Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Information Security - big data and the privacy conundrum

27/10/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmdkvmjqvodgyl2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

Large organisations in the IT industry will soon have to comply with new privacy laws that will outline how they can use and share big data. The European Data Protection Regulation could have a substantial impact on the profitability and continuity of technology firms, as the financial consequences of non-compliance could be severe. The protection of private data is vitally important in the digital age, although stringent new laws could prevent businesses from using customer information in a responsible manner, as big data initiatives may be viewed as too risky and expensive.

The European Commission proposed the new law in 2012 as a reform to the two-decade old data protection laws that had failed to keep pace with innovation. Cloud, software and mobile computing provided by third parties like Oracle and Salesforce.com are now driving change in almost every industry, and privacy and information security are now becoming competitive differentiators for all large corporations. The regulation is set to come into force during the next two years, so UK businesses in sectors such as Biotech, Geotech and IT recruitment are now being urged to prepare for the rules and take the necessary actions to ensure that they are compliant.

The move towards compliance includes preparing for the ‘privacy by design’ requirement. This means that organisations should make data privacy a key consideration from the outset of any project, such as building new IT systems for data access. Creating and enforcing privacy in this manner will ensure that controls are stronger and easier to implement while promoting a shift in culture across the company to make privacy a core function. The ‘right to be forgotten’ or ‘right to erasure’ law should also lead organisations to implement a strategy for the classification, retention, collection and destruction of all the data which is collected across different systems and platforms. Public Key Infrastructure and cryptography will continue to help businesses to build an infrastructure to protect sensitive data in these instances.

The new law will also have an impact on cloud customers and providers due to harsher data security requirements. A company that elects to use a third party will have to ensure that the service provider uses sufficient security measures and discloses the nature in which they process the data in their custody. The updated regulations have not yet been finalised, but it is obvious that there is set to be a wholesale change in the way sensitive data is handled over the next decade, along with substantial fines for those that breach them in each of the 27 EU states.

This article has been written by John Winfield - Consultant Information Security, for more information or for a detailed discussion please contact John on: +44 (0)20 7014 0230 or send an email to johnw@montash.com.

Montash is a multi-award winning, global IT recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy & Technologies, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.


comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdmvmdgvmdkvmzkvmtqvmzgxl3dvbwvuigluigj1c2luzxnzlmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Dear 18-year-old me: It’s a woman’s world too

2017-03-08 09:00:00 +0000

With International Women’s Day being all about celebrating the cultural, economic, political and social achievements of women, it highlights the issue of women in technology, which remains a contentious one. Recent research from WISE, which campaigns for gender balance in science, technology and engineering, found that women only make up just 17 per cent of all IT professionals in the UK. Montash Recruitment Consultant Sadiye Booker has shared her exper...

W1siziisijiwmtcvmdivmtuvmtyvntivmjuvnzkwl2n5ymvyigf0dgfja3muanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

UK threatened by serious cyber attacks every ...

2017-02-15 16:00:00 +0000

The security of the UK has been threatened by 188 serious cyber attacks in the last three months, a government security chief has said. National Cyber Security Centre (NCSC) Chief Executive Ciaran Martin told The Sunday Times that national security was put at risk by many of these attacks. Martin was speaking ahead of the official opening of the NCSC, which has been set up to protect critical services in the UK from such attacks and improve underlying i...