12 Dec 2022

151

Upcoming Laws Regarding Cyber Privacy

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1118

Pages: 4

Downloads: 0

Cyberspace is the electronic world formed by the interconnected networks of information and technology and also the information on the networks. It is the center of all universal information and communication base. Its security has become a significant priority for governments and organizations worldwide. Cyberspace is a platform where millions of people connect to exchange services, ideas and build friendships. Cyber security is the effort to put measures to protect online information and secure its base. Dependence on cyberspace is essential for social, economic and political relationships hence, there is need for policy development.

Technologies have become integrated into our daily lives because they are interconnected and allow easy access to the internet. The network provides a variety of sensitive and crucial information and also services that we need daily. Therefore, it is vital to the economy of a nation. However, cyberspace has constantly been subject to planned and targeted threats making our reliance on it endangered. The risks are due to the storing of valuable data on a massive scale, with most cloud space. Data is held in portable and powerful devices like laptops and smartphones, which are heavily integrated into our lives. This makes the entire cyberspace vulnerable to attack by cyber thieves who are skilled at taking the opportunity of these weaknesses.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Effective cyber implementation to secure data depends on privacy protection because more personal information is stored on the web. Therefore, both cyber security and privacy protection should be handled simultaneously. Howbeit, these many security measures can be consequential to individuals’ privacy. Cyber security can at times require monitoring of activities to discover threats. On some occasions, this type of monitoring could involve capturing and analyzing large amounts of personal information.

Challenges facing Cyber Security 

There is a need to bring forth new approaches to increase resistance against attacks. This data security, if not taken care of, can lead to massive losses. Most of the challenges facing cyber security directly affect privacy and data protection.

A: Difficulties in the connected networks 

The interconnected networks created by the increase in electronics and the continued evolving of cyberspace imply an enormous amount of data is stored. Modern society depends so much on the vast quantity of digital data obtained when transactions involving finances, online browsing, entertainment services and communications occur. Preferences, personal information, physical movements and other relevant details are captured. Cyberspace has become complex to manage and very challenging to secure. Increased interactions expose risks to privacy and cyber security (Vogel, 2016) . These threats target the weaknesses of web information, posing a significant challenge.

B: Increasing culture of the threats 

Many interconnected systems in the world are exposed as long as they are accessible worldwide. Information flow in cyberspace has expanded and its value to various organizations and nations and cyber thieves. Hacking and cybercrime have been made professional making these activities more polished. At times the cybercriminals are well informed who aim at stealing conceptual property. There is limited information about how the cyber-attacks are conducted by affected companies making it challenging to implement cyber security policies.

C: Threats are moving to the mobile sector 

Our mobile communications and web services are the primary targets for cybercrime criminals. There is an incredible increase in malware on the mobile devices used around the globe. It can be moved to other mobile devices by app transfers. Using public Wi-Fi also puts personal data at tremendous risk of being interrupted, mainly because the devices contain crucial personal information. These attacks targeted on mobile devices call for proper data protection. The mobile industry has a significant role to play to ensure the safety of the systems since personal information is stored on the devices.

D: Risk Management against submission 

Many companies are expected to follow laws and regulations set to operate in specific areas. Compliance, however, does not make the organization secure because they follow blindly the criteria in place, which may as well expose their data. Companies fail to recognize that security is not all about compliance but also engaging in risk management effectively.

E: The “Big Data” anomaly 

Big data is the information from all sources to form a new collection. This design raises concerns over the security of big data and new data analytics to predict security patterns. The information subject to these includes the personal information of individuals. Despite being of vast economic benefit, it is also vital to cyber attackers. Breaches will predominantly damage the service providers since it is new (Pence, 2014) . Organizations that employ the "Big data" approach may present the criminals with new opportunities to malicious input data.

F: Irrelevance of preparedness 

Breaches have become so typical with vast consequences on the affected parties. The majority of the cyber incidents' information remains between governments and the private sector; because they manage telecommunication services. Many companies are not prepared for cyber threats and lack proper contingency plans. This unpreparedness and under-estimation of impact suggest that companies have not made it a preference.

