However, according to Murad Mustafayev, the legislation
Posted: Wed Jan 22, 2025 4:51 am
Yuri Drachenin believes that such a temptation is almost inevitable: "There are always risks of shifting responsibility, "looking for a scapegoat", although it is unclear how exactly they will shift responsibility to software manufacturers. Most likely, they will appeal not to the shortcomings of the software, but to the impossibility of proving where exactly and through whose fault the data leaked. Probably, the arguments about who is to blame may be revealed based on the results of the analysis of possible court cases. I would like regulators to be more loyal to companies that have taken all measures to protect personal bulgaria whatsapp number database data, ensured digital hygiene and worked with leaks. I will add that this applies not only to personal data, but also to information classified as a commercial secret. Now this topic is not given enough attention, but insiders have always been and will be, they use this information. Therefore, it is important for any organization to organize its work in a comprehensive manner: counteracting insiders, working within the organization and with software manufacturers, competent legal protection will ultimately reduce leaks to a minimum."
"With the growing number of data leaks, such a risk does indeed exist. However, it is important to understand that the ultimate responsibility for data protection lies with the company itself, and it must take care of data security regardless of who developed the programs or services used," warns Viktor Gulevich. "In this case, companies are required to impose increased information security requirements both on the purchased partner software and on the level of information security of the service providers themselves."
clearly states that only the personal data operator is responsible for the collection, processing, storage and, in turn, leakage of personal data: "Shifting the blame" to software developers will not lead to anything. On the other hand, unfortunately, it is often customary for companies to buy cheaper and only on paper. With the growing diversity of fraudulent schemes, personal data is a serious asset, and businesses should worry about their safety in order to avoid financial and reputational risks. That is why only correctly selected, competently implemented and configured information security tools guarantee the safety of personal data. But the costs of information security, unfortunately, belong to the category "by residual sign".
"For both the client and the vendor, there is only one parameter that removes all possible risks - certification. If the client adequately and correctly uses a certified encryption product, this means that the threats are assessed realistically, the risks are calculated and reduced, and the compromise of personal data is prevented," says Denis Sukhovey.
InfoWatch Group declined to comment.
"With the growing number of data leaks, such a risk does indeed exist. However, it is important to understand that the ultimate responsibility for data protection lies with the company itself, and it must take care of data security regardless of who developed the programs or services used," warns Viktor Gulevich. "In this case, companies are required to impose increased information security requirements both on the purchased partner software and on the level of information security of the service providers themselves."
clearly states that only the personal data operator is responsible for the collection, processing, storage and, in turn, leakage of personal data: "Shifting the blame" to software developers will not lead to anything. On the other hand, unfortunately, it is often customary for companies to buy cheaper and only on paper. With the growing diversity of fraudulent schemes, personal data is a serious asset, and businesses should worry about their safety in order to avoid financial and reputational risks. That is why only correctly selected, competently implemented and configured information security tools guarantee the safety of personal data. But the costs of information security, unfortunately, belong to the category "by residual sign".
"For both the client and the vendor, there is only one parameter that removes all possible risks - certification. If the client adequately and correctly uses a certified encryption product, this means that the threats are assessed realistically, the risks are calculated and reduced, and the compromise of personal data is prevented," says Denis Sukhovey.
InfoWatch Group declined to comment.