Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Information Security - big data and the privacy conundrum

27/10/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmdkvmjqvodgyl2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

Large organisations in the IT industry will soon have to comply with new privacy laws that will outline how they can use and share big data. The European Data Protection Regulation could have a substantial impact on the profitability and continuity of technology firms, as the financial consequences of non-compliance could be severe. The protection of private data is vitally important in the digital age, although stringent new laws could prevent businesses from using customer information in a responsible manner, as big data initiatives may be viewed as too risky and expensive.

The European Commission proposed the new law in 2012 as a reform to the two-decade old data protection laws that had failed to keep pace with innovation. Cloud, software and mobile computing provided by third parties like Oracle and Salesforce.com are now driving change in almost every industry, and privacy and information security are now becoming competitive differentiators for all large corporations. The regulation is set to come into force during the next two years, so UK businesses in sectors such as Biotech, Geotech and IT recruitment are now being urged to prepare for the rules and take the necessary actions to ensure that they are compliant.

The move towards compliance includes preparing for the ‘privacy by design’ requirement. This means that organisations should make data privacy a key consideration from the outset of any project, such as building new IT systems for data access. Creating and enforcing privacy in this manner will ensure that controls are stronger and easier to implement while promoting a shift in culture across the company to make privacy a core function. The ‘right to be forgotten’ or ‘right to erasure’ law should also lead organisations to implement a strategy for the classification, retention, collection and destruction of all the data which is collected across different systems and platforms. Public Key Infrastructure and cryptography will continue to help businesses to build an infrastructure to protect sensitive data in these instances.

The new law will also have an impact on cloud customers and providers due to harsher data security requirements. A company that elects to use a third party will have to ensure that the service provider uses sufficient security measures and discloses the nature in which they process the data in their custody. The updated regulations have not yet been finalised, but it is obvious that there is set to be a wholesale change in the way sensitive data is handled over the next decade, along with substantial fines for those that breach them in each of the 27 EU states.

This article has been written by John Winfield - Consultant Information Security, for more information or for a detailed discussion please contact John on: +44 (0)20 7014 0230 or send an email to johnw@montash.com.

Montash is a multi-award winning, global IT recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy & Technologies, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.


comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdcvmtgvmdgvndcvmduvntu5l2jpz3n0b2nrluv4b3rpyy1qyxjhzglzzs1ucmf2zwwtvg91cmktmtc2mju4ndm3lmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Getting Ready to Switch Off

2017-07-17 09:00:00 +0100

According to research by online travel company Expedia, just 53% of workers come back feeling rested after they’ve been on holiday. When you bring work-related stress on holiday with you, you’re never going to be able to truly switch off. So if you've got a summer holiday coming up, what should you do to switch off and unwind? Before you leave... Plan ahead As soon as you know when your last day of work is, make a plan. You don't want to get to that fin...

W1siziisijiwmtcvmdyvmzavmtyvmtgvmjavmtg5l3nodxr0zxjzdg9ja182njkxody3mdkuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

In Her Shoes... SAP Contracting

2017-07-03 09:00:00 +0100

In IT, being a freelancer is very common; due to the nature of project work or other life commitments. SAP is an area in which a quality freelancer can really thrive. We sat down with one of our SAP freelancers, who has 20 years' experience, to find out more about SAP and working under a contract employment model. "After getting a degree in computing, I started my career as a training assistant, but I've always liked to fix things. I used to fix my own ...