Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Information Security - big data and the privacy conundrum

27/10/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmdkvmjqvodgyl2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

Large organisations in the IT industry will soon have to comply with new privacy laws that will outline how they can use and share big data. The European Data Protection Regulation could have a substantial impact on the profitability and continuity of technology firms, as the financial consequences of non-compliance could be severe. The protection of private data is vitally important in the digital age, although stringent new laws could prevent businesses from using customer information in a responsible manner, as big data initiatives may be viewed as too risky and expensive.

The European Commission proposed the new law in 2012 as a reform to the two-decade old data protection laws that had failed to keep pace with innovation. Cloud, software and mobile computing provided by third parties like Oracle and Salesforce.com are now driving change in almost every industry, and privacy and information security are now becoming competitive differentiators for all large corporations. The regulation is set to come into force during the next two years, so UK businesses in sectors such as Biotech, Geotech and IT recruitment are now being urged to prepare for the rules and take the necessary actions to ensure that they are compliant.

The move towards compliance includes preparing for the ‘privacy by design’ requirement. This means that organisations should make data privacy a key consideration from the outset of any project, such as building new IT systems for data access. Creating and enforcing privacy in this manner will ensure that controls are stronger and easier to implement while promoting a shift in culture across the company to make privacy a core function. The ‘right to be forgotten’ or ‘right to erasure’ law should also lead organisations to implement a strategy for the classification, retention, collection and destruction of all the data which is collected across different systems and platforms. Public Key Infrastructure and cryptography will continue to help businesses to build an infrastructure to protect sensitive data in these instances.

The new law will also have an impact on cloud customers and providers due to harsher data security requirements. A company that elects to use a third party will have to ensure that the service provider uses sufficient security measures and discloses the nature in which they process the data in their custody. The updated regulations have not yet been finalised, but it is obvious that there is set to be a wholesale change in the way sensitive data is handled over the next decade, along with substantial fines for those that breach them in each of the 27 EU states.

This article has been written by John Winfield - Consultant Information Security, for more information or for a detailed discussion please contact John on: +44 (0)20 7014 0230 or send an email to johnw@montash.com.

Montash is a multi-award winning, global IT recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy & Technologies, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.


comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...

W1siziisijiwmtcvmdkvmdgvmtevmtuvmzqvmtgwl0hpcmluzybnaxn0ywtlcy5qcgcixsxbinailcj0ahvtyiisijm4mhgxmdajil1d

Common Hiring Mistakes for SAP Consultants

2017-09-08 12:00:00 +0100

Choosing the wrong consultant can lead a project down a ruinous path. Deadlines get missed, quality of work decreases and money is wasted. When you're putting together a new SAP project, getting the right talent is paramount. We discussed hiring mistakes with our Senior Business Manager, Adam Blaney and asked him the question of how to minimise risk in hiring SAP Consultants. “Hiring any form of technology based consultant is difficult. The hardest part...