Posts

Showing posts from August, 2023

Enhancing Personal Data Protection After the LinkedIn Breach

  In a concerning development, LinkedIn has fallen victim to an extensive data breach, resulting in the exposure of sensitive information belonging to more than 500 million users. This breach entails the unauthorised scraping of data from the platform, with the compromised dataset now up for sale on the dark web. The leaked information encompasses critical details such as email addresses, phone numbers, workplace particulars, full names, account IDs, links to associated social media profiles, and gender identification. The data breach culprits have chosen to publicise their actions through an unknown user on a hacker forum. This individual has released a fraction of the breached data, comprising records from two million users, as evidence of the incident. The hacker responsible for this breach is demanding a significant sum, denominated in four digits in USD, as payment for the compromised information, suggesting that the transaction may involve cryptocurrencies like Bitcoin. Alarmingl

Analysing the Juspay Cybersecurity Incident: Causes, Impact, and Responses

  Introduction: The compromise of personal information including email addresses, full names, phone numbers, and credit/debit card details of more than 100 million Juspay users has been reported by a cyber researcher, who discovered that the stolen data was up for sale on the dark web just last week. Juspay, a Bangalore-based startup, facilitates over 4 million transactions daily, amounting to Rs 1000 crore, across various e-commerce platforms like Amazon, Swiggy, Ola, and others. The  cybersecurity  researcher, Rajshekhar Rajaharia, uncovered the data breach in early January. Acknowledging the breach, Juspay, an Indian online payment platform, disclosed that it had experienced a data breach involving customer information in August. The announcement followed a day after an independent security researcher disclosed that a darknet forum was hosting data of numerous Juspay customers for sale. The breach is thought to have originated from a reused Amazon Web Services access key, which prov

UAE’s Vision for Secure Digital Privacy

  The   UAE Personal Data Protection Law   has marked a significant milestone in the nation’s journey towards bolstering digital privacy and safeguarding personal information. Announced on September 5, 2021, the law, officially known as the Federal Data Protection Law (UAE Data Law), has emerged as the UAE’s first comprehensive data privacy and protection legislation. This pioneering step is a vital component of the UAE’s Projects of the 50, an ambitious collection of economic and developmental initiatives aimed at celebrating the country’s 50th anniversary. The introduction of this law signifies the UAE’s commitment to fostering its growth, both economically and technologically, while ushering in a new era for data protection. The development of the UAE Data Law was characterised by meticulous consultation with major technology companies. H.E. Omar Bin Sultan Al Olama, the Minister of State for Artificial Intelligence, emphasized the global perspective taken during the drafting proces

Comparative Analysis of Data Protection Officer (DPO) Compensation: In-house vs. Outsourced

  Describe a DPO. The primary responsibility of the  data protection officer (DPO)  is to ensure that her business complies with all applicable data security regulations when handling the personal information of its employees, clients, suppliers, or other individuals (sometimes referred to as data subjects). Each must select a DPO in the EU foundations and organisations in accordance with the applicable Data Protection (Regulation (EU) 2018/1725). Several organisations in EU countries are required to appoint a DPO as on 25 May 2018 by Directive (EU) 2016/679. The process for choosing a DPO. Though intelligence and abilities must be taken into consideration when choosing a DPO, the ability to manage data should receive special attention. Additionally recommended is having a good understanding of how the firm operates. As a crucial component of a company, the DPO is in a prime position to ensure that the enterprise performs consistently. It is important that the DPO has unrestricted auth