{"id":1631,"date":"2005-07-05T00:00:00","date_gmt":"2005-07-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/05\/the-coming-web-security-woes\/"},"modified":"2021-12-30T11:39:43","modified_gmt":"2021-12-30T11:39:43","slug":"the-coming-web-security-woes","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/05\/the-coming-web-security-woes\/","title":{"rendered":"The coming Web security woes"},"content":{"rendered":"<p>Anyone who runs a Web site with registered users and receives income from it should be concerned.   The Specter-Leahy bill says that if that site&#8217;s list of user IDs or e-mail addresses is compromised, each registered user must be notified via U.S. mail or telephone.  Refusal to do so can be punished with $55,000-a-day fines and prison time of up to five years.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>That&#8217;s remarkable but not as extreme as the second requirement: The Web master or mailing list operator might have to &#8220;cover the cost&#8221; of 12 monthly credit reports of each person whose e-mail addresses was lost or purloined.<\/p>\n<p>For a popular site with 10,000 registered users, that would be a princely sum.<\/p>\n<p>Independent Web site owners should not be bankrupted by making them cough up that kind of cash: The penalty is unrelated to any harm.<\/p>\n<p>Other sections of the proposed law, called the Personal Data Privacy and Security Act, are highly rigid.  For example, anyone running an ad-supported Web site or mailing list with 10,000 or more registered users must &#8220;implement a comprehensive personal data privacy and security program,&#8221; create a &#8220;risk assessment&#8221; to &#8220;identify reasonably foreseeable&#8221; vulnerabilities, &#8220;assess the likelihood&#8221; of security breaches, &#8220;assess the sufficiency&#8221; of policies to protect against them, publish the &#8220;terms of such program,&#8221; do &#8220;regular testing of key controls&#8221; to test security, select only superior &#8220;service providers&#8221; after doing &#8220;due diligence,&#8221; and regularly &#8220;monitor, evaluate and adjust&#8221; security policies.<\/p>\n<p>Specter and Leahy probably intended to target large businesses that employ teams of corporate lawyers and would view this as just more government paperwork.   &#8220;We don&#8217;t want to place any undue limitations on mailing lists, Web sites, and so on,&#8221; Schmaler said.<\/p>\n<p>http:\/\/news.com.com\/The+coming+Web+security+woes\/2010-1071_3-5772012.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1631","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1631"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1631\/revisions"}],"predecessor-version":[{"id":4118,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1631\/revisions\/4118"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}