Question

Law

employees regarding the risk of cybercrime attacks.”

Nedbank clients were in shock on Thursday morning, after it was reported that 1.7 million customers may have had their data breached. Nedbank client's identity numbers, addresses and contact details may have been breached after a "data security incident" at a direct marketing company. According to a statement, Nedbank said they have investigated a data security issue that occurred at the premises of a third-party service provider, namely Computer Facilities. Computer Facilities is a direct marketing company that issues SMS and email marketing information on behalf of Nedbank and a number of other companies. A subset of the potentially compromised data at Computer Facilities included personal information (names, ID numbers, telephone numbers, physical and/or email addresses) of some Nedbank clients. No Nedbank systems or client bank accounts have been compromised, the banking institution said. "Once we became aware of the issue, we engaged as a matter of urgency with the service provider and leading forensic experts to conduct an extensive investigation.” It should be noted that Nedbank identified the data security issue at Computer Facilities as part of our routine and ongoing monitoring procedures. "We have moved swiftly to proactively secure and destroy all Nedbank client information held by Computer Facilities. Information from Nedbank Retail relating to approximately 1,7 million clients were potentially affected of which 1,1 million are active clients." "This incident is isolated to the third-party service provider’s systems. As a further precautionary measure, Computer Facilities’ systems have been disconnected from the internet until further notice.” “We regret the incident that occurred at the third-party service provider, namely Computer Facilities and the matter is receiving our urgent attention. The safety and security of our clients’ information is a top priority. We take our responsibility to protect our client information seriously and our immediate focus has been on securing all Nedbank client data at Computer Facilities, which we have done. In addition to this, we are communicating directly with affected clients. We are also taking the necessary actions in close cooperation with the relevant regulators and authorities,” Nedbank CEO Mike Brown said. Nedbank Group Chief Information Officer Fred Swanepoel said: “Computer Facilities did not have any links to our systems. Our team of IT specialists and external cyber security experts have been working continuously with them since we became aware of this matter. Clients’ bank accounts have not been compromised in any manner whatsoever and clients have not suffered any financial loss. Nedbank remains vigilant in its efforts to contain cybercrime.” Nedbank said that they have advised Computer Facilities of their obligation to notify any of their other customers potentially impacted by the incident. Clients’ bank accounts are not at risk and they do not need to take any further action other than continuing to be vigilant against attempts at fraud.

Source: https://www.iol.co.za/personal-finance/my-money/banking/warning-if-you-are-a-nedbank-client-your-data-may-have-been-breached-42651750 [Accessed on 17/02/2020].

QUESTION 1 (20) As stated above, “South African information technology experts have warned businesses and consumers to back up their databases and to train employees regarding the risk of cybercrime attacks.”

In light of the above, advise businesses and consumers in South Africa on some measures and techniques which can be adopted in order to help suppress such cybercrime attacks as mentioned above.

QUESTION 2 (20)

As stated by the Nedbank CEO, Mr Brown: “Our immediate focus has been on securing all Nedbank client data at Computer Facilities, which we have done. In addition to this, we are communicating directly with affected clients. We are also taking the necessary actions in close cooperation with the relevant regulators and authorities.”

Critically discuss whether Nedbank had indeed taken appropriate steps after becoming aware of such data breach. If not, suggest other steps which should have been taken after becoming aware of the data breach.

QUESTION 3 (20)

In light of the above, critically discuss the effectiveness of South African legislation which governs privacy and the protection of private data in South Africa.


0 0
Add a comment Improve this question Transcribed image text
Request Professional Answer

Request Answer!

We need at least 10 more requests to produce the answer.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the answer will be notified once they are available.
Know the answer?
Add Answer to:
Law
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • IT Law

    employees regarding the risk of cybercrime attacks.”Nedbank clients were in shock on Thursday morning, after it was reported that 1.7 million customers may have had their data breached. Nedbank client's identity numbers, addresses and contact details may have been breached after a "data security incident" at a direct marketing company. According to a statement, Nedbank said they have investigated a data security issue that occurred at the premises of a third-party service provider, namely Computer Facilities. Computer Facilities is a...

  • "Each day before leaving our homes, we protect the property within. By locking our doors, closing...

    "Each day before leaving our homes, we protect the property within. By locking our doors, closing our windows, or activating our security systems, we go to great lengths to ensure that our homes have the necessary safeguards in place to thwart potential intruders and those who may try to steal our personal and precious belongings. When it comes to our confidential personal information, however, many of us fail to realize that this information is readily available and able to be...

  • ( Need 100 words summary this Article) Target’s headquarters in Minneapolis. A settlement by the company...

    ( Need 100 words summary this Article) Target’s headquarters in Minneapolis. A settlement by the company ended an investigation into how the data of millions of customers was compromised in 2013. By Rachel Abrams May 23, 2017 Target will pay $18.5 million to 47 states and the District of Columbia as part of a settlement with state attorneys general over a huge security breach that compromised the data of millions of customers. The settlement ends a yearslong investigation into how...

  • Outsourcing Vendor, SaaS Client Optimizing the allocation of resources for IT services sometimes creates unexpected situations....

    Outsourcing Vendor, SaaS Client Optimizing the allocation of resources for IT services sometimes creates unexpected situations. This is a story of a leading vendor of IT outsourcing that decided to outsource one of its own IT functions. More accurately, it relies on software as a service. Siemens AG is a German-based global corporation and one of the world's largest firms. It specializes in electronics and engineering. It employs 475,000 people in 190 countries, and reported revenue of $107.4 billion in...

  • Cybersecurity Assessments Passwords are very important to protect our data and the various technologies we use...

    Cybersecurity Assessments Passwords are very important to protect our data and the various technologies we use on a daily basis to communicate. For this discussion I want you to go online and find a recent article that talks about an incident/hack that happened to an individual or a company that involved the use of passwords. Many people or organizations are not careful enough when it comes to protecting their systems and data. It is the responsability of the pen tester...

  • The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised...

    The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised systems and environment integrity, and unauthorized access. However, the information held within the equipment may be much more valuable than the equipment itself. Which controls we choose to use to mitigate risks to our information depend not only on the value we assign to that information, but also on the dynamic state of that information. Our data exists in one of three states: at...

  • 58. The nurse gives an inaccurate dose of a medication to a client. Following observing the...

    58. The nurse gives an inaccurate dose of a medication to a client. Following observing the client, the nurse completes an incident report, calls the health care provider, and then notifies the nursing supervisor of the medication error. The nurse who administered the inaccurate medication dose understands which about the incident report? a. Is a method of promoting quality care b. Will result in temporary job suspension c. Is reported to the State Board of Nursing d. Will be a...

  • The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of...

    The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of several banks that are a part of the SWIFT network. The case is an example of the importance of information system controls. Explain some of the security risks associated with information systems as well as some security and control measures that can be implemented to protect against these security risks. Hackers Attack the SWIFT Global Banking Network SWIFT, which stands for Society for Worldwide...

  • The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks....

    The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks. They show where individuals are, where they’ve been and who they might have talked to or even touched — potentially offering maps to find infected people and clues to stopping new ones. But gaining access to this data, even amid a global pandemic, is made complex by the legal and ethical issues surrounding government access to information that can reveal intimate details about citizens’...

  • 6. Which of the following is NOT a component of cultural humility? Your answer - INCORRECT...

    6. Which of the following is NOT a component of cultural humility? Your answer - INCORRECT a. Recognizing that conversations about cultural identity make clients uncomfortable b. Recognizing you will never know everything and committing to continued growth O c. Being open to exploring your client's cultural identity O d. Being open to exploring your own cultural identity 7. Which of the following is an unharmful example of positive bias? Your answer - INCORRECT a. A provider sympathizes deeply with...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT