Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Pay Attention to Data Security Notifications

If you’ve watched the news lately, chances are you’ve seen the Equifax breach and the ridiculous fallout it has caused. Over 133 million personal records have been stolen. While it’s difficult not to feel individually victimized by such a breach, it’s important to remember that it’s often not your specific credentials targeted by hackers. Since businesses often hold onto valuable information, they have big crosshairs painted onto them. It doesn’t even stop there--any vendors or partners you deal with are also in danger of hacking attacks.

The Equifax breach, which resulted in 143 million records being stolen, has many people concerned about their data security and data breach notification laws--and rightfully so. One of the biggest points of contention with the Equifax breach was that it took so long for them to notify the public following the incident. We’re not here to argue the ethics of Equifax’s decision to withhold information on this breach--we just want to make sure that you understand the technicalities behind why it was acceptable for them to wait before notifying their customers.

State Laws
At the time of writing this, 47 of the 50 states in the United States have data breach laws, with the only holdouts being Alabama, New Mexico, and South Dakota. While Alabama and New Mexico have at least introduced bills regarding data security and notification, South Dakota has yet to do so.

Another issue comes from the fact that these laws are state-exclusive with no unifying standards. Therefore, the laws could be very different from state-to-state. For example, New York’s law demands that notification of a breach should be given as soon as possible and without any unreasonable delay. Wyoming’s laws, on the other hand, require that notice of the breach be reported within a reasonable amount of time that does not exceed 45 days after the company is made aware of the breach. Florida requires notification within 30 days.

These notification deadlines aren’t necessarily steadfast, either. Did you notice how each of them allows companies to delay notification if there is a valid cause? Depending on the state, there may be various reasons for delay in notification. For example, criminal investigations and national security are both perfectly valid reasons to keep a notification of a breach delayed.

Federal Laws
While there is no data breach law on the federal level, there are various industry-specific regulations. For example, there is the Health Insurance Portability and Accountability Act (HIPAA) and the Gramm-Leach-Bliley Act (GLBA), both of which have specific data breach policies enforced by the federal government. Unfortunately, there is no federal law which spans a general data security policy, so states will be dealing with these issues in their own ways.

Due to Equifax being a financial institution, it’s expected to hold fast to the standards put into place by the GLBA. Since the GLBA doesn’t have a deadline to inform affected users, Equifax technically adhered to the regulations. In the eyes of the law, they did nothing wrong--even if they should have been morally obligated to inform users as soon as possible.

Even though there are different notification laws for each state, there are other aspects of data security laws that vary based on both the industry and the state vs federal level. Every state has different policies regarding who the laws affect, what exactly defines a breach, who must be notified, how they must be notified, how the laws are enforced (and penalized), and who is exempt from the law.

If you need to know more information about the data breach notification laws of your state, the National Conference of State Legislatures offers current laws for each state. Your business needs to know how it will be affected by a data breach. To learn more, reach out to Network Solutions Unlimited at 217-428-6449.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 21 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Risk Management Managed IT Service Regulation Touchpad Windows Ink Proactive IT Phishing Settings Hard Disk Drive Applications History Public Cloud Bring Your Own Device Solid State Drive Office Tips Computing Infrastructure Cloud Smartphones Bluetooth Windows 10s Managed Service Provider Business Management Thank You App Microsoft Office Legislation Touchscreen Google Docs Employer Employee Relationship Android Business Meetings Data Benefits Two-factor Authentication Operating System Content Unified Threat Management Redundancy Law Enforcement Cybersecurity Humor Mobility Wireless IT Support Sync Virtual Reality Microsoft Excel Legal Data Recovery Workplace Tips Gadgets Small Business Internet Exlporer BDR Save Money Mobile Device Management Software Save Time Disaster Recovery How to BYOD Application Encryption Alert Automobile VPN Automation Comparison Black Market Physical Security iOS Saving Money Social Media Mobile Device Cybercrime IT Support Quick Tips User Error Screen Mirroring Upgrade Compliance Books Emails Ransomware Sales Users Data Management Business Owner Troubleshooting Transportation Computer Fan Politics Social Engineering Server Shadow IT Telephone Systems Software as a Service Productivity Safety Training Audiobook Adobe Emergency Instant Messaging User Tips SaaS Samsung Government Colocation Artificial Intelligence Shortcut Reputation Search File Sharing Hackers Personal Information Miscellaneous Flexibility IT solutions Firewall Google Maps IT Services Windows 10 Upgrades Nanotechnology USB Efficiency Remote Computing Bandwidth Internet exploMicrosoft Router Monitor Outsourced IT Malware Audit Browser Data Protection Cast Phone System Hosted Solutions VoIP Apple Communications Television Virtualization Electronic Medical Records Computer Accessories Hard Drives Cleaning Business Computing Business Intelligence Technology Tip of the Week WiFi Relocation Data Breach Rootkit Privacy Word Computer Care Scalability HaaS Cost Management Office Video Games Sports Spam Internet of Things Data storage Work/Life Balance Root Cause Analysis Money Spam Blocking Assessment Password Health Employer-Employee Relationship WIndows Server 2008 Data Loss Licensing Business Continuity Administration Smart Technology Office 365 Remote Monitoring Robot Security Collaboration OneNote Big Data Computers Recovery CrashOverride Data Security Best Practices Two Factor Authentication Windows 10 Smartphone How To Network Security Private Cloud Webinar Hosted Solution Keyboard Passwords Avoiding Downtime Google Drive Techology Information Technology Augmented Reality Cache NFL Mobile Devices Commerce Facebook Cloud Computing Travel Computer Dark Web Storage Internet Managed IT WannaCry Worker Chromecast Public Computer Downtime Managed IT Services Consultant hacker Hybrid Cloud IT Solutions Chrome Network Cortana Outlook IT Management Monitors Lifestyle Charger HBO Wi-Fi Experience Entertainment Professional Services Google Marketing Retail Managed IT Services The Internet of Things Best Practice Microsoft Scam Content Filtering Windows Specifications Wireless Technology iPhone Advertising Backup Loyalty Data Storage Congratulations HIPAA Apps Document Management Vendor Management Tablets Going Green Unsupported Software Customer Hacking Battery Vulnerability Patch Management Holiday Mobile Excel Files Email Innovation Hiring/Firing Value PDF Data Backup Education End of Support Productivity Gmail Budget Hardware Worker Commute Laptop

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *