Analysis of Cybersecurity Laws and Regulations for University A

Verified

Added on  2025/05/03

|15
|2808
|282
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Cyber security law, security law,
regulation and policy
Page | 1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction......................................................................................................................................3
What laws or regulations the University A needs to comply with?................................................4
What are the obligations of University A under those laws / regulations / other related policies
and procedures?...............................................................................................................................5
Why are those obligations important? If breached, what is the consequence?................................6
What does University A / this workforce need to do demonstrate the compliance?.......................7
Any other areas that need to be considered in the initiative?..........................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10
Page | 2
Document Page
Introduction
This report examines cyber security from the perspectives of the legal, technology and politics. It
also covers government rule and regulations that cover both the public and private sector. It also
assists to deal with the challenges of both the cyber and digital worlds. It develops understanding
and enhancing knowledge in the field of cyber law. For implementing the new student
management system in Australia, University A focusing on overall compliance requirements so
as to improve the market condition of the University. For reducing the reputational risk for
advisers findings in relation to the compliance or to identify any breaches of the security. In this
context, this assignment consist the relevant rule and regulations that need to comply and
followed by University A and are also obligated to abide by the laws and regulations. Further, it
also consist the other areas that need to be complied by taking as an initiative by University A. In
relation to the privacy, this assignment consist discussion on cyber security law, security law,
regulation and policy that needs to be complied by University A.
Page | 3
Document Page
What laws or regulations the University A needs to comply with?
To prevent and reduce cyber security threats, as a security consultant University A needs to
comply with the various laws or regulations. In relation to the cyber security there are various
acts enacted for this purpose are the Privacy Act, the Security of Critical Infrastructure Act,
2018, the Crimes Act, 1914, Spam Act, the Criminal Code, 1955, Australian Privacy Principles
(APP) and the Telecommunications (Interception and Access) Act, 1979. It is important that the
University must comply with all these laws for preventing security related threats and risk.
The Security of Critical Infrastructure Act, 2018 is enacted to manage the security and its
related risk of the overall nation. This act is a concern with the changes in technology which
enhance the connectivity with cyber and its infrastructure (Allodi & Massacci, 2017). The
government of Australia abides with the responsibility to provide essential services to the
community of Australia.
In accordance with the Australian Privacy Principles (APP) regulate the use, holdings,
disclosure, and collection of the private information that is mentioned in the records. This law is
applicable to both governments as well as private organizations where turnover exceeds AUD 3
million (Anwar, et. al., 2018).
Cyber Crime Act offers regulation in relation to the offenses related to the computer and internet
such as damaging of data, unlawful and unauthorized access of data, cyber stalking, computer
fraud, child pornography and harassment (Broadhurst, et. al., 2018).
Spam Act consists of the scheme for regulating the commercial email and other electronic
messages. It also assists in restricting the unauthorized electronic messages along with some
exceptions. A provision of this act is regulated by the Australian Communication and Media
Authority.
Telecommunications (Interception and Access) Act the main objective is to ensure the
individual's privacy who prefer to use the communication system of Australia. The second
purpose of this act is to specify the circumstances under which lawful communication takes
place. This act assists in regulating the telecommunication data in Australia.
Page | 4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The Privacy Act 1988 assist in regulating the process in which the data consist the personal
information remains secure and protected. It imposes the obligations of the organization of the
private sector as well as government agencies (Watts & Casanovas, 2018). This act assists in
protecting personal information for further any modification and disclosure.
Page | 5
Document Page
What are the obligations of University A under those laws/regulations/ other
related policies and procedures?
Under the above laws, as a security consultant, University A is obliged to take the appropriate
measures to deal with cyber security measures. In the technical field, University A is obliged to
take measure for internal fraud. For this, the University use smart devices to control over the exit
and entry with the helping the biometric system and authorization card that assist in determining
the wrong and illegal activity. For the effective cyber security system measure, it is important to
maintain a proper backup.
For improving the cyber system security measures it is important that the University must
comply with the prevention control and compliance of the rules and regulations. Under
Telecommunications (Interception and Access) Act it is important that the University A ensure
that the communication should be protective and secure so as to maintain the privacy of the
information. Under the Privacy Act 1988, University A takes appropriate action to protect the
confidential information by protecting it from any further modification and alternations. Further,
University A is obliged in accordance to the provisions under the Australian Privacy Principles
(APP) by taking the assistance of the government for securing the database system of the
University as well as develops such strategies that support in detecting the wrong activity
(Carron, et. al., 2016).
Further, the University should keep its staff informed about the measure of the cyber-related
security methods by performing the regular assessments for determining the real threats in
relation to the cyber security (Baskerville, et. al., 2018). University should assess the risk and
implementing the effective policies and procedures to maintain the internet risk.
Further, it is important that the University should inform about the changing trends in the cyber
security by performing the regular band daily assessment to protect the staff and its students
from the unauthorized access of the confidential information of the data and cyber-related
threats. University also frames effective and efficient policies and procedures for managing the
cyber-related risk.
Page | 6
Document Page
University A also complies take appropriate measure for handling the privacy of information by
ensuring the security of data. It is important that the University maintain the standard for the
enforcement of the law. Further, develop the capabilities that support in taking preventive
measures. It is important that the University A must ensure that there will be a proper exchange
of information by forming the agreement with other partners for increasing the capabilities of
cyber security and provide training opportunities so as to reduce the threat in relation to the cyber
security. University A adopts the digital technology that helps out in driving innovations for
developing the capabilities to minimise the threats and breaches in relation to cyber security.
Page | 7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Why are those obligations important? If breached, what is the consequence?
The abovementioned obligations are important for the workforce of the University A for
ensuring the expansion that assist in dealing with cyber related crimes. The abovementioned
rules and regulations of the government assist in law enforcement and raising awareness among
the public. Further, the abovementioned obligations are also necessary to gain knowledge in
relation to reducing of cyber and technology-related risk. It is also imperative for better security
information and abides with the oversight responsibilities of the University A for its workforce.
Further, the above obligations are important for maintaining security levels.
It is imperative to abide by the obligations of the University so as to reduce and minimise the
cyber security threats. If the above obligations are not properly followed, it causes major loss and
damage to the University A and it also increases the possibilities of disruption in reputation and
privacy of the confidential information of the University A which also includes loss of life also.
The threat in relation to the information technology on the valuable information of University A
is at risk (Webb & Dayal, 2017). It also increases the chances of loss of data due to unauthorized
access over the University data. When University put its confidential and private data on the
cloud, it directly impacts the security and privacy of the data. With the breach of the government
laws and regulations, University A is subject for the payment of fines, penalties, fees, and
punitive consequences. Further, with the breach of the cyber security obligation by the
University pronounced several consequences are as follows:
Damage to reputation
With the breach of security obligations, it causes loss of trust among the people and the majority
of the students not consider University A as their preferences. It directly causes the devaluation
of the University brand and affects the ability to attract the best students for the University.
Financial losses
From the breach of the data, it becomes difficult for the organization to recover all the expenses
and losses that are occurred due to a breach of the confidential data of the organizations. It
Page | 8
Document Page
becomes difficult for such Universities top to receive the damages that are caused due to the loss
or breach of the imperative data.
Theft
Cyber crimes not only impact the monetary losses of the Universities but also the lead to the
stolen of the confidential data of the Universities this equally impact over the University and its
reputation. With this breach University A also losses efforts in the field of research and
development or the copyrighted material of University.
Page | 9
Document Page
What does University A / this workforce need to do demonstrate the
compliance?
For implementing the security practices in relation to the cyber crimes University A need to
comply with all the rules and regulations enacted by the government. For demonstrating the
compliance, workforce supports in fulfilling the mission of the by coordinating with the
government rules and regulations through change and innovation and bringing the skilled
professional for cyber security that supports to keep the nation secure (Mohammed & Nawangb,
2018). Further, it is important that the skilled cyber security workforce is developing by the
university that is capable of designing, implementing, developing and maintaining the defensive
strategies so as to maintain cyber security. It is important that the workforce successfully
implement their missions that are connected with the cyber space. For the successful compliance
of the provision of cyber security, the workforce needs to be properly trained so as to enhance
skills, abilities, and knowledge to take preventive action under this head. To demonstrate the
compliance it is important that the workforce must be focused on the technical issue so as to
address the risk in relation to the cyber security to maintain the process of managing the risk.
To regulate the cyber security compliance it is important that the workforce identify the critical
gaps in the staffing of the cyber security and take appropriate action to make the weaker section
more strong (Martellini, et. al., 2017). It is important to provide guidelines to the workforce for
development and education to handle cyber security issues. It is important that proper training
and certification are provided to the workforce effectively and efficiently.
In this context, University A formulates various penal provisions in case of noncompliance with
the cyber security laws and its provisions. For this purpose, it is important that the University A
provide properly training and education to the workforce for valid compliance with the cyber
security laws and take appropriate measure to minimise the threat in relation to the cyber
security.
Page | 10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Any other areas that need to be considered in the initiative?
There are other areas that are needed to be considered by the University A in NSW, Australia. As
they are implementing the new student management system, so as to manage the higher
education services. Various other areas which are not focused by the university that can impact
in the failure of the plan and the can even result in loss of the students from the university
(Randall & Kroll, 2016). These areas include the following:
The cost of implementing the initiative: the university should consider the factor that the cost
of implementing the new system for student management would be high in its initial year. As
this system would be new hence in the initial year the cost that would be allocated for the
purpose of the introducing the plan would not be able to cope up with the traditional technique.
But after some years this would help in reducing the cost of managing the students.
Risks related to information leaks: The University should consider the area which includes the
risk that is related to the leak of the information of the students. The protection of the data from
hackers is considered to be one of the important elements. This is seen that the threat comes in
the form of phishing and malware which helps in infiltrating the data that is available with the
university (Selby, 2017). As this is seen that the information of the students remains online and
hence this can result in the exploitation of the information that is available online. This can also
result in having a legal compliance issue for the university.
Training of the staff: the university would look into consideration to train the staff for the new
student management system to be implemented. This is important as the staff is not able to cope
up with the change hence this result in a problem for the employees to manage the new function.
As the staff is not compatible with the new way of management hence they would require a
training scenario which would help in controlling the management system within the
organization.
Security Management: the university must look into the security management for the available
information. This should be considered by the university as the data that is available online needs
Page | 11
Document Page
to be protected from the viruses as this may get damaged. Various security patches and the
software’s should be used by the university to avoid the risk that is related to making the
management system online.
Page | 12
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]