
    • 85040273569 scopus 로고    scopus 로고
    • See Simpson, supra note 132, at 217. See also SMITH, supra note 192, at 170-73 (discussing the construction of dams during the early nineteenth century). See generally G.M. BINNIE, EARLY VICTORIAN WATER ENGINEERS (1981).
    • See Simpson, supra note 132, at 217. See also SMITH, supra note 192, at 170-73 (discussing the construction of dams during the early nineteenth century). See generally G.M. BINNIE, EARLY VICTORIAN WATER ENGINEERS (1981).
  • 303
    • 33947654443 scopus 로고    scopus 로고
    • SMITH, supra note 192, at 164 (explaining that the first recorded dam in Great Britain was built in 1189). In the eleventh century, however, England had 5624 water mills and it is likely that many were powered by dams of some sort, small though they must have been. Id. at 165.
    • SMITH, supra note 192, at 164 (explaining that the first recorded dam in Great Britain was built in 1189). In the eleventh century, however, England had 5624 water mills and it is likely that many were powered "by dams of some sort, small though they must have been." Id. at 165.
  • 304
    • 33947643723 scopus 로고    scopus 로고
    • BINNIE, supra note 229, at 50
    • BINNIE, supra note 229, at 50.
  • 305
    • 33947689243 scopus 로고    scopus 로고
    • See SMITH, supra note 192, at 169-80
    • See SMITH, supra note 192, at 169-80.
  • 306
    • 33947672969 scopus 로고    scopus 로고
    • See BINNIE, supra note 229, at 50 (explaining that the widespread development of large reservoirs occurred in the late 1830s and 1840s to meet the water-power needs of mill owners); Simpson, supra note 132, at 217 (explaining that civil engineers in nineteenth-century England built reservoirs on the basis of common sense, hunch, and experience, slowly augmented by a body of theoretical knowledge).
    • See BINNIE, supra note 229, at 50 (explaining that the widespread development of large reservoirs occurred in the late 1830s and 1840s to meet the water-power needs of mill owners); Simpson, supra note 132, at 217 (explaining that civil engineers in nineteenth-century England built reservoirs "on the basis of common sense, hunch, and experience, slowly augmented by a body of theoretical knowledge").
  • 307
    • 33947635131 scopus 로고    scopus 로고
    • Simpson, supra note 132, at 219-31 (describing the failure of the Bilberry dam in 1852, which killed seventy-eight people and caused massive property damage, and the flooding of the Dale Dyke dam in 1864).
    • Simpson, supra note 132, at 219-31 (describing the failure of the Bilberry dam in 1852, which killed seventy-eight people and caused massive property damage, and the flooding of the Dale Dyke dam in 1864).
  • 308
    • 33947647454 scopus 로고    scopus 로고
    • Id. at 219
    • Id. at 219.
  • 309
    • 33947660081 scopus 로고    scopus 로고
    • A Virtual Roundtable: Seven Thought Leaders Sound Off on How Connectivity Is Changing the Planet
    • See, July 10, at
    • See Gary Flake, A Virtual Roundtable: Seven Thought Leaders Sound Off on How Connectivity Is Changing the Planet, FORTUNE, July 10, 2006, at 104, 106.
    • (2006) FORTUNE
    • Flake, G.1
  • 310
    • 33646865743 scopus 로고    scopus 로고
    • Justin Hibbard & Heather Green, The Net: It Feels Like 1998 All over Again, BUS. WK, May 22, 2006, at 30, 32 (describing $5.6 billion of venture capital investments in Internet startups in the first quarter of 2006).
    • Justin Hibbard & Heather Green, The Net: It Feels Like 1998 All over Again, BUS. WK, May 22, 2006, at 30, 32 (describing $5.6 billion of venture capital investments in Internet startups in the first quarter of 2006).
  • 311
    • 33947675906 scopus 로고    scopus 로고
    • Frommer, supra note 45
    • Frommer, supra note 45.
  • 312
    • 4243121902 scopus 로고    scopus 로고
    • Lawrence A. Gordon, Martin P. Loeb & Tashfeen Sohail, A Framework for Using Insurance for Cyber-risk Management, COMM. OF THE ACM, Mar. 2003, at 81, 81 (explaining that insurance allows firms to hedge potential losses from data-security breaches). The leading insurance companies now carry policies covering third-party risks arising from computer-security breaches, such as losses due to identity theft and an identity-theft victim's mental anguish.
    • Lawrence A. Gordon, Martin P. Loeb & Tashfeen Sohail, A Framework for Using Insurance for Cyber-risk Management, COMM. OF THE ACM, Mar. 2003, at 81, 81 (explaining that insurance allows firms to "hedge" potential losses from data-security breaches). The leading insurance companies now carry policies covering third-party risks arising from computer-security breaches, such as losses due to identity theft and an identity-theft victim's mental anguish.
  • 313
    • 33947691701 scopus 로고    scopus 로고
    • Darwin Enhances Tech//404sm: New Cyber Liability, Technology E&O, and Internet Liability Coverage, PR NEWSWIRE, Apr. 26, 2006 (describing liability insurance policies that cover unauthorized access, theft, and loss of data due to security breaches);
    • Darwin Enhances Tech//404sm: New Cyber Liability, Technology E&O, and Internet Liability Coverage, PR NEWSWIRE, Apr. 26, 2006 (describing liability insurance policies that cover unauthorized access, theft, and loss of data due to security breaches);
  • 314
    • 33947687801 scopus 로고    scopus 로고
    • Gregory D.L. Morris, Into the Breach, RISK & INS., Apr. 15, 2006, at 82, 82, available at http://www.riskandinsurance.com/060415_feature_4.asp (explaining that AIG, Chubb, and others carry data-security insurance covering a vendor's failure to protect personal information).
    • Gregory D.L. Morris, Into the Breach, RISK & INS., Apr. 15, 2006, at 82, 82, available at http://www.riskandinsurance.com/060415_feature_4.asp (explaining that AIG, Chubb, and others carry data-security insurance covering a vendor's failure to protect personal information).
  • 315
    • 33947689242 scopus 로고    scopus 로고
    • See generally MICHAEL LEWIS, THE NEW NEW THING: A SILICON VALLEY STORY (2000) (describing the advent of the Internet); Gordon et al., supra note 239, at 81 (explaining that cybercriminals successfully hacked into networks and databases of companies surveyed despite their near-universal use of security measures).
    • See generally MICHAEL LEWIS, THE NEW NEW THING: A SILICON VALLEY STORY (2000) (describing the advent of the Internet); Gordon et al., supra note 239, at 81 (explaining that cybercriminals successfully hacked into networks and databases of companies surveyed despite their near-universal use of security measures).
  • 316
    • 33947704761 scopus 로고    scopus 로고
    • E.g., Terry Frieden, John King, & Marsha Walton, Source: Theft of Vets' Data Kept Secret for 19 Days, CNN.COM, May 23, 2006, http://www.cnn.com/2006/US/05/23/vets.data/;
    • E.g., Terry Frieden, John King, & Marsha Walton, Source: Theft of Vets' Data Kept Secret for 19 Days, CNN.COM, May 23, 2006, http://www.cnn.com/2006/US/05/23/vets.data/;
  • 317
    • 33947682288 scopus 로고    scopus 로고
    • FTC Laptop Theft Puts 110 People at Risk, REUTERS, June 23, 2006, available at http://news.zdnet.com/2100-1009_22-6087218.html; Kiviat, supra note 55, at 68.
