
The Subtle Balance And Trade-Offs In Cyber Security (Part 2)
Last week we looked at the cyber trade-offs that businesses have to make as they enter online market. We paid particular attention to the balance between cybersecurity for businesses balanced against usability for the customer. Today, we will look at cost and privacy trade offs.
Security vs. Cost
The question in Cyber security is not that of cost since it is a presumed variable to the equation. Companies now must think of the price associated with the development or integration of the control itself (for example, the cost of a firewall) as an investment in the core business of the company. Cyber security has now become a core function for businesses.
Security vs. Privacy
Privacy trade-offs have also been necessary as the balance has proved delicate. Confidentiality, integrity, and availability of data are the major considerations as far as data safety goes. The correct balance of these three principles will require tempering of each concept to enable the other concepts be effective.
Most businesses have therefore ended up creating solutions which are either focused more on security than privacy or more on privacy than security. For example, banking systems, while being secure to a good extent also allow for external inspection which is a data privacy breach. It would be foolhardy to have extremes of either in Cyber security. Each value has to give way to the other depending on where the greatest risk lies.
In conclusion, the only thing to be said is this: that you can never be too careful. Cyber attacks and security breaches have become rife lately, and as long as you have done the best you can possibly do as a business to protect your system and client data, then you will have offset the ‘reasonable man/woman’s’ test. A business is not expected to go over and above with it’s security measures, to a point that the service it seeks to provide digitally becomes inaccessible on account of it’s many security verifications.
It is a question of Reasonableness
For lawyers defending clients in Cybersecurity matters, the basics of Negligence will come into play. There is obviously a duty of care that businesses owe their clients when it comes to personal data. The question will be whether the business took such measures that an ordinary business, engaging in the same industry would take to protect its systems. The balance between security, convenience, cost and privacy will be tested on the standard of reasonableness.
There you have it ladies and gentlemen.
The more things change, the more they remain the same. Because, who would ever have thought that the depths of cybersecurity would lead us back to first year Torts? Shout out to @ayamunda (lecturer), the one and only [emoji here].
-
The Fin-Tech Take Over
What exactly is Fin-Tech? Banks have gone head to head, outdoing each other with innovation. It s... -
What In The World Is ChatGPT?
(And why should you care?) Of course you have interacted with bots before. For example, when ... -
Tech Lingo For Lawyers
You know how someone throws in some Tech word in a conversation and in that one short moment you dec... -
The Subtle Balance And Trade-Offs In Cyber Security (Part 1)
Tradeoffs. That sounds familiar, but you can’t quite place it. Never mind, I’ll dive right into it. ... -
How To Craft A Winning Innovation Strategy
Where do we start? Yes, of course we have to start somewhere. Lawyers may lead the pack in more a... -
How Far Can Lawyers Go In Adopting Legal Tech?
The legal profession has historically been considered a conservative field and as a result, lawyers ... -
Drafting Bug Bounty (Ethical Hacking) Agreements
Where does the Lawyer come in? The relationship between a corporate like Safaricom and an individ... -
Data Controller Vs. Data Processor
The Data Protection Act requires that all Data Controllers and Processors be registered. The Act ... -
Ethical Hacking (Bug Bounty Hunting): What Does It Mean?
New word alert: Bug Bounty Hunting = Ethical Hacking. Last week, I was invited to a Tech Conferen... -
Internet Privacy: A Lawyer’s Guide To Online Privacy (Part 2)
1. Avoid torrent or piracy web sites He...he…yes. There is something called ET (Entertainment... -
Internet Privacy: A Lawyer’s Guide To Online Privacy (Part 1)
Did you know that most Internet Service Providers (ISPs) are tracking, storing and mining your onlin...