"Digital Security Risks": Essay Example, 690 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

"Digital Security Risks"

Print Download now

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

The increasing use of and dependence on information technology in business activities – while creating significant benefits in terms of productivity and efficiency – is also leading to significant risks. Among them are “digital security risks” which, when they materialise, can disrupt the achievement of business by compromising the confidentiality, integrity and availability of information and information systems. It is widely assumed that most companies have been or will be affected by such “cyber” attacks. Businesses across a wide range of industry sectors are exposed to potentially enormous physical losses as well as liabilities and costs as a result of cyber-attacks and data breaches.

Victims of recent attacks include such well-known brands as eBay, Target, Neiman Marcus, Michaels Stores, the University of Maryland, NATO, JPMorgan Chase, Adobe, and Living Social.

Cyber Legislation in India

  • The Information Technology Act 2000 was passed and enforced on 17th May 2000.
  • Thereafter major amendments were carried out to IT Act2000 by the Information Technology Amendment Act, 2008.
  • Amendments were also carried out in the Indian Penal Code 1860, the Indian Evidence Act 1872, the Banker’s Book Evidence Act 1891 and the Reserve Bank of India Act 1934.

Types of cyber risk coverage include:

  • Loss/Corruption of Data – Covers damage to, or destruction of, valuable information assets as a result of viruses, malicious code and Trojan horses.
  • Business Interruption – Covers loss of business income as a result of an attack on a company’s network that limits its ability to conduct business, such as a denial of-service computer attack. Coverage also includes extra expenses, forensic expenses and dependent business interruption.
  • Liability – Covers defense costs, settlements, judgments and, sometimes, punitive damages incurred by a company as a result of
  • Breach of privacy due to theft of data (such as credit cards, financial or health related data);
  • Transmission of a computer virus or other liabilities resulting from a computer attack, which causes financial loss to third parties;
  • Failure of security which causes network systems to be unavailable to third parties; rendering of Internet Professional Services;
  • Allegations of copyright or trademark infringement, libel, slander, defamation or other “media” activities in the company’s website, such as postings by visitors on bulletin boards and in chat rooms. This also covers liabilities as postings by visitors on bulletin boards and in chat rooms. This also covers liabilities associated with banner ads for other businesses located on the site.
  • Cyber Extortion – Covers the “settlement” of an extortion threat against a company’s network, as well as the cost of hiring a security firm to track down and negotiate with blackmailers.
  • Crisis Management – Covers the costs to retain public relations assistance or advertising to rebuild a company’s reputation after an incident. Coverage is also available for the cost of notifying consumers of a release of private information, as well the cost of providing credit-monitoring or other remediation services in the event of a covered incident.
  • Criminal Rewards – Covers the cost of posting a criminal reward fund for information leading to the arrest and conviction of a cyber-criminal who has attacked a company’s computer systems.
  • Data Breach – Covers the expenses and legal liability resulting from a data breach. Policies may also provide access to services helping business owners to comply with regulatory requirements and to address customer concerns.
  • Identity Theft – Provides access to an identity theft call center in the event of stolen customer or employee personal information. Social Media/Networking – Insurers are looking to develop products that cover a company’s social networking activities under one policy. Some cyber policies now provide coverage for certain social media liability exposures such as online defamation, advertising, libel and slander.

Exclusions

  • Viruses created by you are not covered;
  • Losses caused by self-replicating code which has not been specifically targeted at you are not covered.
  • Claims caused by infringement of patents;
  • Deliberate or reckless acts are not covered;
  • Cyber insurance typically covers expenses related to first parties as well as claims by third parties.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Cite this Essay

To export a reference to this article please select a referencing style below:

GradesFixer. (2018, October, 26) “Digital Security Risks”. Retrived July 19, 2019, from https://gradesfixer.com/free-essay-examples/digital-security-risks/
"“Digital Security Risks”." GradesFixer, 26 Oct. 2018, https://gradesfixer.com/free-essay-examples/digital-security-risks/. Accessed 19 July 2019.
GradesFixer. 2018. “Digital Security Risks”., viewed 19 July 2019, <https://gradesfixer.com/free-essay-examples/digital-security-risks/>
GradesFixer. “Digital Security Risks”. [Internet]. October 2018. [Accessed July 19, 2019]. Available from: https://gradesfixer.com/free-essay-examples/digital-security-risks/
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

close

Thanks!

Your essay sample has been sent.

Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

thanks-icon Order now
boy

Hi there!

Are you interested in getting a customized paper?

Check it out!
Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.