    • FTC Laptop Theft Puts 110 People at Risk, REUTERS, June 23, 2006, available at http://news.zdnet.com/2100-1009_22-6087218.html; Kiviat, supra note 55, at 68.
  • 318
    • 33947671956 scopus 로고    scopus 로고
    • See also Privacy Rights, Chronology, supra note 9 (cataloguing hundreds of data breaches in 2005 and 2006).
    • See also Privacy Rights, Chronology, supra note 9 (cataloguing hundreds of data breaches in 2005 and 2006).
  • 319
    • 33947657457 scopus 로고    scopus 로고
    • See, e.g, Kiviat, supra note 55, at 68
    • See, e.g., Kiviat, supra note 55, at 68.
  • 320
    • 0346449876 scopus 로고    scopus 로고
    • See Keith N. Hylton, The Theory of Tort Doctrine and the Restatement (Third) of Torts, 54 VAND. L. REV. 1413, 1435 (2001) (It would be easy to reach the conclusion that a reservoir externalizes far more non-reciprocated risk than benefit onto adjacent activities.).
    • See Keith N. Hylton, The Theory of Tort Doctrine and the Restatement (Third) of Torts, 54 VAND. L. REV. 1413, 1435 (2001) ("It would be easy to reach the conclusion that a reservoir externalizes far more non-reciprocated risk than benefit onto adjacent activities.").
  • 321
    • 33947669450 scopus 로고    scopus 로고
    • Donald G. Gifford, The Challenge to the Individual Causation Requirement in Mass Products Torts, 62 WASH. & LEE L. REV. 873, 881-82 (2005) (footnotes omitted).
    • Donald G. Gifford, The Challenge to the Individual Causation Requirement in Mass Products Torts, 62 WASH. & LEE L. REV. 873, 881-82 (2005) (footnotes omitted).
  • 322
    • 29044449535 scopus 로고    scopus 로고
    • See also John C.P. Goldberg, The Constitutional Status of Tort Law: Due Process and the Right to a Law for the Redress of Wrongs, 115 YALE L.J. 524, 583 (2005) (arguing that [w]hether couched in terms of James-Traynor loss-spreading, Prosserian utilitarian balancing, or Calabresi-Posner efficient deterrence, tort law has, since the late 1930s, been widely understood by academics to be just another way in which government regulates conduct for the public good).
    • See also John C.P. Goldberg, The Constitutional Status of Tort Law: Due Process and the Right to a Law for the Redress of Wrongs, 115 YALE L.J. 524, 583 (2005) (arguing that "[w]hether couched in terms of James-Traynor loss-spreading, Prosserian utilitarian balancing, or Calabresi-Posner efficient deterrence, tort law has, since the late 1930s, been widely understood by academics to be just another way in which government regulates conduct for the public good").
  • 323
    • 33947622698 scopus 로고    scopus 로고
    • Compare CALABRESI, supra note 120, at 26-28 (discussing three subgoals of accident prevention, including a distributional goal), and Guido Calabresi & Jon T. Hirschoff, Toward a Test for Strict Liability in Torts, 81 YALE L.J. 1055, 1060, 1084-85 (1972) (noting that the cheapest cost-avoider efficiency test cannot be explained solely in terms of distributional goals although such goals may be served by it),
    • Compare CALABRESI, supra note 120, at 26-28 (discussing three subgoals of accident prevention, including a distributional goal), and Guido Calabresi & Jon T. Hirschoff, Toward a Test for Strict Liability in Torts, 81 YALE L.J. 1055, 1060, 1084-85 (1972) (noting that the cheapest cost-avoider efficiency test cannot be explained solely in terms of distributional goals although such goals may be served by it),
  • 324
    • 33947689775 scopus 로고    scopus 로고
    • with VIRGINIA E. NOLAN & EDMUND URSIN, UNDERSTANDING ENTERPRISE LIABILITY: RETHINKING TORT REFORM FOR THE TWENTY- FIRST CENTURY 175-77 (1995) (arguing that contemporary enterprise liability theory is premised on loss-spreading).
    • with VIRGINIA E. NOLAN & EDMUND URSIN, UNDERSTANDING ENTERPRISE LIABILITY: RETHINKING TORT REFORM FOR THE TWENTY- FIRST CENTURY 175-77 (1995) (arguing that contemporary enterprise liability theory is premised on loss-spreading).
  • 325
    • 33947629784 scopus 로고    scopus 로고
    • CALABRESI, supra note 120, at 26
    • CALABRESI, supra note 120, at 26.
  • 326
    • 33947633053 scopus 로고    scopus 로고
    • Id. at 26-27
    • Id. at 26-27.
  • 327
    • 33947652755 scopus 로고    scopus 로고
    • Id. at 27-28, 44; Hanson & Logue, supra note 138, at 135 arguing that law-and-economics scholars generally agree that an efficient products liability regime would encourage parties to prevent all preventable accidents, the deterrence goal, and would efficiently allocate the risk of unprevented accident costs, the insurance goal
    • Id. at 27-28, 44; Hanson & Logue, supra note 138, at 135 (arguing that law-and-economics scholars generally agree that an efficient products liability regime would encourage parties to "prevent all preventable accidents" - the deterrence goal - and would efficiently allocate the risk of unprevented accident costs - the insurance goal).
  • 328
    • 33947667900 scopus 로고    scopus 로고
    • CALABRESI, supra note 120, at 28
    • CALABRESI, supra note 120, at 28.
  • 329
    • 33947654949 scopus 로고    scopus 로고
    • Id. at 29
    • Id. at 29.
  • 330
    • 33947653819 scopus 로고    scopus 로고
    • Calabresi & Hirschoff, supra note 245, at 1060 (emphasis omitted). See also CALABRESI, supra note 120, at 26-29; Steven Shavell, Strict Liability Versus Negligence, 9 J. LEGAL STUD. 1, 1-4 (1980) (arguing that strict liability is perfectly efficient where accidents are unilateral or not due to any fault of the victim). Negligence requires courts to examine all possibly relevant circumstances and to make a difficult, expensive, and often unreliable decision about reasonableness.
    • Calabresi & Hirschoff, supra note 245, at 1060 (emphasis omitted). See also CALABRESI, supra note 120, at 26-29; Steven Shavell, Strict Liability Versus Negligence, 9 J. LEGAL STUD. 1, 1-4 (1980) (arguing that strict liability is perfectly efficient where accidents are unilateral or not due to any fault of the victim). Negligence requires courts to examine all possibly relevant circumstances and to make a difficult, expensive, and often unreliable decision about reasonableness.
  • 331
    • 33947667508 scopus 로고    scopus 로고
    • See Calabresi & Hirschoff, supra note 245, at 1083
    • See Calabresi & Hirschoff, supra note 245, at 1083.
  • 332
    • 33947633567 scopus 로고    scopus 로고
    • Id. at 1070. This focus on the actual loss-bearer does not mean that the liability rules differ between those who are insured and those who are uninsured. Id. at 1070 n.54. Instead, in devising a rule appropriate to a particular category of individuals, the availability of insurance and other means of externalizing costs should be taken into account. Id.
