根据以下材料,回答26-30题
Now imagine, a hacker breaks into your computer network.The hacker steals your bank and tax records, your pictures and correspondence, but all in digital form.The hacker disappears, but not before handing over all of your data to an Internet file sharing site, which in turn makes the data available all over the world.Not only does the file sharing site refuse to return your data, but soon thereafter, individuals are disseminating your private pictures, emails and tax returns via their Twitter accounts.Indeed, they claim a constitutional right to do so.
This is the predicament faced by data breach victims:Data are not, and perhaps cannot be, subject to the same set of legal protections as tangible, physical property.Our laws have failed to keep pace with the ways in which our privacy depends on the security of electronic data.
Until we develop a clear framework for addressing the problem of stolen data, efforts to improve cybersecurity will be incomplete.Data breaches are inevitable.For most organizations, it is a question of when, not if, they will be struck.That unfortunate reality means that an effective approach to cybersecurity cannot focus solely on prevention.To be prepared, organizations must treat breaches as a certainty, take steps to minimize risks wherever possible, and make plans to contain the damage that is caused when breaches take place.
Our laws are not designed to address these challenges.Data breaches are generally followed by an open season on the victim's most sensitive information.Unfortunately, once hackers hand such data off to a third party, it may be impossible to recover or contain.There are stolen property laws in many states, but there are questions about whether such laws apply to information rather than physical property.And even where a law does apply, the First Amendment which guarantees rights of freedom of speech may still protect those who decide to publish the information.
If data breaches are indeed inevitable,the current situation is untenable.If we are serious about helping the individuals and organizations who are victims of data breaches, we can and must do better than a system that throws up its hands the moment information is stolen.
An effective regime against the data breach will require updating and rationalizing a set of overlapping and often contradictory laws relating to stolen property, consumer privacy, identity theft, copyright, trade secrets and more.That effort must find a way to balance cherished First Amendment values against the legitimate privacy interests that individuals have in the information that organizations hold about them, as well as the interests those organizations have in keeping their own information confidential.
The reforms described above will not be easy.But unless we find ways to address the frenzy that inevitably follows data breaches, our best efforts to improve cybersecurity will continue to fall short.
In this text, the author mainly discusses_____
A the adverse trend confronted by cyber security.
B the ineffective prevention to possible data stealing.
C the deficiency of law applications to data breaches.
D the negative impact brought by data breaches.