Data Breach Law

A new American law that would create a protocol of how a data breach is handled may be soon in play.. President Barrack Obama called for a federal legislation on Monday, January 12th that would standardize how a data breach is handled by all American organizations. One of the requirements would be for organizations to inform customers within thirty days of the data breach discovery.

According to the Identity Theft Resource Centre, data breaches in the US were up 27.5% last year, which were headlining all media channels ranging from Home Depot to the Sony Pictures Entertainment breach. After so many breaches throughout the years, it is about time that laws are put into place to protect the customer. The Personal Data Notification and Protection Act would greatly benefit America with the consistency that companies will need to undergo when dealing with a data breach. After all with data breaches becoming so prevalent, it only makes sense to regulate the norm of these crimes and put federal laws to govern them.

What are your thoughts? Would placing a federal law governing the procedure of companies affected by a data breach benefit the country?

 

Previous Post
2015 Predictions for Full Disk Encryption & Key Management
Next Post
BitLocker Management

Related Posts

Personal Security Vs iCloud

According to Business Insider, if your iCloud account has been hacked, a full backup of your account can be downloaded. This gives the hacker complete access to all your personal information. Here is a scarier thought, not only will the…
Read more

SecTor 2014 – What We Learned

Last week, thousands of IT security professionals gathered in Toronto for the annual SecTor Security Conference to share compelling research and new techniques. From malware attacks to unencrypted stolen devices, data theft is rampant in the enterprise, and security solutions…
Read more
When virtual environments get too heavy

When Virtual Environments Get Too Heavy

As an encryption security vendor that is working its way into Mobile Device Management (MDM), I’m fascinated and constantly looking at new ways to secure mobile devices and company information. As someone with a background in virtualized environments, I’m even…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
 
Contact Us
 

This will close in 0 seconds