0% found this document useful (0 votes)
31 views6 pages

Cyber Security in Organizations

Uploaded by

stephen kanyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views6 pages

Cyber Security in Organizations

Uploaded by

stephen kanyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1

Cyber Security in Organizations

Course Name
Name
University
Address
Date
2

Cyber Security in Organizations

The world has gone digital, and the organizations have to go along to maintain a

competitive edge in their industry (Susan & Novianti, 2019). This means constantly evolving to

align with the opportunities brought about by technology. Technology in businesses makes them

more efficient and economical and even adds security to a business (Susan & Novianti, 2019).

However, this advantage has its limitations. Automated internal processes, communications

between the organizations and the clients, and the use of the cloud have exposed the

organizations to cyber-attacks. The USA was the most attacked country in 2018, leading to an

88.78 bn USD in information technology (Johnson, 2021). This paper reviews the cyber security

provisions in the USA and in Uber, the risks they are exposed to, their impact on them, and the

legislation used to maintain order.

Uber is an app platform founded in 2009 in the USA that connects riders with cab drivers

willing to serve them. Ergo, uber relies heavily on information technology across diverse parts

of its operations. Their efficiency depends on technology, giving them a competitive edge

compared to taxis. This ranges from services like processing payments, linking the cab drivers

and the passengers, communication in the organization, and communication between their

service providers, i.e., apple and google. Uber is a popular platform and has vast amounts of

data from its employees, customers, and Uber drivers.

The USA lacks a federal law governing data protection for its citizens, but some states

have developed them. Since uber operates across all the states in the USA and the international

market, several cyber security laws apply to them. These include; the US Code chapter 98,

which requires all public companies such as uber currently to provide accurate financial

statements; SEC CFR part 248, subpart A, which requires them to have appropriate cyber
3

security measures; 18 U.S. Code Chapter 119 and 18 U.S Code Chapter 121 which forbids the

use of communication without authorization; the consumer privacy protection act of 2017 which

ensures privacy and protection of sensitive personal information of consumers and lastly the

GDPR which protects personal information and data security of EU citizens and residents from

organizations regardless of where their operations are based. In addition, there are provisions

like protecting personal data's privacy and transborder flows (1980 and 2013). Uber is also

ethically obligated to maintain accuracy when collecting data, not storing it longer than

necessary, and protecting their users' sensitive data.

According to Uber’s ESG report (2021), Uber has measures in place to govern data

privacy and security, which is the target of cybercrimes for Uber. These measures include a

collection of only the necessary data, maintaining the transparency of their data practices, giving

the users the choice of the data they want to share, and safeguarding the data collected.

According to Uber’s report, their information security program is based on ISO 27001/2 across

all platforms to maintain standards, security, and confidentiality.

Specialists should investigate cybercrime cases because the evidence is volatile and can

be easily lost. Digital forensic applications should be employed to gather as much evidence as

possible. Per the provisions of Cybercrime module 4, the steps followed during such an

investigation are identification, collection of the evidence from physical or digital, acquisition of

the evidence, and preservation. Cybercrime has diverse impacts on the victim organization.

This can occur regarding the direct cost of replacing the compromised hard drives and software,

paying the ransoms, and fines and compensations. Uber was fined $148m for the security breach

they incurred and $100,000 in ransom for stolen information (Guardian, 2018). In addition to

direct costs to the organizations, there is damage to reputation, which reflects the financials of
4

the said organizations (Paoli et al., 2018). This is a result of a loss of integrity. When there is a

breach in cyber security, the operations are halted, and, in some cases, there is a loss of valuable

data for the company (Paoli et al., 2018). Some of the appropriate measures that should be in

place to prevent this occurrence are educating staff on the organization’s security measures and

protocols, which can avoid breaches through phishing and restricted employee data access.

Employees should have access to the data necessary to perform their roles; they also need to

protect the physical devices that have access to the organization’s platforms (Irwin, 2021).

Finally, security programs installed should be in accordance with ISO 27001/2.

For better services, Uber needs to share information with its users, both the drivers and

the customers. There are measures in place governing the information-sharing process. First,

uber shares information with its users upon their request. This might be sharing with friends an

ETA, sharing with third parties, i.e., for services and emergency services. In addition, the data

can be shared with the account owner when a person uses their account to request services. This

process is guided by the privacy principles built into its services. The data is put into ethical use.

Cyber laws are designed to deal with the legal issues of internet use. The Federal Computer

Fraud Act (CFAA) is the statutory mechanism used to prosecute cybercrimes in the USA. This

accounts for both criminal offenses and penalties. It is designed to prevent unauthorized access,

which includes exceeding the access provided, accessing a protected computer with the intent to

harm, damaging data from a computer intentionally or as a result of reckless behavior, passing

threats, extortion, and trafficking passwords. It extends to Electronic Communications

Protection Act (ECPA) which protects stored or communication in transit. Hacking has a

penalty of up to ten years in prison, similar to denial of services and planting of malware.

Phishing is punished with a sentence of up to twenty years. Other crimes that are covered
5

include stealing an identity. Possession of hardware or software used to perpetrate crime,

electronic theft, and any other activity adversely affects the security, confidentiality, or integrity

of information technology systems and data.

In conclusion, while there is an increase in the need to evolve with technology, there is

also a need to review the security of the information technology of the system. Firms like uber

have been victims of cybercrime and have gotten punished two-fold for the mistake. Cyber laws

cover every crime base, but it is up to the organization to ensure they do not fall victims to

cybercrimes. This is because its impact is more significant than just the direct costs incurred.
6

References

18 U.S. Code § 1030 - Fraud and related activity in connection with computers. (n.d.). LII /

Legal Information Institute. https://www.law.cornell.edu/uscode/text/18/1030

Irwin, L. (2021, December 2). 5 ways your organisation can suffer a data breach. Vigilant

Software - Compliance Software Blog.

https://www.vigilantsoftware.co.uk/blog/understanding-the-7-different-types-of-data-

breaches

Johnson, J. (2021, April 29). U.S. government and cyber crime - Statistics & Facts. Statista.

https://www.statista.com/topics/3387/us-government-and-cyber-crime/

#dossierKeyfigures

Paoli, L., Visschers, J., & Verstraete, C. (2018). The impact of cybercrime on businesses: a novel

conceptual framework and its application to Belgium. Crime, Law and Social Change,

70(4), 397–420. https://doi.org/10.1007/s10611-018-9774-y

Reporter, G. S. (2018, September 26). Uber fined $148m for failing to notify drivers they had

been hacked. The Guardian. https://www.theguardian.com/technology/2018/sep/26/uber-

hack-fine-driver-data-breach#:%7E:text=Uber%20fined%20%24148m%20for%20failing

%20to%20notify%20drivers%20they%20had%20been%20hacked,-This%20article

%20is&text=Uber%20will%20pay%20%24148m,a%20settlement%20announced%20on

%20Wednesday.

Susan, A., & Novianti, W. (2019). Benefits of Technology for Business. IOP Conference Series:

Materials Science and Engineering, 662(3), 032036.

https://doi.org/10.1088/1757-899x/662/3/032036

You might also like