DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

If at first you don’t succeed: Senator Leahy offers breach notification amendments to cybersecurity bill

Posted on July 28, 2012 by Dissent

Brendan Sasso reports:

Sen. Patrick Leahy (D-Vt.) is pushing for an amendment to a cybersecurity bill that would make it a crime for a company to hide a data breach from its customers.

Under the legislation, anyone who purposefully conceals a data breach that causes financial damage could face up to five years in prison.

Other amendments offered by Leahy would set a national standard for companies to notify their customers in the event of a data breach and would require businesses that store consumers’ sensitive personal information to establish data security programs.

Read more on The Hill.


Related:

  • CISA orders federal agencies to patch Sitecore zero-day following hacking reports
  • 3rd Circuit Clarifies Scope of Computer Fraud Abuse Act With Employer's Policies
  • Appeals Court Upholds FCC Data Breach Rules for Hacked Telecoms
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • Former JBLM soldier pleads guilty to attempting to share military secrets with China
  • US govt login portal could be one cyberattack away from collapse, say auditors
Category: Federal

Post navigation

← Ca: Pension data of former city workers stolen
Anonymous Australian to leak 40gb from AAPT →

1 thought on “If at first you don’t succeed: Senator Leahy offers breach notification amendments to cybersecurity bill”

  1. IA Engineer says:
    July 30, 2012 at 8:30 am

    These politicians need to figure out why these breaches are happening. Its the software compnaies lack of effort to make the material secure, and the use extremely easy password complexity rules to use the software. I am sure everyone has a password scheme they use, and if software password complexity was put into the system that would correct about 20% of the “breaches”.

    Another part of the sad affairs is the software itself. Its convenient for people to load software and not patch it. Its JUST as easy for a manufacturer of this software to sell it, and not offer an email of phone call that an upgrade is available – whether free of at the cost of a maintenance contract.

    The other part is human based. Whether these breaches occur as a vendetta, mistake, greed or otherwise is another issue. This admendment by what is written here, in my opinion, seems to say “We know there is a cyber security problem”. We understand the establishments are unsecure, but if you do something wrong you’re going to pay for it”.

    One thing that DOES NOT help is lack of jobs. There is a lack of urgency that people feel when they lose their jobs, and are presented with a job opportunity – or – if AT a job are given a way to grab a wad of cash quickly that they probably could never accumulate in a short period of time. Cash is King if the opportunity is presented in a manner which the event to take place is harmless. “All you have to do is…..”

    I see two things that need to happen. JOBs is one. The other is QUITE SIMPLE. Put up a Government website that people have to go to when employed OR if they move positions within a company. This website will show SHORT 6-10 minute clips of video that cannot be skipped or advanced. Once each one is done, the person then has to copy and paste a unique verification code that shows the user has completed part of the training. Current and future employers can only view the data, and are legally bound NOT to hire or advance any employee without the user completing the required training.

    The Jobs stimulate the economy and keep people from doing things they otherwise would not do. The training shows that they understand what hacking, skimmers, insider threat, and other basic illegal things are. I am sure the government can properly word the opening pages to where it is legal and binding that if an individual is considered to be a threat in respects to Information technology systems and assets, they are subject to monitoring, search and seizure without warning.

    Lolli-gagging around the issue will get you no where. Uproars will be squelched ; you wanna work? watch the videos and hit the consent button and cut and paste the unique code. People will get away with alot if they are given an opportunity to do so. Whats the difference of a person willingly ripping off a business – even a bank whether it involves a gun, a shovel or a computer? an Act of crime is a crime and it should be treated as such across the board. Minimum mandatory sentences for each “level” of crime. This is not hard. Law is Law. follow it, ot fallow your fellow inmate to the assinged cell.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.