Major Project: Privacy and Data Protection
PRIVACY AND DATA PROTECTION
First of all, what is Privacy?
The right to be left alone, or freedom from disturbance or
intrusion, is known as privacy. The right to have some control over how your
personal information is gathered and utilized is known as information privacy.
Different cultures have quite different ideas on what a
person's privacy rights are and how they should be protected.
![]() |
| (EMOTIV, 2022) |
As more data is collected and exchanged, information privacy
is getting increasingly complicated. The uses of data are becoming more
sophisticated as technology advances. As a result, organizations are faced
with an extremely complex risk matrix for maintaining the security of personal
information.
What is the difference between Privacy and Security?
Data privacy is concerned with the usage and regulation of personal data, such as establishing procedures to ensure that consumers' personal data is accessed, shared, and utilized appropriately. Security is more concerned with protecting data from harmful assaults and profiting from stolen data. While security is required for data protection, it is insufficient for privacy concerns. (IAPP, 2022)
![]() |
| (StealthLabs, 2022) |
Benefits of complying with Data Privacy Laws for organizations
The penalties and fines imposed by data privacy laws might
be severe. Organizations can be penalized up to 4% of annual global revenue, or
€20 million, under the EU's General Data Protection Regulation (GDPR). Aside
from the potential financial penalties, a program that solves significant
data privacy issues could save money. GDPR requires not just the secure storage
of user data, but also the exchange of data upon request. Clean, effective
processes for meeting these data governance standards can save the company a
lot of money.
What are the risks of Data Privacy?
![]() |
| (Kovacs, 2022) |
Before being deployed within an otherwise secure firm, any software housed in the cloud or on the web should be thoroughly inspected and secure. Before you install anything new, make a data privacy compliance checklist to secure your program. (EMOTIV, 2022)
-Insiders and Poorly Trained Employees
Every member of your team should be fully taught and knowledgeable on the data privacy fundamentals that they are accountable for. This can be achieved by carefully creating and executing a business data privacy policy. (EMOTIV, 2022)
-Lacking Breach response
An incident response plan is an important component of a data privacy compliance program. Make sure you have a clear plan in place, that it's been practiced, and that the command line is ready to execute it if any problems emerge. (EMOTIV, 2022)
-Inadequate Personal data disposal
Personal data should be kept only for the duration of the customer or employee relationship (and any related legal obligations). If this program does not perform this function, your organization may face significant fines under the EU's General Data Protection Regulation (GDPR). (EMOTIV, 2022)
-Lack of Transparency in Privacy Policies, Terms, and Conditions
Make sure that all of your customers, distributors, users, and investors are aware of your privacy policies, terms, and conditions. Make sure they understand what they're agreeing to and what commitments they're taking on. (EMOTIV, 2022)
-Collection of Unnecessary Data
Data should only be collected for specific purposes for which consent has been obtained. The majority of data protection laws and regulations stipulate that an organization may not collect more data than is necessary for the transaction. A data privacy consent form can help users understand your company's policies and what they're agreeing to. (EMOTIV, 2022)
-Personal data sharing
Before any personally identifiable information leaves your organization's database for which permission has been obtained, make sure to notify all users. (EMOTIV, 2022)
-Incorrect or Outdated personal data
Most data privacy laws and regulations give people the right to amend inaccurate or incomplete personal data. This is a significant advancement in data security. Ascertain that your company has a particular policy and processes in place to allow users to exercise this privilege. (EMOTIV, 2022)
-Session expiration problems
Session expiration might pose a risk when a data subject gives personal information to a web service. The company may be held accountable for this cloud data privacy breach if a data subject abandons their session and their data is exposed. (EMOTIV, 2022)
-Data transfer over insecure channels
To transfer sensitive data, always utilize secure channels and protocols (e.g., SFTP, TLS). Incidents can occur when data is exposed through unsecured channels (e.g., FTP, HTTP). (EMOTIV, 2022)
-Extra credit: Dealing with the unknown
Make sure your team, procedures, and command-line are ready for the unexpected. The modern business landscape's big data privacy challenges constantly create new dangers and compliance challenges. Good data governance, security, and privacy program will adapt and adjust to keep your company compliant and secure. (EMOTIV, 2022)
Seven Principles
![]() |
| (NHS, 2022) |
Ways of avoiding the risks mentioned above are based on the seven principles.
The GDPR lays out seven criteria for processing personal data legitimately. Collection, organization, structuring, storage, alteration, consultation, use, communication, combination, restriction, erasure, and destruction of personal data are all examples of processing. (UHI, 2022)
The seven principles are as follows:
-Lawfulness, fairness, and transparency
-Purpose limitation
-Data Minimisation
-Accuracy
-Storage limitation
-Integrity and confidentiality (security)
-Accountability
Data Protection Technologies to Protect your data
There are various storage and management choices available when it comes to protecting your data. You can use solutions to control access, monitor activity, and respond to threats. (Cloudian, 2022)
Some of the most often used practices and technologies are as follows: (Cloudian, 2022)
-Data Discovery
-Data Loss Prevention (DLP)
-Storage with built-in data protection
-Backup
-Snapshots
-Replications
-Firewalls
-Authentication and Authorisation
-Encryption
-Endpoint protection
-Data erasure
-Disaster recovery
Reference(s):
Cloudian, 2022. Data Protection and Privacy: 12 Ways to
Protect User Data. [online] Cloudian. Available at:
<https://cloudian.com/guides/data-protection/data-protection-and-privacy-7-ways-to-protect-user-data/>
[Accessed 8 May 2022].
EMOTIV, 2022. Data Privacy. [online] EMOTIV. Available at:
<https://www.emotiv.com/glossary/data-privacy/> [Accessed 8 May 2022].
Hare, 2022. These new rules were meant to protect our
privacy. They don’t work | Stephanie Hare. [online] the Guardian. Available at:
<https://www.theguardian.com/commentisfree/2019/nov/10/these-new-rules-were-meant-to-protect-our-privacy-they-dont-work>
[Accessed 8 May 2022].
IAPP, 2022. What is Privacy. [online] Iapp.org. Available
at: <https://iapp.org/about/what-is-privacy/> [Accessed 8 May 2022].
NHS, 2022. Your Data Privacy - GDPR. [online]
Practitionerhealth.nhs.uk. Available at:
<https://www.practitionerhealth.nhs.uk/your-data-privacy-gdpr> [Accessed
8 May 2022].
Stealthlabs, 2022. Data Security Vs Data Privacy: An
Imperative Distinction to Protect Data. [online] Stealthlabs. Available at:
<https://www.stealthlabs.com/blog/data-security-vs-data-privacy-an-imperative-distinction-to-protect-data/>
[Accessed 8 May 2022].
UHI, 2022. Data Protection - The Seven Principles. [online]
Uhi.ac.uk. Available at:
<https://www.uhi.ac.uk/en/about-uhi/governance/policies-and-regulations/data-protection/the-seven-principles/#:~:text=The%20GDPR%20sets%20out%20seven,or%20destruction%20of%20personal%20data.>
[Accessed 8 May 2022].




Comments
Post a Comment