Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • What Does Data Privacy Mean to Consumers and Corporations?
  • Data Breach

What Does Data Privacy Mean to Consumers and Corporations?

5 years ago Tripwire Guest Authors
What Does Data Privacy Mean to Consumers and Corporations?

January 28 is Data Privacy Day (DPD)! I know, you’re so excited that you’ve got a party planned to get your executives, Marketing and Sales personnel to spend all day reviewing and revising your Privacy Policy (especially now that Privacy Shield is invalid).

The general focus of DPD is to inform consumers about the need to maintain the privacy of their data and to assist them in this quest. For corporations, their focus on privacy entails the need for companies to not only uphold privacy practices but also data security practices.

Let’s investigate what privacy means to both consumers and corporations a bit further below.

Privacy for Consumers and Organizations

Have you ever used a random story generator? Along with related poetry, lyric and song generators, they are lots of fun and can provide tons of laughter.

What isn’t fun is when companies use the same kind of idea to protect their data. The ideas and input might be good, but when organizations randomize their policies and practices, regulations, engineering, DevOps, marketing, customer service operations instead of aligning them with the disparate privacy and security needs, the result is that user data is not protected with a 360-degree view of where that data resides. The end product is something that works for the moment but can actually result in monetary fines and lack of customer trust down the road.

For individuals, data privacy controls are fairly limited. Read the Privacy Policy, click “I Agree,” check the app settings and repeat annually. For organizations, it’s a different story. Keeping the data of an untold number of people requires constant maintenance. Is it obfuscated if not encrypted? Are there any plans to move the data? Who all in your company—Devs, Engineering, CS, HR, Marketing, Finance—has access to the data? You can see that privacy and security are inextricably linked.

Data privacy for individuals is somewhat linked to personal security practices. Individuals need to spend some time making sure that 2FA is enabled, enabling a PIN in case the device is stolen, not sharing passwords and maybe following a few other details. However, recent events (recent being, say, the last five years) have demonstrated that individual privacy has been violated en masse most often when companies holding customer data are breached and when those organizations have to admit (more often than is comfortable) that at least one of those typical foundational protections was lacking. Some examples include a lack of 2FA, an unprotected internet-facing database, improper privileges and bad key/certificate management.

What makes protecting user data and privacy so tough?

There’s some ambiguity surrounding concepts such as data collection, data storage, what defines personal data and what the economic value of certain data is. The number and complexity of regulations is determined by what industry an organization is in, where business is performed and how much and what types of data are collected. The regulatory landscape is ever-changing (e.g., the rise of CMMC and potential NYPA changes).

Why is privacy such a big deal?

This question can be phrased another way: How much does it cost when privacy regulations and policies are violated? Here are some examples:

  • In 2020, a tech giant received a fine of €50 million ($56.6 million) for multiple GDPR violations.
  • In 2019, another tech giant was fined $5 billion for violating consumers’ privacy rights.
  • Recently, a well-known app lost millions of users because it revised its privacy policy to include the requirement that the app share users’ data with a major tech giant.

I’m leaving out the company names on purpose because the point of this post isn’t to name-and-shame. It’s to point to the need for companies to do all that’s possible to protect their customers’ data.

Then there’s the fall of Privacy Shield. What invalidated it? The framework had great intentions, and the practices involved were very good, but there was a lack of trust in the actual legal protections purported to be provided to EU citizens. Such a ruling by the EU Court of Justice reveals that data privacy is important enough to be considered by many to be a human right.

How can corporations achieve privacy protection?

We can get ahead of the curve by defining these terms in black and white in our own companies and protecting them to the best of your ability. We can also take the strictest privacy and security regulations, even if they are not applicable to our company, and work toward them.

With that said, at least one person in each organization needs to play the role of Information Security and Privacy Leader. This is a title I just now made up, but whatever the title might be (CISO, CTO, CIO, ISO, etc.), someone needs to have a pivotal role in managing and delegating the various security and privacy needs. The role is pivotal because that person will need to be able to integrate with all of the other roles in the company (no pressure here, of course) and be able to provide both Strategic and Tactical leadership.

Some ideas for both of these areas of focus are as follows:

STRATEGIC

  • Develop a roadmap of the upcoming security goals (e.g., Zero Trust, CCPA and PIPEDA compliance).
  • Share this roadmap with involved parties.
  • Participate in key corporate meetings (e.g., Engineering planning, Product development).
  • Make a corporate security awareness training plan.
  • Make a continuing education plan for those who interact with the data. (I see this question more and more on security questionnaires.)
  • Develop/Update your GRC program.

TACTICAL

  • Define each term used (data collection, private data, entry points, etc.).
  • Enable 2FA for all employees.
  • Register your domain with haveibeenpwned.com.
  • Remain on the lookout for regulatory changes.
  • Write policies that align with regulations. (Everyone needs policies!)
  • Where possible, use encryption instead of obfuscation, anonymization and pseudonymization.
  • Check those permissions.

Securing data is a formidable task, and the proliferation of technology, the speed of data transfer and the increase in the number of regulations don’t help one bit. But understanding the “why?” of protection will provide organizations with the impetus they need to search for and develop the necessary tools, technology and talent for the task.


About the Author: Ross Moore is the Cyber Security Support Analyst with Passageways. He was Co-lead on SOC 2 Type 1 implementation and Lead on SOC 2 Type 2 implementation, facilitated the company’s BCP/DR TTX, and is a HIPAA Security Officer. Over the course of his 20 year IT career, Ross has served in a variety of operations and infosec roles for companies in the manufacturing, healthcare, real estate, business insurance, and technology sectors. He holds (ISC)2’s SSCP and CompTIA’s Security + certifications, a B.S. in Cyber Security and Information Assurance from WGU, and a B.A. in Bible/Counseling from Johnson University.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” What Does Data Privacy Mean to Consumers and Corporations?” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Compliance, Encryption, Privacy, Private Data, TripWire

Continue Reading

Previous Nvidia Squashes High-Severity Jetson DoS Flaw
Next Ghidra 101: Decoding Stack Strings

More Stories

  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

8 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

10 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

14 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

16 hours ago [email protected] (The Hacker News)

Recent Posts

  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT