Data Breach Law

A new American law that would create a protocol of how a data breach is handled may be soon in play.. President Barrack Obama called for a federal legislation on Monday, January 12th that would standardize how a data breach is handled by all American organizations. One of the requirements would be for organizations to inform customers within thirty days of the data breach discovery.

According to the Identity Theft Resource Centre, data breaches in the US were up 27.5% last year, which were headlining all media channels ranging from Home Depot to the Sony Pictures Entertainment breach. After so many breaches throughout the years, it is about time that laws are put into place to protect the customer. The Personal Data Notification and Protection Act would greatly benefit America with the consistency that companies will need to undergo when dealing with a data breach. After all with data breaches becoming so prevalent, it only makes sense to regulate the norm of these crimes and put federal laws to govern them.

What are your thoughts? Would placing a federal law governing the procedure of companies affected by a data breach benefit the country?

 

Previous Post
2015 Predictions for Full Disk Encryption & Key Management
Next Post
BitLocker Management

Related Posts

Florida Gets Serious With Data Privacy

July 1st was a big day in Florida if you’re a follower of info security news. That was the day Florida’s new Florida Information Protection Act (FIPA) came into effect and had immediate consequences for anyone that does business in…
Read more

How Secure is Your Website?

In today’s world a large amount of transactions are made online, and companies need to focus on securing their customer’s personal information. Even though encrypted web pages may be used, which are developed to prevent third parties from accessing customer…
Read more

Security Measures to Think About

Everyone is weary of hackers and the damages that they can cause, as seen with the Heartbleed Bug and Shellshock Bash. But hacking attacks can also mean physical security breaches, as hackers do not always have to resort to intricate…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu