0 0
Read Time:1 Minute, 20 Second

Massive dataloss and exploitation in Russia at the hands of Ukraine and their supporters lead to a knee-jerk response:

The State Duma voted in the third reading for amendments to the law “On Personal Data”.

Now corporations will be required to monitor cyber attacks and leaks of users’ personal information, as well as report each incident to regulatory authorities.

Earlier, Roskomnadzor and other regulators learned about incidents with data leaks from the media, Telegram channels or after user complaints.

However, experts believe that the new rules will not reduce the number of leaks.

The fact is that the so-called “IT-specialists” working for corporations do not even have the competence to detect leaks

And if we talk about such giants as the Yandex corporation, then their own employees trade user data.

The problem is also that Russian legislation does not define what is considered a personal data leak, and it is not clear which agency and according to what criteria will check, confirm and classify data leaks.

The law also does not indicate what is a new leak and how to understand that this is not the previous one.

This is very actively used by commercial corporations – such as:

  • “Mail of Russia” – which believes that the leak of phone numbers, addresses, full names and many other data “does not threaten the safety of customers”
  • “Delivery Club” – which hides leaks, and after they are discovered, dismisses that they are old
  • “Systems need to be built in such a way that confidential data is not collected in principle.

The whole point of privacy is anonymity.”

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence