Several massive leakages of customer and employee data this year—from organizations as diverse as Time Warner, the American defense contractor Science Applications International Corp and even the University of California, Berkeley—have left managers hurriedly peering into their intricate IT systems and business processes in search of potential vulnerabilities.
“Data is becoming an asset which needs to be guarded as much as any other asset,” says Haim Mendelson of Stanford University’s business School, “The ability to guard customer data is the key to market value, which the board is responsible for on behalf of shareholders”. Indeed, just as there is the concept of Generally Accepted Accounting Principles (GAAP),perhaps it is time for GASP, Generally Accepted Security Practices, suggested Eli Noam of New York’s Columbia Business School. “Setting the proper investment level for security, redundancy, and recovery is a management issue, not a technical one,” he says.
The mystery is that this should come as a surprise to any boss. Surely it should be obvious to the dimmest executive that trust, that most valuable of economic assets, is easily destroyed and hugely expensive to restore—and that few things are more likely to destroy trust than a company letting sensitive personal data get into the wrong hands.
The current state of affairs may have been encouraged—though not justified—by the lack of legal penalty (in America, but not Europe) for data leakage. Until California recently passed a law, American firms did not have to tell anyone, even the victim, when data went astray. That may change fast: lots of proposed data-security legislation is now doing the rounds in Washington, D.C. Meanwhile, the theft of information about some 40 million credit-card accounts in America, disclosed on June 17th, overshadowed a hugely important decision a day earlier by America’s Federal Trade Commission (FTC) that puts corporate America on notice that regulators will act if firms fail to provide adequate data security.
36.The statement “It never rains but is pours” is used to introduce
[A] the fierce business competition.
[B] the feeble boss-board relations.
[C] the threat from news reports.
[D] the severity of data leakage.
37.According to Paragraph 2, some organizations check their systems to find out
[A] whether there is any weak point.
[B] what sort of data has been stolen.
[C] who is responsible for the leakage.
[D] how the potential spies can be located.
38. In bringing up the concept of GASP the author is making the point that
[A] shareholders’ interests should be properly attended to.
[B] information protection should be given due attention.
[C] businesses should enhance their level of accounting security.
[D] the market value of customer data should be emphasized.
39. According to Paragraph 4, what puzzles the author is that some bosses fail to
|