Private Sector-Public Sector Cybersecurity Issues

Spread the love

Introduction

The aim of the essay is to analyze if the policy makers, as well as the technology creators, will have the ability to create secure, friendly as well as trustworthy privacy-rights infrastructure that allows for innovation and monetization of enterprises while ensuring that the consumers and their information are secured.  There is a need for the application of security across organizations of all types as well as the information systems. In spite of that evident need, there are different priorities that have been realized across the private as well as the public businesses.  The initiates led by governments that require the organizations to meet certain requirements are demanding for changes to take place in many types or enterprises in the private and government agencies with the purpose of reducing potential attacks. The activities most attractive to the lawmakers in regulating the collection of data are as well evaluated here.

In a bid to regulate the manner in which the health sector is gathering information and using metadata, there are various activities that can be leveraged by the lawmakers.  The aim of those activities is to improve the harmonization of data and its exchange through making sure that the innovative encounter and patient engagement models are used.  Those activities are also aimed at making sure that the sharing of the consumer information is kept under control and that the information falls into the hands of the right people. That controlled usage and sharing can be helpful in reducing the risk of its misuse.

  1. What are the possible goals of lawmakers as they may choose to enact future laws to regulate activities that rely on metadata?

As the lawmakers are carrying out various activities to make sure that both the private as well as the public sector engage in safe practices and that they operate in safe environments, they have various goals to achieve.  The lawmakers aim at making sure that the security of the nation including the financial networks, information networks, electrical grid, and other critical infrastructure are adequately addressed (Ministry of Defense, 2012).  Their aim is also to prevent the nation from the menace of cyber attacks through the strengthening of security defenses. The other goals are also to improve the methods for collecting and sharing data in a more effective and secure manner.  All those efforts are meant to make sure that consumers and the clients’ information are secure and are keep private from the unauthorized parties. Additionally, the lawmakers want to make it possible for institutions to perform their transactions minus fear of the external attacks.

  1. What might happen to the goals and productivity of chosen businesses in this example industry, as more new cyber security regulations may be put in place requiring businesses to protect against possible misuse of consumer Metadata?

Even though the outlined goals of the lawmakers regarding the security of Metadata by the organizations in both the private and the public sector are crucial, there are also effects that emanate from the same from the organizations’ perception.  Although the cyber security regulations are vital to the industries for many reasons, they can result in reduced performance of these organizations of both the private and the public sector as they struggle to meet those goals (Andreasson, 2012).  For example, some of those regulations can hinder the children participating in important and beneficial inter-related activities whose aim is to benefit them. That can especially happen when the regulations restrict websites from collecting data for the children aged below 18 years.

The other regulations also may extend to incorporate not only the Web, but also the smartphones as well as other mobile applications, ad networks, games, and even on-line plug-ins. That restriction, for instance, may lead to the infringement of the right of free speech as well as they can result in heavy burdens on the audience of websites as they try to prove their eligibility of accessing the sites.  That generally can bring about the lack of the freedom of expression as well as the lack of innovation opportunities for these teenagers, older minors, and the adults on the online services.

Conclusion

It is of essential to create a balance between the cyber security laws imposed on the organizations and the need for origination for the purpose of ensuring success. The regulations for cybersecurity that have deployed for the enterprises’ compliance need to have application to some extent so as to make sure that they are not a hindrance to the progress of industries. It is important for the lawmakers to strive to make sure that they develop the activities that can ensure best data gathering and usage so that they do not hinder the increased access and efficiency of various industries in both the private and public sectors. In overall, the cyber security regulations need to aim at preventing the country from the disastrous cyber-attacks that may pose a threat to the economy.

References

Andreasson, K. (2012). Cybersecurity public sector threats and responses. Boca Raton, FL: CRC Press.

Ministry of Defense (2012). National security through technology: Technology, equipment and support for UK defence and security. London: Stationery Office.



© 2021: Edubirdie.website, All Rights Reserved | Innovation Theme by: D5 Creation | Powered by: WordPress
error: Content is protected !!