Introduction to Compensation for Information Leakage Damages
29 June 2023Amanda J. Brook Senior Product Manager
Summary The Internet era means information sharing, but while we enjoy the convenience of information sharing, we are always threatened by personal information leakage. Leakage of personal information is tantamount to exposing an ordinary person to the public eye, and we are likely to be subject to various violations such as targeted marketing, fraud, and privacy violations in the next second. Therefore, it is very necessary to understand the compensation for information leakage damages.
Relevant Laws Regarding Information Leakage Damage
According to Article 286-1 of the “Criminal Law” (crime of refusing to perform information network security management obligations), a network service provider fails to perform information network security management obligations stipulated by laws and administrative regulations, and refuses to make corrections after being ordered by the supervisory department to take corrective measures. Under any of the following circumstances, he shall be sentenced to fixed-term imprisonment of not more than three years, criminal detention or public surveillance, and shall be fined concurrently or solely:
(1) Causing a large amount of illegal information to spread;
(2) Causing user information to be leaked, resulting in serious consequences;
(3) Causing the loss of evidence in criminal cases, where the circumstances are serious;
(4) There are other serious circumstances.
Information leakage case
Facebook faces $1.6 billion fine for leaking personal photos of 7 million users
In December 2018, social networking giant Facebook exposed personal photos of nearly 7 million users in a security breach. It has launched an investigation into whether the security breach complied with the relevant provisions of the General Data Protection Act (GDPR). Some of the exposed photos were photos that users had never shared on the social network.
Employees of a cooperative company leaked 7 million pieces of anti-counterfeiting data, and a well-known wine company lost more than one million
In February 2018, a certain police cracked down on a counterfeit case of well-known wine. The employees of the cooperative company took advantage of their positions many times to steal anti-counterfeiting and traceability data of a well-known wine company by taking pictures and directly copying them with a USB flash drive, and leaked them. According to calculations, the leakage of the anti-counterfeiting database directly caused the wine company’s economic loss of about 1.057 million yuan.
III Safety insurance for information leakage
Network security risk has become a potential hidden danger that cannot be ignored at present. In fact, cyber attacks and data leakage incidents occur frequently, and companies suffering from cyber attacks often face huge economic losses and reputational risks. In order to ensure the stable operation of their own network systems, enterprises are also constantly increasing their attention and attention to their own network security. Relevant data show that from 2014 to 2017, companies around the world spent an average of US$700,000 on daily network security defense.
As the risk of cyber security incidents is rising, insurance companies have also begun to deploy in this field. Since 2015, major insurance companies have launched related network information security insurance products. Judging from the terms of relevant products, the most basic coverage of cyber security insurance products generally includes sensitive data leakage, hacking, computer viruses, employees maliciously destroying data or mishandling data, data theft, network security system failure, computer system accidents Third-party claims or business interruptions caused by them, as well as ransom related to cyber extortion, to hedge against losses caused by information leakage.
How to protect the security of confidential information?
Encrypt Confidential Files with Renee SecureSilo
Renee SecureSilo It is a software that focuses on computer file and folder encryption. It has multiple encryption functions such as encrypting files, protecting USB, and hiding files.
Easy to modify – the software’s virtual disk can be compared to a U disk, which can be opened and closed at any time without leaving any traces of use. Moreover, it is not necessary to wait for a long time to modify the files in the virtual disk, and the modification or addition or deletion of files can be saved.
Large capacity – Because SecureSilo uses virtual confidential disk technology, a large number of confidential files can be stored in one or more virtual disks. Files larger than 4G can be stored as long as the virtual disk is formatted as NTFS.
Difficult to crack – Due to the proprietary format of the virtual disk and the use of advanced AES256 encryption technology, there is currently no program to crack this technology on the market.
High Concealment – You can disguise virtual disk files as other files to avoid malicious scanning. In addition, the software also has an eye-catching floating frame, which allows you to close all virtual disks and exit the program at any time, ensuring your privacy.
Renee SecureSilo – Encrypt Confidential Data
Encrypt files in seconds Encrypt files with virtual encrypted disk and whole process can be finished in 1 second.
User friendly Concise interface helps users master the software in short time.
1. Download and install Renee Secure Silo. After the installation is complete, you need to set a password and enter an email address. After that, every time you open the software, you need to enter a password to protect your privacy.
2. Click Create Private Disk in the encrypted file to create a new encrypted folder.
3. Set a name for the private disk, specify the creation location, and click Next.
4. Set a new password and confirm the password for the private disk, and then click Next.
5. Select “Select Size”, set the capacity of the private disk, and click “Next”.
6. Wait for the private disk to be created, then click Finish, and the private disk is created successfully. Then add the folder you need to encrypt to the private disk, so that the folder can be encrypted and locked.
When the user wants to open the file on the private disk for decryption, what should he do?
First, select the encrypted folder and click “Open” in the tab. Enter the password in the pop-up dialog box, and click Open to unlock.
Prevent information leakage with Renee USB Block
Renee USB Block It is a USB port protection software, which can lock specific programs or restrict browsing of specific websites in the form of passwords. Moreover, the program is easy to operate, and can easily prevent unauthorized external devices from being connected to the computer, and can prevent personal information on the computer from being leaked out.
Renee USB Block – Safe and Effective Solution to Protecting USB Port
Easily use Simple operations fit green hands and professionals.
Prevent from privacy leak Unauthorized external devices cannot run or obtain any information in PC.
Control and lock Users can lock devices, websites, applications and USB ports.
Monitor and logs Users can select the target directory to monitor and generate the history.
Self protection Lock itself if users enter the wrong passwords 5 times. Notification will be sent once wrong password entered over 5 times and password change. Password is also necessary when uninstalling.
Easily use Simple operations fit green hands and professionals.
Prevent from privacy leak Unauthorized external devices cannot run or obtain any information in PC.
Monitor and logs Monitor target directory and generate the history.
1. Download and install Renee USB Block. After installation, you need to set a password and enter your email address, and then you need to enter the password every time you reopen the application.
2. Insert the USB disk into the computer, under the column of USB & CD lock, click Add to add the USB disk you think is trustworthy to the white list.
3. Check “Prohibit USB disk/write” or others. In this way, if other USB devices are not in the white list of USB Block, they will be blocked and cannot be read/written.
In addition, Renee USB Block can also lock websites, programs and devices, prohibit printing materials through printers, and set prohibition of accessing the network, etc.
summary
When our information is leaked, we must safeguard our own interests. Therefore, it is very necessary to understand the damages for information leakage and hedge the risk of information leakage. At the same time, we must also strengthen the encryption of important information. Here, we recommend you to use Renee SecureSilo and Renee USB Block to fully protect your information security.