    • Id. at 1070. This focus on the actual loss-bearer does not mean that the liability rules differ between those who are insured and those who are uninsured. Id. at 1070 n.54. Instead, in devising a rule appropriate to a particular category of individuals, "the availability of insurance and other means of externalizing costs should be taken into account." Id.
  • 333
    • 33947705767 scopus 로고    scopus 로고
    • See id. at 1066.
    • See id. at 1066.
  • 334
    • 33947679846 scopus 로고    scopus 로고
    • See Swire, supra note 10, at 286
    • See Swire, supra note 10, at 286.
  • 335
    • 33947662042 scopus 로고    scopus 로고
    • See id. See also SCHNEIER, supra note 23, at 29 (explaining that information technology is so advanced that individuals cannot evaluate risks in giving a credit card number to a website). In other words, information asymmetry exists between database operators and individuals. Database operators either know or can ascertain flaws in their security systems - individuals can do neither.
    • See id. See also SCHNEIER, supra note 23, at 29 (explaining that information technology is so advanced that individuals cannot evaluate risks in giving a credit card number to a website). In other words, information asymmetry exists between database operators and individuals. Database operators either know or can ascertain flaws in their security systems - individuals can do neither.
  • 336
    • 33947662575 scopus 로고    scopus 로고
    • Swire, supra note 10, at 286
    • Swire, supra note 10, at 286.
  • 337
    • 33947696749 scopus 로고    scopus 로고
    • See SOLOVE, supra note 7, at 81, 84-85
    • See SOLOVE, supra note 7, at 81, 84-85.
  • 338
    • 33947703710 scopus 로고    scopus 로고
    • See Herb Weisbaum, Why ID Theft Insurance Might Not Be Worth It, MSNBC.COM, May 8, 2006, http://www.msnbc.msn.com/id/12692565/. Identity-theft coverage typically costs $20-$100 per year as a rider to a basic homeowner's policy or as a stand-alone purchase with deductibles ranging from $100 to $1000. Id. Many policies do not cover legal fees or lost wages due to time away from work. Id.
    • See Herb Weisbaum, Why ID Theft Insurance Might Not Be Worth It, MSNBC.COM, May 8, 2006, http://www.msnbc.msn.com/id/12692565/. Identity-theft coverage typically costs $20-$100 per year as a rider to a basic homeowner's policy or as a stand-alone purchase with deductibles ranging from $100 to $1000. Id. Many policies do not cover legal fees or lost wages due to time away from work. Id.
  • 339
    • 33947665073 scopus 로고    scopus 로고
    • Stop Thieves from Stealing You, CONSUMERREPORTS.ORG. , Oct. 2003, http://www.consumerreports.org/cro/consumer-protection/ identity-theft-1003/overview/index.htm.
    • Stop Thieves from Stealing You, CONSUMERREPORTS.ORG. , Oct. 2003, http://www.consumerreports.org/cro/consumer-protection/ identity-theft-1003/overview/index.htm.
  • 340
    • 33947711844 scopus 로고    scopus 로고
    • Id, explaining that identity-theft policies seldom cover a victim's out-of-pocket losses, which typically amount to $800, Weisbaum, supra note 259 noting that many identity-theft policies do not cover legal fees or lost wages due to time away from work
    • Id. (explaining that identity-theft policies seldom cover a victim's out-of-pocket losses, which typically amount to $800); Weisbaum, supra note 259 (noting that many identity-theft policies do not cover legal fees or lost wages due to time away from work).
  • 341
    • 84886338965 scopus 로고    scopus 로고
    • notes 139-42 discussing the efficiency of cost-spreading by database operators versus individuals
    • See supra notes 139-42 (discussing the efficiency of cost-spreading by database operators versus individuals).
    • See supra
  • 342
    • 33947693875 scopus 로고    scopus 로고
    • Swire, supra note 10, at 286-87
    • Swire, supra note 10, at 286-87.
  • 343
    • 33947666150 scopus 로고    scopus 로고
    • See supra notes 29-31 and accompanying text (discussing data brokers). Employees and students might be the cheapest cost-avoiders if they could refuse to provide their SSNs to colleges and employers. But both employees and students lack information to warrant such refusals because they cannot determine the degree of security afforded their information, much less how well their information is protected in future years.
    • See supra notes 29-31 and accompanying text (discussing data brokers). Employees and students might be the cheapest cost-avoiders if they could refuse to provide their SSNs to colleges and employers. But both employees and students lack information to warrant such refusals because they cannot determine the degree of security afforded their information, much less how well their information is protected in future years.
  • 344
    • 33947647453 scopus 로고    scopus 로고
    • See, e.g., Privacy Rights, Chronology, supra note 9 (explaining that a data-security breach at Ohio University released SSNs of alumni as well as current students). Moreover, employees and students may not be in a position to bargain with employers and colleges about the disclosure of their SSNs. See SOLOVE, supra note 7, at 82-83.
    • See, e.g., Privacy Rights, Chronology, supra note 9 (explaining that a data-security breach at Ohio University released SSNs of alumni as well as current students). Moreover, employees and students may not be in a position to bargain with employers and colleges about the disclosure of their SSNs. See SOLOVE, supra note 7, at 82-83.
  • 345
    • 33947629273 scopus 로고    scopus 로고
    • Posner's theory also supports a strict-liability approach to address the hazardous information reservoirs. See supra notes 132-38 and accompanying text (applying Posner's economic analysis to today's leaking cyber-reservoirs).
    • Posner's theory also supports a strict-liability approach to address the hazardous information reservoirs. See supra notes 132-38 and accompanying text (applying Posner's economic analysis to today's leaking cyber-reservoirs).
  • 346
    • 33846489732 scopus 로고
    • The Problem of Social Cost, 3
    • R.H. Coase, The Problem of Social Cost, 3 J.L. & ECON. 1, 2-8 (1960).
    • (1960) J.L. & ECON , vol.1 , pp. 2-8
    • Coase, R.H.1
  • 347
    • 33947671443 scopus 로고    scopus 로고
    • Id
    • Id.
  • 348
    • 0347875884 scopus 로고    scopus 로고
    • Privacy and the Economics of Personal Health Care Information, 76
    • Paul M. Schwartz, Privacy and the Economics of Personal Health Care Information, 76 TEX. L. REV. 1, 50 (1997).
    • (1997) TEX. L. REV , vol.1 , pp. 50
    • Schwartz, P.M.1
  • 349
    • 33947662574 scopus 로고    scopus 로고
    • Harold Demsetz, When Does the Rule of Liability Matter?, 1 J. LEGAL STUD. 13, 27-28 (1972) (explaining that where transacting costs of negotiation are high under Coase's theorem, the legal system can improve the allocation of resources by placing liability on that party who in the usual situation could be expected to avoid the costly interaction most cheaply).
    • Harold Demsetz, When Does the Rule of Liability Matter?, 1 J. LEGAL STUD. 13, 27-28 (1972) (explaining that where transacting costs of negotiation are high under Coase's theorem, the legal system can "improve the allocation of resources by placing liability on that party who in the usual situation could be expected to avoid the costly interaction most cheaply").
  • 350
    • 0042330178 scopus 로고    scopus 로고
    • Pressing Precaution Beyond the Point of Cost-justification, 56
    • See, e.g
    • See, e.g., Gregory C. Keating, Pressing Precaution Beyond the Point of Cost-justification, 56 VAND. L. REV. 653, 667 (2003).
    • (2003) VAND. L. REV , vol.653 , pp. 667
    • Keating, G.C.1
  • 351
    • 84989231285 scopus 로고
    • Accident Liability: Some Wartime Developments, 55
    • See
    • See Fleming James, Jr., Accident Liability: Some Wartime Developments, 55 YALE L.J. 365, 366 (1946);
    • (1946) YALE L.J , vol.365 , pp. 366
    • James Jr., F.1
  • 352
    • 84913849223 scopus 로고
    • Hazardous Enterprises and Risk Bearing Capacity, 61
    • Clarence Morris, Hazardous Enterprises and Risk Bearing Capacity, 61 YALE L.J. 1172, 1176 (1952);
    • (1952) YALE L.J , vol.1172 , pp. 1176
    • Morris, C.1
  • 353
    • 33947637258 scopus 로고    scopus 로고
    • George L. Priest, The Invention of Enterprise Liability: A Critical History of the Intellectual Foundations of Modern Tort Law, 14 J. LEGAL STUD. 461, 476 (1985) (explaining that the father of enterprise liability theory, Fleming James, Jr., argued that the modern direction of law was away from a medieval fault-based approach and toward strict liability, with Rylands v. Fletcher and workers' compensation plans as its most prominent models).
    • George L. Priest, The Invention of Enterprise Liability: A Critical History of the Intellectual Foundations of Modern Tort Law, 14 J. LEGAL STUD. 461, 476 (1985) (explaining that the father of enterprise liability theory, Fleming James, Jr., argued that the modern direction of law was away from a medieval fault-based approach and toward strict liability, with Rylands v. Fletcher and workers' compensation plans as its "most prominent models").
  • 354
    • 0345818679 scopus 로고    scopus 로고
    • The Theory of Enterprise Liability and Common Law Strict Liability, 54
    • Gregory C. Keating, The Theory of Enterprise Liability and Common Law Strict Liability, 54 VAND. L. REV. 1285, 1334 (2001).
    • (2001) VAND. L. REV , vol.1285 , pp. 1334
    • Keating, G.C.1
  • 355
    • 33947643187 scopus 로고    scopus 로고
    • See 3 HARPER ET AL., supra note 119, at 132; Priest, supra note 271, at 463.
    • See 3 HARPER ET AL., supra note 119, at 132; Priest, supra note 271, at 463.
  • 356
    • 33947655973 scopus 로고    scopus 로고
    • E.g., Robert L. Rabin, Some Thoughts on the Ideology of Enterprise Liability, 55 MD. L. REV. 1190, 1193-94 n.22 (1996). See Keating, supra note 272, at 1324 (describing Judge Friendly's view that enterprises should be held liable for their characteristic risks because they benefit from the imposition of those risks even if liability would not induce precaution). Many enterprise liability theories also contend that the cost-pressures of higher insurance premiums create incentives for enterprises to take safety precautions for their risky activities. See, e.g., id. at 1320.
    • E.g., Robert L. Rabin, Some Thoughts on the Ideology of Enterprise Liability, 55 MD. L. REV. 1190, 1193-94 n.22 (1996). See Keating, supra note 272, at 1324 (describing Judge Friendly's view that enterprises should be held liable for their characteristic risks because they benefit from the imposition of those risks even if liability would not induce precaution). Many enterprise liability theories also contend that the cost-pressures of higher insurance premiums create incentives for enterprises to take safety precautions for their risky activities. See, e.g., id. at 1320.
  • 357
    • 33947709557 scopus 로고    scopus 로고
    • Keating, supra note 272, at 1320. Justice Traynor's celebrated concurrence in Escola v. Coca Cola Bottling Co., 150 P.2d 436, 440 (Cal. 1944), afforded prominence both to safety incentives and loss-spreading rationales. Rabin, supra note 274, 1194 n.22.
    • Keating, supra note 272, at 1320. Justice Traynor's celebrated concurrence in Escola v. Coca Cola Bottling Co., 150 P.2d 436, 440 (Cal. 1944), "afforded prominence both to safety incentives and loss-spreading rationales." Rabin, supra note 274, 1194 n.22.
  • 358
    • 33947683391 scopus 로고    scopus 로고
    • Keating, supra note 272, at 1333. See also 3 HARPER ET AL, supra note 119, at 196 n.19 (explaining that loss distribution, based in effect on enterprise liability, as preferable to negligence has been widely recognized for years and is not limited to activities to which strict liability has heretofore applied, NOLAN & URSIN, supra note 245, at 150-51 (suggesting enterprise liability's continuing prominence, Murphy, supra note 175, at 666 (highlighting the vitality of Rylands in the twenty-first century to ensure that polluting enterprises pay their way, For examples of contemporary scholarship advocating the retention of enterprise liability, see Steven P. Croley & Jon D. Hanson, Rescuing the Revolution: The Revived Case for Enterprise Liability, 91 MICH. L. REV. 683, 692 1993, offering new arguments on behalf of old justifications for th
    • Keating, supra note 272, at 1333. See also 3 HARPER ET AL., supra note 119, at 196 n.19 (explaining that "loss distribution, based in effect on enterprise liability," as preferable to negligence "has been widely recognized for years" and is not limited "to activities to which strict liability has heretofore applied"); NOLAN & URSIN, supra note 245, at 150-51 (suggesting enterprise liability's continuing prominence); Murphy, supra note 175, at 666 (highlighting the vitality of Rylands in the twenty-first century to ensure that polluting enterprises pay their way). For examples of contemporary scholarship advocating the retention of enterprise liability, see Steven P. Croley & Jon D. Hanson, Rescuing the Revolution: The Revived Case for Enterprise Liability, 91 MICH. L. REV. 683, 692 (1993) (offering "new arguments on behalf of old justifications for the expansion of manufacturer liability");
  • 359
    • 33947653298 scopus 로고    scopus 로고
    • William K. Jones, Strict Liability for Hazardous Enterprise, 92 COLUM. L. REV. 1705 (1992) (discussing same).
    • William K. Jones, Strict Liability for Hazardous Enterprise, 92 COLUM. L. REV. 1705 (1992) (discussing same).
  • 360
    • 33947623204 scopus 로고    scopus 로고
    • See supra note 239 discussing the increasing availability and use of cyber-risk insurance
    • See supra note 239 (discussing the increasing availability and use of cyber-risk insurance).
  • 361
    • 0142231545 scopus 로고    scopus 로고
    • Twentieth-century Tort Theory, 91
    • John C.P. Goldberg, Twentieth-century Tort Theory, 91 GEO. L.J. 513, 564 (2003).
    • (2003) GEO. L.J , vol.513 , pp. 564
    • Goldberg, J.C.P.1
  • 362
    • 0011538305 scopus 로고
    • A Theory of Strict Liability, 2
    • See, e.g
    • See, e.g., Richard A. Epstein, A Theory of Strict Liability, 2 J. LEGAL STUD. 151, 203-04 (1973).
    • (1973) J. LEGAL STUD , vol.151 , pp. 203-204
    • Epstein, R.A.1
  • 363
    • 33947664554 scopus 로고    scopus 로고
    • See supra notes 197-200 and accompanying text (describing the philosophy of the nineteenth century's economic moralists).
    • See supra notes 197-200 and accompanying text (describing the philosophy of the nineteenth century's economic moralists).
  • 364
    • 3042598392 scopus 로고    scopus 로고
    • Rawlsian Fairness and Regime Choice in the Law of Accidents, 72
    • See, e.g
    • See, e.g., Gregory C. Keating, Rawlsian Fairness and Regime Choice in the Law of Accidents, 72 FORDHAM L. REV. 1857, 1886-87 (2004).
    • (2004) FORDHAM L. REV. 1857 , pp. 1886-1887
    • Keating, G.C.1
  • 365
    • 33947620680 scopus 로고    scopus 로고
    • See id. at 1887-90.
    • See id. at 1887-90.
  • 366
    • 33947661508 scopus 로고    scopus 로고
    • See Zipursky, supra note 143, at 699-700
    • See Zipursky, supra note 143, at 699-700.
  • 367
    • 33947643722 scopus 로고    scopus 로고
    • See RICHARD A. EPSTEIN, PRINCIPLES FOR A FREE SOCIETY: RECONCILING INDIVIDUAL LIBERTY WITH THE COMMON GOOD 3, 320 (1998) (calling for a reinvigoration of laissez-faire philosophy); Goldberg, supra note 278, at 564-65.
    • See RICHARD A. EPSTEIN, PRINCIPLES FOR A FREE SOCIETY: RECONCILING INDIVIDUAL LIBERTY WITH THE COMMON GOOD 3, 320 (1998) (calling for a reinvigoration of laissez-faire philosophy); Goldberg, supra note 278, at 564-65.
  • 368
    • 33947647504 scopus 로고    scopus 로고
    • Goldberg, supra note 278, at 564-65. See generally ROBERT NOZICK, ANARCHY, STATE, AND UTOPIA 79-84 (1974) (articulating a libertarian theory of a minimal state that upholds one's freedom to engage in risky activities whose benefits outweigh their costs, such as polluting or driving, so long as the individuals who benefit from the activities compensate those who bear the costs).
    • Goldberg, supra note 278, at 564-65. See generally ROBERT NOZICK, ANARCHY, STATE, AND UTOPIA 79-84 (1974) (articulating a libertarian theory of a minimal state that upholds one's freedom to engage in risky activities whose benefits outweigh their costs, such as polluting or driving, so long as the individuals who benefit from the activities compensate those who bear the costs).
  • 369
    • 33947686747 scopus 로고    scopus 로고
    • Goldberg, supra note 278, at 565
    • Goldberg, supra note 278, at 565.
  • 370
    • 33947652244 scopus 로고    scopus 로고
    • Richard A. Epstein, Causation - In Context: An Afterword, 63 CHI.-KENT L. REV. 653, 658 (1987) [hereinafter Epstein, Afterword]; Epstein, supra note 279, at 158.
    • Richard A. Epstein, Causation - In Context: An Afterword, 63 CHI.-KENT L. REV. 653, 658 (1987) [hereinafter Epstein, Afterword]; Epstein, supra note 279, at 158.
  • 371
    • 33947660080 scopus 로고    scopus 로고
    • Cf. Epstein, Afterword, supra note 287, at 818-19 (explaining that because auction aggregators that troll an auction web site, such as eBay, gather information from the site and strain it, they interfere with the auction house's property right to exclude such aggregators; thus, the rules for trespass to real property should be imported into cyberspace).
    • Cf. Epstein, Afterword, supra note 287, at 818-19 (explaining that because auction aggregators that troll an auction web site, such as eBay, gather information from the site and strain it, they interfere with the auction house's property right to exclude such aggregators; thus, the rules for trespass to real property should be imported into cyberspace).
  • 372
    • 33947629272 scopus 로고    scopus 로고
    • In 1972, George Fletcher propounded the reciprocity of risk theory. George P. Fletcher, Fairness and Utility in Tort Theory, 85 HARV. L. REV. 537, 540-42 1972, hereinafter Fletcher, Fairness
    • In 1972, George Fletcher propounded the "reciprocity of risk" theory. George P. Fletcher, Fairness and Utility in Tort Theory, 85 HARV. L. REV. 537, 540-42 (1972) [hereinafter Fletcher, Fairness].
  • 373
    • 33947635671 scopus 로고    scopus 로고
    • See also George P. Fletcher, Book Review: Corrective Justice for Moderns, 106 HARV. L. REV. 1658, 1677 (1993, affirming reciprocity of risk theory in reviewing JULES L. COLEMAN, RISKS AND WRONGS 1992, For Fletcher, fairness requires compensation for a victim's injuries if the injurer exposed the victim to an unfair amount of risk, that is, more risk than the victim exposed to the injurer. See Fletcher, Fairness, supra, at 546-48. Rylands epitomized the reciprocity theory for Fletcher because John Rylands imposed a risk on his coal-mining neighbor, Thomas Fletcher, who did not impose such risks on him. See id. at 546, 550. Thus, fairness required John Rylands to compensate Thomas Fletcher. See id. Fletcher's reciprocity of risk paradigm would likely uphold a strict-liability approach to today's insecure cyber-reservoirs. Database operators, in amassing massive collecti
    • See also George P. Fletcher, Book Review: Corrective Justice for Moderns, 106 HARV. L. REV. 1658, 1677 (1993) (affirming reciprocity of risk theory in reviewing JULES L. COLEMAN, RISKS AND WRONGS (1992)). For Fletcher, fairness requires compensation for a victim's injuries if the injurer exposed the victim to an unfair amount of risk - that is, more risk than the victim exposed to the injurer. See Fletcher, Fairness, supra, at 546-48. Rylands epitomized the reciprocity theory for Fletcher because John Rylands imposed a risk on his coal-mining neighbor, Thomas Fletcher, who did not impose such risks on him. See id. at 546, 550. Thus, fairness required John Rylands to compensate Thomas Fletcher. See id. Fletcher's "reciprocity of risk" paradigm would likely uphold a strict-liability approach to today's insecure cyber-reservoirs. Database operators, in amassing massive collections of sensitive personal data in databases, impose risks upon individuals but such individuals do not impose risks on database operators. Thus, the database operator's imposition of nonreciprocal risks upon individuals would warrant strict-liability treatment for the harm caused by leaking data under the "reciprocity of risk" theory.
  • 374
    • 0346675339 scopus 로고    scopus 로고
    • See Gregory C. Keating, Reasonableness and Rationality in Negligence Theory, 48 STAN. L. REV. 311, 313-14 (1996) [hereinafter Keating, Reasonableness] (building on the incomplete reciprocity theory of George Fletcher and Charles Fried). Keating partially rejects Fletcher's reciprocity of risk paradigm and offers a different prescription for fairness. See Keating, supra note 281, at 1887;
    • See Gregory C. Keating, Reasonableness and Rationality in Negligence Theory, 48 STAN. L. REV. 311, 313-14 (1996) [hereinafter Keating, Reasonableness] (building on the "incomplete" reciprocity theory of George Fletcher and Charles Fried). Keating partially rejects Fletcher's "reciprocity of risk" paradigm and offers a different prescription for fairness. See Keating, supra note 281, at 1887;
  • 375
    • 0347563472 scopus 로고    scopus 로고
    • Gregory C. Keating, Distributive and Corrective Justice in the Tort Law of Accidents, 74 S. CAL. L. REV. 193, 200-01 (2000) [hereinafter Keating, Corrective Justice]; Goldberg, supra note 278, at 568-69 (describing Keating's interpretive project as updating Fletcher's reciprocity theory and providing a normative basis for the reciprocity principle based on a Rawlsian conception of fair terms of cooperation among equals).
    • Gregory C. Keating, Distributive and Corrective Justice in the Tort Law of Accidents, 74 S. CAL. L. REV. 193, 200-01 (2000) [hereinafter Keating, Corrective Justice]; Goldberg, supra note 278, at 568-69 (describing Keating's interpretive project as updating Fletcher's reciprocity theory and providing a normative basis for the reciprocity principle based on a "Rawlsian conception of fair terms of cooperation among equals").
  • 377
    • 33947710806 scopus 로고    scopus 로고
    • See Keating, supra note 281, at 1857-58
    • See Keating, supra note 281, at 1857-58.
  • 378
    • 33947661506 scopus 로고    scopus 로고
    • See id. at 1873.
    • See id. at 1873.
  • 379
    • 33947621648 scopus 로고    scopus 로고
    • at
    • Id. at 1862-63.
  • 380
    • 33947617354 scopus 로고    scopus 로고
    • at
    • Id. at 1864-66.
  • 381
    • 33947639061 scopus 로고    scopus 로고
    • See id. at 1871.
    • See id. at 1871.
  • 382
    • 26844551731 scopus 로고    scopus 로고
    • The Idea of Fairness in the Law of Enterprise Liability, 95
    • Gregory C. Keating, The Idea of Fairness in the Law of Enterprise Liability, 95 MICH. L. REV. 1266, 1328 (1997).
    • (1997) MICH. L. REV , vol.1266 , pp. 1328
    • Keating, G.C.1
  • 383
    • 33947691699 scopus 로고    scopus 로고
    • See also Robert E. Keeton, Conditional Fault in the Law of Torts, 72 HARV. L. REV. 401, 441 (1959) (articulating moral and fairness grounds for strict liability for hazardous activities under the rubric of unjust enrichment because those who benefit by receiving the products of blasting activities ought to bear the losses if they can be distributed at a reasonable cost).
    • See also Robert E. Keeton, Conditional Fault in the Law of Torts, 72 HARV. L. REV. 401, 441 (1959) (articulating moral and fairness grounds for strict liability for hazardous activities under the rubric of "unjust enrichment" because "those who benefit by receiving the products of blasting activities ought to bear the losses if they can be distributed at a reasonable cost").
  • 384
    • 33947628241 scopus 로고    scopus 로고
    • Keating, supra note 281, at 1891-92. See also MARSHALL S. SHAPO, THE DUTY TO ACT: TORT LAW, POWER, & PUBLIC POLICY 8, 11-12 (1977) (arguing that morality and economic considerations compel the notion that entrepreneurs whose activities cause harm have a duty to repair that harm in return for freedom to act as they wish).
    • Keating, supra note 281, at 1891-92. See also MARSHALL S. SHAPO, THE DUTY TO ACT: TORT LAW, POWER, & PUBLIC POLICY 8, 11-12 (1977) (arguing that morality and economic considerations compel the notion that entrepreneurs whose activities cause harm have a duty to repair that harm in return for freedom to act as they wish).
  • 385
    • 33947627697 scopus 로고    scopus 로고
    • Keating, supra note 281, at 1891. See also Jones, supra note 276, at 1778 (contending that fairness demands that when the enterprise controls the instrumentality of harm and the victim is essentially passive and cannot avoid the harm herself, strict liability should follow); Virginia E. Nolan & Edmund Ursin, The Revitalization of Hazardous Activity Strict Liability, 65 N.C. L. REV. 257, 290 (1987) (arguing that strict liability for entities whose commercial activities impose hazards on individuals is fair because the victim imposed no similar risk on the enterprise and lacked the ability to protect herself).
    • Keating, supra note 281, at 1891. See also Jones, supra note 276, at 1778 (contending that fairness demands that when the enterprise "controls the instrumentality of harm" and the victim is "essentially passive" and cannot avoid the harm herself, strict liability should follow); Virginia E. Nolan & Edmund Ursin, The Revitalization of Hazardous Activity Strict Liability, 65 N.C. L. REV. 257, 290 (1987) (arguing that strict liability for entities whose commercial activities impose hazards on individuals is fair because the victim imposed "no similar risk" on the enterprise and lacked the ability to protect herself).
  • 386
    • 33947677186 scopus 로고    scopus 로고
    • See Keating, supra note 281, at 1858. See also JOHN RAWLS, POLITICAL LIBERALISM 300 (1993) (Fair terms of cooperation articulate an idea of reciprocity and mutuality: all who cooperate must benefit, or share in common burdens, in some appropriate fashion judged by a suitable benchmark of comparison.).
    • See Keating, supra note 281, at 1858. See also JOHN RAWLS, POLITICAL LIBERALISM 300 (1993) ("Fair terms of cooperation articulate an idea of reciprocity and mutuality: all who cooperate must benefit, or share in common burdens, in some appropriate fashion judged by a suitable benchmark of comparison.").
  • 388
    • 33947635672 scopus 로고    scopus 로고
    • See supra note 64 and accompanying text (discussing Remsburg v. Docusearch, Inc., 816 A.2d 1001, 1006 (N.H. 2003)).
    • See supra note 64 and accompanying text (discussing Remsburg v. Docusearch, Inc., 816 A.2d 1001, 1006 (N.H. 2003)).
  • 389
    • 33947684937 scopus 로고    scopus 로고
    • See JOHN RAWLS, A THEORY OF JUSTICE 61 (1971);
    • See JOHN RAWLS, A THEORY OF JUSTICE 61 (1971);
  • 390
    • 33947626167 scopus 로고    scopus 로고
    • Keating, Reasonableness, supra note 290, at 344. It also might impinge on the individual's right to be free from arbitrary arrest under Rawls's basic liberties. RAWLS, supra, at 61.
    • Keating, Reasonableness, supra note 290, at 344. It also might impinge on the individual's right to be free from arbitrary arrest under Rawls's basic liberties. RAWLS, supra, at 61.
  • 391
    • 33947624280 scopus 로고    scopus 로고
    • See COLEMAN, supra note 289, at 320 (corrective justice imposes the duty to repair the wrongs one does (emphasis omitted)); ERNEST J. WEINRIB, THE IDEA OF PRIVATE LAW 56-57 (1995); Stephen R. Perry, The Moral Foundations of Tort Law, 77 IOWA L. REV. 449, 453 (1992) (corrective justice erases the wrongful actor's gain and restores the victim's loss).
    • See COLEMAN, supra note 289, at 320 (corrective justice "imposes the duty to repair the wrongs one does" (emphasis omitted)); ERNEST J. WEINRIB, THE IDEA OF PRIVATE LAW 56-57 (1995); Stephen R. Perry, The Moral Foundations of Tort Law, 77 IOWA L. REV. 449, 453 (1992) (corrective justice erases the wrongful actor's gain and restores the victim's loss).
  • 392
    • 33947616845 scopus 로고    scopus 로고
    • See WEINRIB, supra note 304, at 64, 76 (developing Aristotle's notion that corrective justice addresses the disturbances of the equality between two parties such that the injustice that corrective justice corrects is essentially bipolar); Perry, supra note 304, at 453-54. See also Benjamin C. Zipursky, Philosophy of Tort Law, in THE BLACKWELL GUIDE TO THE PHILOSOPHY OF LAW AND LEGAL THEORY 122 (Martin P. Golding & William A. Edmundson eds., 2005) (describing varying notions of corrective justice theory).
    • See WEINRIB, supra note 304, at 64, 76 (developing Aristotle's notion that corrective justice addresses the disturbances of the equality between two parties such that the "injustice that corrective justice corrects is essentially bipolar"); Perry, supra note 304, at 453-54. See also Benjamin C. Zipursky, Philosophy of Tort Law, in THE BLACKWELL GUIDE TO THE PHILOSOPHY OF LAW AND LEGAL THEORY 122 (Martin P. Golding & William A. Edmundson eds., 2005) (describing varying notions of corrective justice theory).
  • 393
    • 33947672966 scopus 로고    scopus 로고
    • See WEINRIB, supra note 304, at 187-90
    • See WEINRIB, supra note 304, at 187-90.
  • 394
    • 33947651229 scopus 로고    scopus 로고
    • Id. at 188. See also COLEMAN, supra note 289, at 367-68 (arguing that no matter how well one maintains an above-ground reservoir, simply building a reservoir creates unnecessary, and therefore unreasonable risks).
    • Id. at 188. See also COLEMAN, supra note 289, at 367-68 (arguing that no matter how well one maintains an above-ground reservoir, "simply building a reservoir creates unnecessary, and therefore unreasonable risks").
  • 395
    • 33947692832 scopus 로고    scopus 로고
    • WEINRIB, supra note 304, at 189
    • WEINRIB, supra note 304, at 189.
  • 396
    • 0348194818 scopus 로고    scopus 로고
    • See Goldberg, supra note 244, at 601 (conceiving tort law as a law for the redress of wrongs [that] conditions the imposition of liability on conduct that is wrongful toward, and injurious to, the victim); John C.P. Goldberg & Benjamin C. Zipursky, The Moral of MacPherson, 146 U. PA. L. REV. 1733, 1812-32 (1998);
    • See Goldberg, supra note 244, at 601 (conceiving tort law "as a law for the redress of wrongs [that] conditions the imposition of liability on conduct that is wrongful toward, and injurious to, the victim"); John C.P. Goldberg & Benjamin C. Zipursky, The Moral of MacPherson, 146 U. PA. L. REV. 1733, 1812-32 (1998);
  • 397
    • 0032350230 scopus 로고    scopus 로고
    • Benjamin C. Zipursky, Rights, Wrongs, and Recourse in the Law of Torts, 51 VAND. L. REV. 1, 3, 15-40, 55-70 (1998) (explaining that tort law only contemplates redress where an injurer bears a relational duty to a victim and commits a wrong against the victim).
    • Benjamin C. Zipursky, Rights, Wrongs, and Recourse in the Law of Torts, 51 VAND. L. REV. 1, 3, 15-40, 55-70 (1998) (explaining that tort law only contemplates redress where an injurer bears a relational duty to a victim and commits a wrong against the victim).
  • 398
    • 33947674812 scopus 로고    scopus 로고
    • Zipursky, supra note 143, at 754 (explaining that although civil recourse theory differs from corrective justice theory in critical ways, civil recourse theory, like corrective justice theory, takes the offensive - as a superior analysis of the structure of tort doctrine, as a form of justice and political order different from distributive justice, . . . and as a critique of instrumentalism).
    • Zipursky, supra note 143, at 754 (explaining that although civil recourse theory differs from corrective justice theory in critical ways, civil recourse theory, like corrective justice theory, takes "the offensive - as a superior analysis of the structure of tort doctrine, as a form of justice and
  • 399
    • 33947626168 scopus 로고    scopus 로고
    • Goldberg, supra note 244, at 598
    • Goldberg, supra note 244, at 598.
  • 400
    • 0036991072 scopus 로고    scopus 로고
    • E.g., RESTATEMENT (THIRD) OF TORTS: LIABILITY FOR PHYSICAL HARM (BASIC PRINCIPLES) § 6 cmts. a, c (Tentative Draft No. 1, 2001) (suggesting that the overarching normative principle of tort law is negligence); James A. Henderson, Jr., Why Negligence Dominates Tort, 50 UCLA L. REV. 377, 378-79 (2002);
    • E.g., RESTATEMENT (THIRD) OF TORTS: LIABILITY FOR PHYSICAL HARM (BASIC PRINCIPLES) § 6 cmts. a, c (Tentative Draft No. 1, 2001) (suggesting that the overarching normative principle of tort law is negligence); James A. Henderson, Jr., Why Negligence Dominates Tort, 50 UCLA L. REV. 377, 378-79 (2002);
  • 401
    • 33947621194 scopus 로고    scopus 로고
    • The Renaissance of Accident Law Plans Revisited, 64
    • Robert L. Rabin, The Renaissance of Accident Law Plans Revisited, 64 MD. L. REV. 699, 716 (2005);
    • (2005) MD. L. REV , vol.699 , pp. 716
    • Rabin, R.L.1
  • 402
    • 0347303712 scopus 로고    scopus 로고
    • Mixed Theories of Tort Law: Affirming Both Deterrence and Corrective Justice, 75
    • Gary T. Schwartz, Mixed Theories of Tort Law: Affirming Both Deterrence and Corrective Justice, 75 TEX. L. REV. 1801 (1997).
    • (1997) TEX. L. REV. 1801
    • Schwartz, G.T.1
  • 403
    • 33947680803 scopus 로고    scopus 로고
    • See also G. EDWARD WHITE, TORT LAW IN AMERICA: AN INTELLECTUAL HISTORY 276-77 (rev. ed. 2003) (addressing the emergence of negligence over strict liability as the dominant standard in manufacturing liability cases).
    • See also G. EDWARD WHITE, TORT LAW IN AMERICA: AN INTELLECTUAL HISTORY 276-77 (rev. ed. 2003) (addressing the emergence of negligence over strict liability as the dominant standard in manufacturing liability cases).
  • 404
    • 33947706289 scopus 로고    scopus 로고
    • Some may argue that in establishing a Rylands claim for bursting cyber-reservoirs, plaintiffs would face significant practical problems proving causation. Although this Article does not attempt to resolve this question, a few preliminary notes can be made. Many contemporary theories that might uphold strict liability also would dispense with the individual causation requirement. See Guido Calabresi, Concerning Cause and the Law of Torts: An Essay for Harry Kalven, Jr, 43 U. CHI. L. REV. 69, 105 (1975, suggesting that any requirement for proof of causation should be obviated when public policy demands, Gifford, supra note 244, at 881-87 exploring several tort scholars' rejection of the notion that a particular victim needs to identify a particular injurer to recover, Concerns about causation also may be somewhat alleviated by the adoption of data-breach notification statutes. Such notices would help victims identify the cyber-reservoir
    • Some may argue that in establishing a Rylands claim for bursting cyber-reservoirs, plaintiffs would face significant practical problems proving causation. Although this Article does not attempt to resolve this question, a few preliminary notes can be made. Many contemporary theories that might uphold strict liability also would dispense with the individual causation requirement. See Guido Calabresi, Concerning Cause and the Law of Torts: An Essay for Harry Kalven, Jr., 43 U. CHI. L. REV. 69, 105 (1975) (suggesting that any requirement for proof of causation should be obviated when public policy demands); Gifford, supra note 244, at 881-87 (exploring several tort scholars' rejection of the notion that a particular victim needs to identify a particular injurer to recover). Concerns about causation also may be somewhat alleviated by the adoption of data-breach notification statutes. Such notices would help victims identify the cyber-reservoir that leaked their sensitive personal data. Menn, supra note 19 (noting that 800 individuals were victimized by identity thieves as a result of a data-security breach at ChoicePoint in 2005). Plaintiffs also might invoke cases where manufacturers of mass products were held liable without proof of individual causation under "industry-wide" or market-share liability theories.
  • 405
    • 64749110621 scopus 로고    scopus 로고
    • The Peculiar Challenges Posed by Latent Diseases Resulting from Mass Products, 64
    • See
    • See Donald G. Gifford, The Peculiar Challenges Posed by Latent Diseases Resulting from Mass Products, 64 MD. L. REV. 613, 654-55 (2005).
    • (2005) MD. L. REV , vol.613 , pp. 654-655
    • Gifford, D.G.1
  • 406
    • 77950653867 scopus 로고    scopus 로고
    • See note 312, at, noting that enterprise liability endures in many areas of tort law, including liability for abnormally dangerous activities
    • See WHITE, supra note 312, at 253 (noting that enterprise liability endures in many areas of tort law, including liability for abnormally dangerous activities).
    • supra , pp. 253
    • WHITE1
  • 408
    • 33947625158 scopus 로고    scopus 로고
    • RESTATEMENT (THIRD) OF TORTS: LIABILITY FOR ECONOMIC LOSS § 8 (Preliminary Draft No. 1, 2005) ([A]n actor who accidentally causes pecuniary harm to another that does not result from a wrongful injury to the person or property of the other is subject to liability in tort for neglect of a duty of care to the other only as stated in §§ 9-21.); 4 FOWLER V. HARPER, FLEMING JAMES, JR. & OSCAR S. GRAY, THE LAW OF TORTS §§ 25.18A-25.18D (2d ed. 1986).
    • RESTATEMENT (THIRD) OF TORTS: LIABILITY FOR ECONOMIC LOSS § 8 (Preliminary Draft No. 1, 2005) ("[A]n actor who accidentally causes pecuniary harm to another that does not result from a wrongful injury to the person or property of the other is subject to liability in tort for neglect of a duty of care to the other only as stated in §§ 9-21."); 4 FOWLER V. HARPER, FLEMING JAMES, JR. & OSCAR S. GRAY, THE LAW OF TORTS §§ 25.18A-25.18D (2d ed. 1986).
  • 409
    • 0042115856 scopus 로고
    • Ethereal Torts, 61
    • Nancy Levit, Ethereal Torts, 61 GEO. WASH. L. REV. 136, 174 (1992).
    • (1992) GEO. WASH. L. REV , vol.136 , pp. 174
    • Levit, N.1
  • 410
    • 33947623745 scopus 로고    scopus 로고
    • See WITT, supra note 180, at 141-42
    • See WITT, supra note 180, at 141-42.
  • 411
    • 33645570709 scopus 로고    scopus 로고
    • See Richard S. Markovitz, Liberalism and Tort Law: On the Content of the Corrective-Justice-Securing Tort Law of a Liberal, Rights-based Society, 2006 U. ILL. L. REV. 243, 245, 268-69 (explaining that the recognition of libel, slander, defamation, and privacy actions suggests that tort law recognizes harm caused by an injurer's interference with an individual's right to lead a life of moral integrity).
    • See Richard S. Markovitz, Liberalism and Tort Law: On the Content of the Corrective-Justice-Securing Tort Law of a Liberal, Rights-based Society, 2006 U. ILL. L. REV. 243, 245, 268-69 (explaining that the recognition of libel, slander, defamation, and privacy actions suggests that tort law recognizes harm caused by an injurer's interference with an individual's right to lead a life of moral integrity).
  • 412
    • 33947633052 scopus 로고    scopus 로고
    • See RUDOLPH VON JHERING, THE STRUGGLE FOR LAW 59 (John J. Lalor trans., 2d ed. 1915) (Property is but the periphery of my person extended to things.). See generally Margaret Jane Radin, Property and Personhood, 34 STAN. L. REV. 957 (1982) (conceiving personal property as an extension of the self).
    • See RUDOLPH VON JHERING, THE STRUGGLE FOR LAW 59 (John J. Lalor trans., 2d ed. 1915) ("Property is but the periphery of my person extended to things."). See generally Margaret Jane Radin, Property and Personhood, 34 STAN. L. REV. 957 (1982) (conceiving personal property as an extension of the self).
  • 413
    • 33947667504 scopus 로고    scopus 로고
    • Cf. Radin, supra note 320, at 1014-15 (arguing for the recognition of an expanded notion of personal property interest based on personhood theory); John Stick, Turning Rawls into Nozick and Back Again, 81 NW. U. L. REV. 363, 374 (1987) (suggesting that Nozick could argue that Rawls's basic liberties include a wider conception of property rights than Rawls acknowledges because the rights to use and dispose of property yield much more self-respect than limited rights).
    • Cf. Radin, supra note 320, at 1014-15 (arguing for the recognition of an expanded notion of personal property interest based on personhood theory); John Stick, Turning Rawls into Nozick and Back Again, 81 NW. U. L. REV. 363, 374 (1987) (suggesting that Nozick could argue that Rawls's basic liberties include a wider conception of property rights than Rawls acknowledges because the "rights to use and dispose of property yield much more self-respect than limited rights").
  • 414
    • 0346509715 scopus 로고    scopus 로고
    • See Heidi Li Feldman, Harm and Money: Against the Insurance Theory of Tort Compensation, 75 TEX. L. REV. 1567, 1587 (1997) (arguing that emotional suffering stunts a person's capacity to flourish).
    • See Heidi Li Feldman, Harm and Money: Against the Insurance Theory of Tort Compensation, 75 TEX. L. REV. 1567, 1587 (1997) (arguing that emotional suffering stunts a person's capacity to flourish).
  • 415
    • 33947689771 scopus 로고    scopus 로고
    • See Levit, supra note 317, at 189-90.1 recognize the possibility that ultrasensitive plaintiffs may attempt to recover emotional distress damages for the leakage of their data. See Keating, Reasonableness, supra note 290, at 344 n.114, 347 (contending that although purely emotional harm is central to an individual's personality, its exclusion from tort law's protection is justified because such damages would put society at the mercy of the emotionally hyperactive). The possibility of ultrasensitive plaintiffs, however, ought not to preclude recovery for emotional harm given the importance of emotional health to human flourishing and a jury's ability to identify a plaintiff's ultrasensitive nature and, in rum, award damages fairly.
    • See Levit, supra note 317, at 189-90.1 recognize the possibility that ultrasensitive plaintiffs may attempt to recover emotional distress damages for the leakage of their data. See Keating, Reasonableness, supra note 290, at 344 n.114, 347 (contending that although purely emotional harm is central to an individual's personality, its exclusion from tort law's protection is justified because such damages would put society at the mercy of the emotionally hyperactive). The possibility of ultrasensitive plaintiffs, however, ought not to preclude recovery for emotional harm given the importance of emotional health to human flourishing and a jury's ability to identify a plaintiff's ultrasensitive nature and, in rum, award damages fairly.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.