[go: up one dir, main page]

0% found this document useful (0 votes)
10 views6 pages

CL Team Assignment 16

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 6

1

TEAM MEMBERS

NAGA HARIHARARN SANDA ID: 644350

SAIKIRAN MASHETTI ID: 644707

ARVIND CHENNUBOINA ID:645023

RAMAKANTH SHASHANK PENTAKOTA ID:645326

HADAGALI LAKSHMI PARASHRAM ID :645354

Cyber Law

Assignment 16

Professor Name: Todd Seaver, JD


2

Enhancing US Cyberlaws

Top Five Recommendations

Advanced innovation is fairly evident in today’s technology-saturated world, but the difficulties

it presents in cybersecurity are very complicated. The importance for more states to ratify cyber

laws or for current ones to strengthen them is especially important in light of day by day changes

in threats and in order to protect every single person, businesses, and the nation. Below is the list

of the five priority areas in which S. 1518 should provide for the implementation of the

computer-based laws in order of preference.

1. Data Privacy and Protection

It is the most fundamental right, and everyone must ensure that their privacy is protected at all

times. The second most cited reason relates to this argument. These are indeed very vast buckets

of personal data that are now being gathered and processed and hence the need for ensuring that

the privacy rights of individuals are well protected.

The legislation proposed reads that the whole federal data privacy law should emulate the

provisions of the EU GDPR. Individuals should have a significant freedom over the information

they share, and this law should incorporate numerous rights; clear procedures for collection and

utilization of the data, exact data security standards, and significant levels of control over

individual data.

The reason the law is passed: One federal law would make legislation easier to understand,

therefore boosting people’s trust in it and giving them the same levels of protection in any state

(Rubinstein & Good, 2021). This is perhaps of even more importance now because cases of

hacks and leaking of data are becoming more frequent and the exploitation of individual data by
3

companies is on the rise. The present situation can be described as a situation where there is

rather a random collection of regional legislation which may be insufficient to address challenges

that cut across the entire country given that there is no federal regulation on most of these

aspects.

2. Cybersecurity Standards for Critical Infrastructure

Stating that cyberattacks are gradually targeting essential structures is the third reason for its

significance. Some of such structures include water supply networks, health facilities, and

electricity frameworks. Ensuring that they are resilient is now imperative to maintaining the

security of your nation.

At the legislative level proposed legal initiatives that would require the adoption of stringent

cybersecurity regulations for all critical sectors and industries. This also means that some

components of business operations such as risk assessment, which should be conducted

periodically, contemporary security measures, and the mandatory cyber occurrences reportage

should be included.

However, for this law to be enacted, it is crucial to understand why this law is made as well as

the aspects that make it unique and different from the others. Y productively, according to

Goodman (2021), the ransomware attack occurred in 2021 aimed at Colonial Pipeline revealed

the vulnerabilities in the fundamental facilities. Measures in cybersecurity could be designed in

such a manner that the resilience of these systems is strengthened up to the point where complex

cyber threats are kept at a safe distance away from our economic structure as well as people’s

safety.
4

3. Cybersecurity Education and Workforce Development

Ranking Reason: Incumbent staff is regarded as critical to protecting a firm against cyber-

attacks, provided that its members are aware of cybersecurity measures. The subject of

cybersecurity is not well staffed with only a few experienced and trained personnel available.

a piece of legislation which will establish a program through which the government will fund the

cybersecurity training and education across all levels of learning, including professional

development for trainers as well as in professional and educational institutions, including

elementary and secondary. The most important proposal is to provide a financial incentive in the

form of targeting tax credits, loan forgiveness, and scholarships to ensure people pursue careers

within cybersecurity.

Reasons for the Need for This Law: The authors of the publications states that the need to bridge

the cybersecurity skill gap is necessary for the protection of security and stability of the nation’s

economy as noted by Evans, Reeder, and Shames (2020). Employees with proper training can

effectively avoid enabling hackers to access the organization’s network, thereby minimizing the

risks of cybercrimes and their subsequent impact.

4. Cybercrime and Law Enforcement Capabilities

The ranking has been affected by what seems to be an endless progression of the complexity of

the crimes in the cyber space, which imposes the requirement of ever-enhanced capabilities in

law enforcement agencies.

Inasmuch as the commission fights against cybercrime, this proposed legislation seeks to

enhance the operations of federal, state, and local police agencies. This should involve financing
5

education at the post-secondary level, technological development, and the establishment of

frameworks for collaborations with other nations.

Criminals also work across borders, which complicates the arrest of cybercriminals and other

related incidents such as identity theft (Paganini, 2020). Increased legal authority and

reinforcement of police capacity and encouragement of international cooperation could provide

more effective cybercriminal specification, investigation, and prosecution. In turn, this will be a

strong discouragement to future cyber criminals from perpetrating similar offences.

5. Consumer Protection from Cyber Scams and Fraud

Rationale for Ranking: Customers feel more exposed and can easily fall prey to so many internet

scams who want to fraud people out of their money, and in the process of doing so, the customers

end up with a lot of emotional turmoil.

There is a proposed federal resolution designed to protect citizens from being scammed and

manipulated on the Internet. For this reason, businesses have to be forced to come out and

declare any instance of cyber fraud, the lawmakers must offer stiff penalties to the offenders, and

government and other stakeholders should ensure that there is sufficient public sensitization.

Is there a rationale for why this law is being passed? In their article, Holtfreter, Reisig, and Pratt

(2020) postulate that cyber frauds have become increasingly sophisticated majoring on the

ignorant, and which yield considerable monetary losses and other forms of harm. Higher

consumer protections could significantly impact the reduction of these risks, enhance secure

online conduct, and ensure that enterprises are held to the standard of their consumer’s

protection.
6

Reference

Evans, K., Reeder, F., & Shames, M. (2020). Building a Resilient Cybersecurity Workforce.

RAND Corporation. https://www.rand.org/pubs/research_reports/RR2927.html

Goodman, M. (2021). The Colonial Pipeline Ransomware Attack: A Strategic Failure. Journal of

Strategic Studies, 44(6), 769-795. https://doi.org/10.1080/01402390.2021.1928187

Holtfreter, K., Reisig, M. D., & Pratt, T. C. (2020). Consumer Fraud in the United States:

Prevalence, Risk Factors, and Offender Characteristics. Criminology & Public Policy,

19(2), 457-479. https://doi.org/10.1111/1745-9133.12488

Rubinstein, I. S., & Good, N. (2021). Privacy and Security in the Age of Big Data: A Research

Agenda. Journal of Law and Policy for the Information Society, 18(3), 295-335.

https://doi.org/10.2139/ssrn.3794997

You might also like