Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Variations in State Data Breach Disclosure Laws Complicate Compliance
Data breach laws are always being reviewed and renewed but I assumed it was minute details. Not that only recently Alabama was the last state to pass a law that requires data breaches to be reported to customers by businesses. I would assume most companies would still do it as a good practice but with identity theft being a national issue, especially with the cyber-attacks on Equifax and Yahoo, how have data breach disclosure laws not been implemented on a federal level years ago? John Moran suggests that the proper response to this problem is a thorough implementation of a detection, investigation, and post-breach procedure for all businesses.
You must be logged in to reply to this topic.