Directors Who Conceal Cyber Attacks Could Face Prison

UK companies who are still living in dread of GDPR should thank their lucky stars they are not operating in the US, where a group of Democrats is planning to bring in new laws which appear to make compliance with the upcoming EU data protection legislation seem like a stroll in the park.

Named the Data Security & Breach Notification Act, the proposed law seeks to implement nationwide breach notification standards and replace the confusing patchwork of state laws currently in place.

The Act, which is sponsored by Democrat senators Bill Nelson of Florida, Richard Blumenthal of Connecticut and Tammy Baldwin of Wisconsin, would see those companies which “intentionally and willfully” conceal a data breach to be prosecuted in the courts, with the threat of huge fines and up to five years in jail hanging over them.

It has been reported that the Uber hacking scandal, which saw the company pay a ransom to criminals rather than admit to a huge data breach, has served as the catalyst for the Bill to be brought forward.

In a statement, Senator Nelson said: "We need a strong federal law in place to hold companies truly accountable for failing to safeguard data or inform consumers when that information has been stolen by hackers. "Congress can either take action now to pass this long overdue Bill or continue to kowtow to special interests who stand in the way of this common sense proposal. When it comes to doing what’s best for consumers, the choice is clear.”

DataIQ

You Might Also Read: 

Company Directors Should Have Personal Liability For Data Breaches:

GDPR Will Impact Data Management In The USA:

The GDPR Advisory Board Offers Expert Advice:
 

 

« Why Is The Price Of Bitcoin So High?
Ethiopian Cyber Spies Left Clues Behind »

Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: How To Architect An Identity Management Strategy In AWS

WEBINAR: How To Architect An Identity Management Strategy In AWS

Thursday, June 17, 2021 - In this webinar, SANS and AWS Marketplace will provide guidance on how to architect and execute an IAM strategy with AWS services and third-party identity management solution

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

verify-U

verify-U

verify-U is a leading provider of online identification and verification services.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Quantum Cybersecurity

Quantum Cybersecurity

Quantum's objectives are to assist and help our clients with RMF Controls, Accreditation packages, FISCAM controls, ISSM Duties and Responsibilities, ISSO Duties and Responsibilities and more.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

Bowhead Cybersecurity Solutions and Services (BCSS)

Bowhead Cybersecurity Solutions and Services (BCSS)

Bowhead Cybersecurity Solutions and Services provides high-end technical and professional services with an emphasis on providing Cyber Solutions.