A data breach occurs when there is release of secured private and confidential information in an unreliable environment intentionally or unintentionally. Several businesses and government organization operate on the basis of personal data of the citizens which must be secured from invalid access of data from strange sources. Privacy of the citizens must be one of the fundamental denominator in determining the operation of any business or government agency. However, the recent spate of data breaches including Facebook data breach, PageUp People breach and data breach at Equifax and so on in diverse sectors has garnered widespread attention from all avenues in the newspapers (Koehn, 2018). Reports suggests that according to the Privacy Commissioner, there were 63 breaches reported in the first six weeks – more than 10 breaches a week. This calls for a common law and regulatory framework to ensure that the privacy of the citizens is the foremost priority in the operations of the business worldwide. European regulators brought in a landmark legislation General Data Protection Regulation (GDPR) which was still long overdue in Australia and many other countries.
On the other hand Australia brought Privacy Amendment (Notifiable Data Breaches) Act 2017 which has been passed to establish Notifiable Data Breaches (NDB) scheme which aims to notify the individuals where the personal data has the likelihood of the data breach. This notification must be supplemented responsive action that must be taken by the individuals in case of data breach ("Notifiable Data Breaches scheme| Office of the Australian Information Commissioner - OAIC", 2018). This is a remarkable step in the backdrop of upsurge in frequent personal as well as financial data breaches. Data breaches has a hefty cost which the company has to bear as witnessed in data breach at Equifax amounts to a cost of US$430 million. A survey by HP Australia IT Security Study highlights that 46% of small-to-medium sized businesses (SMBs) said that most of their customers are refraining from data collection and sharing ("Aus SMBs not concerned enough about data privacy - study", 2018). While these information is necessary for their business operations losing out on this is causing major losses to the business. Further the news reports suggests that the SBMS are not adequately prepared for the NDB Scheme and upgrading their software and IT Security to protect their data from cyber-attacks. Privacy concerns has kept many business laid back from smooth functioning as the citizens are now thinking twice before sharing any private information ("Have we reached peak data breach notification fatigue? - Data Protection - Australia", 2018).
Data mining of these private information has led to innovation and development of goods and services so as to provide a customized solution to the problems. This has led to evolution of new age business forms to cater the demand of the current generation. From hiring a basic cab, ordering a meal to accessing social media for entertainment requires a detailed list of information of the customers. In case of a kind of data breach, such vital information is at stake which can be misused thus infringing upon the privacy of the citizens. The customers need to more aware in sharing their private information while the commercial firms should have adequate mechanisms to prevent such data breaches which not only cost them economically but also hampers the goodwill, trust and confidence of all the stakeholders involved in the process of the business. Government on the other hand should strengthen its legislation by building proper frameworks and adopt a multi-pronged approach in tackling issues such contested issues of data piracy and frequent breaches..
Aus SMBs not concerned enough about data privacy - study. (2018). Retrieved from https://securitybrief.com.au/story/aus-smbs-not-concerned-enough-about-data-privacy-study
Have we reached peak data breach notification fatigue? - Data Protection - Australia. (2018). Retrieved from https://www.mondaq.com/australia/x/747082/data+protection/Have+we+reached+peak+data+breach+notification+fatigue
Koehn, E. (2018). Human error to blame for 30% of data breaches: commission. Retrieved from https://www.smh.com.au/business/small-business/human-error-to-blame-for-30pc-of-data-breaches-commission-20181010-p508u7.html
Notifiable Data Breaches scheme| Office of the Australian Information Commissioner - OAIC. (2018). Retrieved from https://www.oaic.gov.au/privacy-law/privacy-act/notifiable-data-breaches-scheme
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Understanding Public Relations. Retrieved from https://myassignmenthelp.com/free-samples/prn101a-understanding-public-relations/fundamental-denominator.html.
"Understanding Public Relations." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/prn101a-understanding-public-relations/fundamental-denominator.html.
My Assignment Help (2021) Understanding Public Relations [Online]. Available from: https://myassignmenthelp.com/free-samples/prn101a-understanding-public-relations/fundamental-denominator.html
[Accessed 10 April 2021].
My Assignment Help. 'Understanding Public Relations' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/prn101a-understanding-public-relations/fundamental-denominator.html> accessed 10 April 2021.
My Assignment Help. Understanding Public Relations [Internet]. My Assignment Help. 2021 [cited 10 April 2021]. Available from: https://myassignmenthelp.com/free-samples/prn101a-understanding-public-relations/fundamental-denominator.html.
Are you stuck with a complicated dissertation proposal? Do you need the right assignment help Australia to overcome such challenges? Take a smart call; choose MyAssignmenthelp.com for an all-inclusive assignment help on the go. We have roped in the best former professors having extensive knowledge of how to go about a dissertation proposal seamlessly. Order your paper today, and take home flawless proposals on time.
Answer: Communication is the passing of information from a source (sender) to destination (receiver) who receives the message and decodes it to get the meaning of the message (Khalighi and Uysal 2014, pp.2231). Communication is a necessity in our lives as life would be meaningless without communication.in our daily lives, communication is all around us. It may be in the form of what we hear, see or even what we depict. Communication takes vari...
Read MoreAnswer: Social media has several advantages and disadvantages that are faced by companies when they try to approach any new country. The social media usage and access is different in every country and every organisation must have a good understanding of the factors which create an impact on the social media usage. China and Mexico have different exposures to social media which makes the approach of the company different. China has no exposure ...
Read MoreAnswer Ethical Considerations There needs to be proper ethical considerations when conducting any studies that involve human subjects. The involvement of human subjects in studies calls for much ethical considerations to ensure that there are no issues that may arise from the study. All human subjects in any study have to be handled with much care to ensure that the research is a success and that it does not bring about ethical issues. Much e...
Read MoreAnswer: Introduction The animal cell is the smallest unit of an organism. Animals have different types of cell structures and cell components. These cell structures are observed and studied using cell biology techniques. These techniques include microscope, staining techniques and Cell fractionation (Gennis, 2013, p6). A microscope varies from each other with different sizes and it’s appropriate. The two common microscopes utilized in ...
Read MoreAnswer: Introduction This report represents seven case studies, to understand the business value with the help of BI (Business Intelligence) tools, methods and techniques. All the seven case studies will be analyzed and the types of problems and evaluated decision will be summarized; how the BI tool addressed the business issues will be discussed and the used BI tool, methods and techniques to add value to the business will be ident...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
You did a great work. I really like the page arrangement, you follow the brief, impressed how quick you ve been with your work
Australia
prompt response and well done on the work They are professional. Legit. Customer service is excellent. Most of the time they deliver the work on time quality of the work in English and creative writing is excellent. In physics they are good .If the...
Australia
after reading the answer it seems pretty good. but still waiting for my grades. i got marks in my previous assignment.
Australia
Need to find experts in the field. The solutions were not 100% correct althought they were okay.
Australia