IT Brief New Zealand - Technology news for CIOs & IT decision-makers
Story image

Keeping personal data at arm's length

Mon, 17th Jun 2013
FYI, this story is more than a year old

Companies should create a privacy program that keeps personal data at arm's length as by 2019, 90% of organisations will have personal data on IT systems that they don't own or control.

Enterprises have traditionally been the target of security threats, and until recently, those hackers focused on attacking vulnerable IT infrastructure.

As protection for such infrastructure improves, the attackers' attention shifts to softer targets, such as employees, contract workers, customers, citizens and patients.

"As the amount of personal information increases multifold, individuals and their personal data will increasingly become a security target," says Carsten Casper, research vice president, Gartner. "

"And, yet in most scenarios the organization is still ultimately accountable for the personal data on its IT systems.

"The time has come to create an exit strategy for the management of personal data.

"Strategic planning leaders will want to move away from storing and processing personal data in the next five years."

Gartner has identified the following steps to prepare for such a strategy:

Create clear delineations between personal and nonpersonal data

The first step should be to create a policy that draws a clear line between data that relates to human beings and data that does not.

The former category includes contact information and health and financial information, as well as an Internet Protocol address, geolocation data and other traces an individual leaves in the online world.

The latter category especially includes business plans, corporate financial data and intellectual property. Separating the two is necessary, because different laws apply.

The true challenge resides in handling data that can fall into both categories. Whether an organisation decides for or against declaring certain types of data as "personal data" depends on the organisation's risk appetite.

In most cases, companies tend to prefer to risk a little rebuke from a regulator rather than having to re-engineer complete business processes.

Put a fence around personal data

Even the best data protection policy is worthless if you can't live by it. Locating and documenting personal data have to go hand-in-hand with creating the policy.

Once personal data has been located, it needs to be protected. Encryption is the most widely used protective control.

An additional challenge exists where the company does not own the underlying IT infrastructure — be it a mobile device or a cloud environment.

Favour purpose-built over general-purpose applications

Personal data should not be combined with other data, if possible. Any technology that processes personal data in the same way it processes nonpersonal data creates a risk.

Content should be analysed before decisions are made about protection.

Such decisions are easier if employee performance information is stored in an HR management system, customer information is stored in a CRM system, and financial and business information is stored in an ERP system.

Adhere to privacy standards, or create your own

Compliance with dozens of privacy laws and cultural expectations from multiple regions can be costly.

Privacy standards simplify control frameworks, audits and information exchange, especially in scenarios where many players and stakeholders are involved.

Regardless of the specific privacy standard and cross-border transfer mechanism used, the most difficult challenge for organisations is to make such rules binding on all entities involved, including all employees, and accept liability in cases where employees or customers suffer harm.

"The PCI Data Security Standard (DSS) requires the implementation of stringent controls of those who collect and store credit card data," Casper says.

"In response, many companies have decided to eliminate credit card data from their own systems and completely entrust it to an external service provider.

"The same could happen with personal data. If control requirements are too strong and implementation is too costly, it would make sense to hand over personal data to a specialised 'personal-data processor'"

To check out "Let Go of Personal Data Without Losing Control" click here

Is it important to keep personal data at arm's length? Tell us your thoughts below

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X