Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/29/2020
09:00 AM
Brad Shimmin
Brad Shimmin
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Why Companies Should Care about Data Privacy Day

Marking yesterday's 14th anniversary of Europe's first data protection day reminds us how far we still have to go.

Enterprisewide leverage of company data is now a near-universal objective for the modern organization, but this must be balanced with the needs of data protection and privacy compliance. The frequency with which breaches of personally identifiable information (PII) hit the headlines makes it clear that too many organizations are failing in their data privacy obligations. Maintaining data privacy is no easy matter; the footprint of information within and beyond an organization's boundaries makes it difficult to get a handle on what data is where. Yet control of the information footprint is essential to provide the appropriate protection.

From an enterprise perspective, there are steps that can be taken to improve data privacy. The overarching recommendation to the enterprise is to work to increase the granular architectural control of data so that it is managed as a cohesive enterprise corpus. This requires a focus on all three elements of the cultural triad: people, process, and technology. Investment in strong IT leadership roles, establishment of processes that incorporate intradepartmental stakeholders, and systematic improvement of architecture via modernization of legacy architecture and careful selection of new technology are all important.

Irrespective of location, any company working with data, most especially those working with customer data, must take action. Organizations operating outside of the European Union cannot afford the luxury of watching data privacy legislation play out from afar, with bodies of legislation continuing to ripple across the entire technology landscape, demanding immediate action regardless of geography or vertical markets. Furthermore, governments do not always wait for legislation, as shown by the $5 billion fine the US Federal Trade Commission (FTC) handed to Facebook in summer 2019 for failing to protect customer data from third parties.

The real risks posed by waiting to implement the measures defined in GDPR, CCPA, and other data privacy legislation begin and end with the customer. Companies must strive to understand and adhere to the spirit of these laws, regardless of potential financial penalties. They must build trust with their customers and partners through constant, tangible efforts such as disclosure of major privacy failings. They must also equip users with knowledge and ownership, namely transparency into process changes that may affect privacy and the means by which users can take control over their own data.

Success will require a lot more than executive approval and adequate assistance from IT culminating in a formal compliance program with well-documented KPIs. Rather, it will require full company participation, support, and most importantly belief in the importance of protecting both company and customer data. Tangibly, this will entail the creation of a publicly visible code of conduct to which all employees pledge adherence. Built on top of a solid compliance program, this statement of intent will serve as a statement of record, a socially binding contract of trust between a company and its customers.

At Ovum, we have created a series of best practices for people, process, and technology to support data privacy and protection.

For people:

  • Fully interview all data stakeholders and any employee working directly on corporate data, building a fully transparent, 360-degree view of that data as it flows into and out of the company.
  • Communicate impactful changes to privacy laws, standards, and regulations in a timely manner, and follow up with specific instructions on any IT-led responses to those changes.
  • Regularly interview the external providers and internal data stakeholders/contributors to ensure that their workflows evolve in accordance with the organization's compliance program.

For process: 

  • Establish a track and trace program for corporate data as it flows throughout internal business software workflows, documenting points of access, modification, and distribution. 
  • Using this track and trace program, seek to operationalize compliance for these potential points of attack or establish firm policies surrounding the establishment of any external partnership (technology providers, contractors, channel partners, suppliers, etc.) that incorporates any data access or exposure.

For technology: 

  • Invest in a data cataloging tool capable of identifying and describing all corporate data assets to drive the creation of the formal data privacy and protection compliance program built on a thorough metadata view of all data resources. 
  • Incorporate data discovery and classification tools alongside data cataloging solutions as a means of automating tasks such as data tagging (necessary for data lineage and traceability), segmentation, and even destruction.
  • Establish control of the data perimeter, preventing the exposure of PII and other controlled information, using solutions emerging from the well-established firewall market.

Each of these suggestions will translate into positive outcomes for enterprise practitioners new to the task of protecting their company's data, the privacy of their users, and the good name of the company itself.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "7 Steps to IoT Security in 2020."

Distinguished Analyst, Brad Shimmin has more than 25 years of experience in IT technology, helping enterprises and high-tech companies work effectively across a number of market areas including enterprise data and analytics management, artificial intelligence, digital ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
YorkLawFirm
50%
50%
YorkLawFirm,
User Rank: Apprentice
1/30/2020 | 1:50:48 AM
Feedback
Thanks for sharing

 

 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/30/2020 | 3:31:51 PM
Privacy
The frequency with which breaches of personally identifiable information (PII) hit the headlines makes it clear that too many organizations are failing in their data privacy obligations. We should expect this would be changing in Europe and US quote soon based on the new laws implemented.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/30/2020 | 3:34:01 PM
Legacy
systematic improvement of architecture via modernization of legacy architecture and careful selection of new technology are all important. I think legacy is one of the struggles enterprises have. May not be in compliance with privacy regulations.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
1/30/2020 | 3:35:46 PM
Customer data
Irrespective of location, any company working with data, most especially those working with customer data, must take action. When it comes to a pint that the data owners are the customers not the companies then we may see some improvement on privacy.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
1/30/2020 | 3:37:16 PM
Regulations
The real risks posed by waiting to implement the measures defined in GDPR, CCPA, and other data privacy legislation begin and end with the customer. These are good start, implementation and widely use of them will define the success of them.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
1/30/2020 | 3:38:31 PM
Trust
Rather, it will require full company participation, support, and most importantly belief in the importance of protecting both company and customer data. I agree. Believe and trust. Customers should be able to trust the companies that they do the right thing.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/30/2020 | 9:32:03 PM
Re: Privacy
I would say yes to a degree and I am all for it. At this point unfortunately most companies have the mentality that it will never happen to us. The ones who haven't yet been burnt by the stove at least.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/30/2020 | 9:34:10 PM
Re: Legacy
Most defintely.I often hear the phrase, "Well thats how its always been done." Or "We can't change that." 

Well, that doesn't make it right and yes you can, its just easier for you not to.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/30/2020 | 9:35:41 PM
Re: Customer data
Yup agreed. Its unfortunate that the mindset that, "well if it didn't happen to me I don't care" is all too pervasive.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/30/2020 | 9:37:04 PM
Re: Regulations
Implementation and enforcement are key. Its the difference between a good intention and a best practice.
Page 1 / 2   >   >>
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11527
PUBLISHED: 2020-04-04
In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files.
CVE-2020-11528
PUBLISHED: 2020-04-04
bit2spr 1992-06-07 has a stack-based buffer overflow (129-byte write) in conv_bitmap in bit2spr.c via a long line in a bitmap file.
CVE-2020-11518
PUBLISHED: 2020-04-04
Zoho ManageEngine ADSelfService Plus before 5815 allows unauthenticated remote code execution.
CVE-2020-5347
PUBLISHED: 2020-04-04
Dell EMC Isilon OneFS versions 8.2.2 and earlier contain a denial of service vulnerability. SmartConnect had an error condition that may be triggered to loop, using CPU and potentially preventing other SmartConnect DNS responses.
CVE-2020-5348
PUBLISHED: 2020-04-04
Dell Latitude 7202 Rugged Tablet BIOS versions prior to A28 contain a UAF vulnerability in EFI_BOOT_SERVICES in system management mode. A local unauthenticated attacker may exploit this vulnerability by overwriting the EFI_BOOT_SERVICES structure to execute arbitrary code in system management mode.