123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Organizations Face Legal And Regulatory Challenges After Security Breach Incidents

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Organizations are required to ensure availability, confidentiality and integrity of information. The risks inherent in the Internet environment make it necessary for organizations to ensure protection of user information and identity. On the other hand, cybercriminals always look for ways to breach the security of the IT infrastructure. Intrusions and security breach incidents have adverse implications for businesses. Security breach incidents may result in unauthorized access to customer and business information. Such incidents adversely affect business reputation, result in loss of business hours, and may also have legal repercussions. The recent security breach incidents have resulted in law suits against erring organizations. Natasha Maksimovic, an active user of Sony's PlayStation has filed a petition and claimed damages over $1 billion for breach of privacy against the company. Kristopher Johns of Alabama had earlier filed a class-action law suit in a United States (U.S) district court accusing the company of negligence in data security and not taking measures to secure sensitive customer information. Johns has also questioned ...
... the delay in breach notification by Sony. A sub-committee of U.S House of Representatives has sought reply for thirteen questions and also asked Sony to testify before the committee.

In the Eastern part of the World, South Korea's National Agricultural Cooperative Federation (Nonghyup) is facing the ire of the Financial Supervisory Service (FSS) following the security breach incident of last month. The regulatory body concluded that Nonghyup has failed to adhere to computer security regulations. According to Yonhap News agency, a group of 1600 customers is planning to file a class-action law-suit against Nonghyup. The federation has already doled out over 20 milllion Won to settle claims against damages.

Therefore, organizations must place high emphasis on securing IT infrastructure. Hiring professionals qualified in computer science degree programs may help in understanding business environment, core activities, key assets and processes, IT networks and security needs. This understanding will help in identification and mitigation of relevant threats.

Employees must be educated on security precautions at workstations, e-mail communications and interactions with other stake holders through e-learning and training programs. Online degree courses may help employees to understand the "Do's and Don'ts" in IT security. Organizations must monitor employee activity and update them on the latest security threats.

Organizations must also have proper incident response teams in place to initiate prompt action to prevent further damage, protect evidence and ensure continuity of operations. The response teams may consist of professionals qualified in penetration testing, online university degree programs on incident management and other security certifications. Proactive approach is crucial to defend the IT infrastructure from security breaches.

Total Views: 235Word Count: 431See All articles From Author

Add Comment

Computers Articles

1. How A Free Seo Checker Can Help You Understand And Improve Your Website
Author: Mahesh

2. "empowering Digital Excellence: Lcc Computer Education In Bhubaneswar"
Author: Khushi Gill

3. How Cat6 Ethernet Cables Improve Streaming, Gaming, And Downloads
Author: Jennifer Truong

4. Why Choose The 1452 Bluetooth Scanner In 2025?
Author: prime pos

5. Scraping Chipotle Menu Data From All Us Locations
Author: Food Data Scrape

6. The Rise Of Digital Marketing Agencies: A Deep Dive Into The Digital Marketing Landscape In Bangalore
Author: Cubikeymedia

7. What Are The Different Types Of Computer Cables?
Author: Jennifer Truong

8. How To Check If Your Business Idea Will Really Work?
Author: goodcoders

9. Boost Insights With Carfax Car Listing Data Extraction
Author: travel scrape

10. Cat6 Ethernet Cable: The Key To Faster Internet
Author: Jennifer Truong

11. Google Ads Company In Dubai: Realizing Business Growth With Webtek Digital
Author: webtek Digiytal

12. How To Troubleshoot Common Usb Cable Issues?
Author: Jennifer Truong

13. Why Melbourne’s Computer Shops Are The Best For Custom-built Pcs?
Author: Jack Williams

14. How To Manage Staff Productivity When Working Virtually?
Author: goodcoders

15. The Future Is Now – Top Digital Marketing Updates In 2025
Author: Gautam Khatnani

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: