Data Breach Law

A new American law that would create a protocol of how a data breach is handled may be soon in play.. President Barrack Obama called for a federal legislation on Monday, January 12th that would standardize how a data breach is handled by all American organizations. One of the requirements would be for organizations to inform customers within thirty days of the data breach discovery.

According to the Identity Theft Resource Centre, data breaches in the US were up 27.5% last year, which were headlining all media channels ranging from Home Depot to the Sony Pictures Entertainment breach. After so many breaches throughout the years, it is about time that laws are put into place to protect the customer. The Personal Data Notification and Protection Act would greatly benefit America with the consistency that companies will need to undergo when dealing with a data breach. After all with data breaches becoming so prevalent, it only makes sense to regulate the norm of these crimes and put federal laws to govern them.

What are your thoughts? Would placing a federal law governing the procedure of companies affected by a data breach benefit the country?

 

Previous Post
2015 Predictions for Full Disk Encryption & Key Management
Next Post
BitLocker Management

Related Posts

A new year, same mistakes

It’s 2013 and everything old is new again. It’s 10 days into the year and so far we’ve heard about at least two key data thefts and a summary penalty for exposing personal health info in the U.S. (more…)
Read more

Educating with Data Security

Education institutions have numerous important and sensitive documents stored that they are responsible for. This sensitive information belongs to students, parents and faculty and comes in the form of loans, financial records, employment records, etc. (more…)
Read more

How Secure is Your Website?

In today’s world a large amount of transactions are made online, and companies need to focus on securing their customer’s personal information. Even though encrypted web pages may be used, which are developed to prevent third parties from accessing customer…
Read more

Leave a Reply

Your email address will not be published.

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
Contact Us

This will close in 15 seconds