Laws Regarding Cyber Privacy and Security 

A: California Consumer Privacy Act 

It allowed consumers in California to request businesses to disclose the specific information it needs about the buyer and the business purposes for using the information. They can also get to know the third party with which the information is shared. The law also grants the consumers the right to request companies to delete personal information, and the company is required to delete that information upon receiving such requests. This act allows customers to control the sale of personal information to third parties, and the individuals can direct the companies to delete the (Torre, 2018) . It protects teenagers from the sale of data concerning them without their approval. 

B: Nevada Senate Online Privacy Law 

This Bill changed the privacy law and required companies to offer their clients a chance to opt-out in cases involving the sale of their personal information. It was the first legislation in the U.S that grants consumers this right. It required the website operators to post specific details in their privacy laws, and third parties could trace the online activities by consumers. The organizations that violate the terms provided in the bill are subject to heavy penalties per violation and may be subject to a permanent decree. 

C: Maine Act to Safeguard Privacy of Online Client Information 

This bill's main objective was to protect the privacy of online customers. It prevents online service providers from exposing customers' information unless permitted by the customers to do so. It also bars the online service providers from overcharging or failure to serve them concerning the sale of their personal information. The bill demands service providers to put in place safety measures to protect the clients’ personal information from malicious purposes. 

D: Cyber Security Requirements for Financial Services 

The regulators in New York came up with new rules that place minimal requirements on all financial institutions. The powers demanded the institutions to check their risk outlines and set a program to address the risks and protect information under their control. The entities were supposed to report information breaches immediately (Brumfield, 2020) . The smaller entities had to limit access to information and control access to data by third parties. All the proper cyber security practices were to be observed by the business entities. 

References 

Brumfield, C. (2020). 12 new state privacy and security laws explained. CSO .

Pence, H. E. (2014). What is Big Data and Why is it Important. Journal of Educational Technology Systems, 2 (43), 159-171. https://doi.org/10.2190/ET.43.2.d

Torre, L. d. (2018). A Guide to the California Consumer Privacy Act of 2018. SSRN . https://dx.doi.org/10.2139/ssrn.3275571

Vogel, R. (2016). Closing the cybersecurity skills gap. Informit . https://search.informit.org/doi/10.3316/informit.093144667545339

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Upcoming Laws Regarding Cyber Privacy.
https://studybounty.com/upcoming-laws-regarding-cyber-privacy-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Cruel and Unusual Punishments

Since the beginning of society, human behaviour has remained to be explained by the social forces that take control. Be it negative or positive, the significance of social forces extend to explain the behaviour of...

Words: 1329

Pages: 5

Views: 104

Serial Killers Phenomena: The Predisposing Factors

CHAPTER 1: INTRODUCTION _Background information _ Ronald and Stephen Holmes in their article _Contemporary Perspective on Serial Murder_ define a serial killer as anyone who murders more than 3 people in a span...

Words: 3648

Pages: 14

Views: 442

Patent Protection Problem

A patent offers inventors the right for a limited period to prevent other people from using or sharing an invention without their authorization. When a patent right is granted to inventors, they are given a limited...

Words: 1707

Pages: 6

Views: 275

General Aspects of Nonprofit Organizations

Nonprofit organizations are prone to the long and tedious legal process of start-up as compared to their for-profit organizations. However, there are similar rules that govern the startup and the existence of both...

Words: 294

Pages: 1

Views: 73

Contract Performance, Breach, and Remedies: Contract Discharge

1\. State whether you conclude the Amended Warehouse Lease is enforceable by Guettinger, or alternatively, whether the Amended Warehouse Lease is null and void, and Smith, therefore, does not have to pay the full...

Words: 291

Pages: 1

Views: 134

US Customs Border Control

Introduction The United States Border Patrol is the federal security law enforcement agency with the task to protect America from illegal immigrants, terrorism and the weapons of mass destruction from entering...

Words: 1371

Pages: 7

Views: 118

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration