Assignment 3
Assignment 3
1. Consumer mistrust. The idea of “surveillance capitalism has captured consumers’ increasing
awareness that their data is bought, sold, and used without their consent .
2. Government action. Federal lawmakers are moving to curtail the power of big tech.
3. Market competition. This is a remarkable confluence of forces, and they are converging
towards a clear endpoint where individuals will soon exercise full control over their personal
data.
The challenges for established companies, already suffer from a series of internal tensions over
customer data. The new data economy won’t tolerate this state of affairs for long. If your
organization generates any value from personal data, you will need to change the way you
acquire it, share it, protect it and profit from it.
Our new rules of the data economy are fairly straightforward, all of them derived from the basic
principle that personal data is an asset held by the people who generate it. But each rule entails
the breaking of entrenched habits, routines and networks.
Rule 1: Trust over transactions. This first rule is all about consent. Until now, companies have
been gathering as much data as possible on their current and prospective customers’ preferences,
habits, and identities, transaction by transaction — often without customers understanding what
is happening.
Rule 2: Insight over identity. Companies routinely transfer large amounts of personal
identifiable information (PII) through a complex web of data agreements, compromising both
privacy and security.
Rule 3: Flows over silos. This last rule flows from the first two, and doubles as a new
organizing principle for internal data teams. Once all your customer data has meaningful consent
and you are acquiring insight without transferring data, CIOs and CDOs no longer need to work
in silos, with one trying to keep data locked up while the other is trying to break it out. Instead,
CIOs and CDOs can work together to facilitate the flow of insights, with a common objective of
acquiring maximum insight from consented data for the customer’s benefit.
The end of the old personal data economy will not spell the end of its value creation and wealth
generation; that wealth will just be distributed better and more equitably, and carry fewer privacy
and security risks. People will not hoard their data assets. Instead, they’ll invest them in
companies that provide them with a return in the form of more and better personalized services.
To Implement A Best-Practice Approach To Data Privacy And Security,it should define the
standards to which the organization will adhere and strive to follow. A good policy protects
customer, employee and third-party data.
1. Understand What Data You Collect - To start, take a step back and determine what data is
captured by your company and whether any of that can be deemed non-essential.
2. Limit Data Access - Only the people in your organization that need to have access to data
should be able to do so.
4. Establish Data Approval Layers - Restricting data access makes it easier for you to pinpoint
and isolate how data leaks happen.
5. Regularly Review Third-Party Software - Aging software systems represent weak points in
your overall data security plan.
6. Invest in Anti-Malware Apps - Make sure all devices that have the ability to access data are
loaded with the most up to date anti-malware software.
7. Establish a Data Usage Policy - Create a clear policy with guidelines, and be sure to
effectively communicate it not just to department heads, but all employees.
8. Don't Overlook Physical Security - Physical security can include requiring logins to access
sensitive information, using an NFC card to use on-site printers so you can log activity, and even
cameras to monitor employee activity in all public spaces.
9. Schedule Security Training for All Employees - Don’t assume that all department heads will
share data security best practices with their subordinates. Everyone must be trained as part of
your overall onboarding checklist.
10. Leverage the Power of 2FA - Require all corporate systems to run on 2FA access and also
routinely require passwords to be updated.
11. Overhaul Weak Passwords - Do not use any old passwords that rely on short character
strings, don’t incorporate capitals, numbers, and special characters, or use identifiable
information.
12. Shift to Secure Cloud Storage - Turn all your data to cloud storage.
13. Avoid Insecure Data Sharing - Avoid the risk by shifting to secure file sharing systems
instead.
14. Automate Software Updates - Make sure that software updates are always up to daìte. It
includes security patches to protect against data theft or hacking.
15. Remove Old or Irrelevant Data as Needed - Once data no longer becomes relevant to your
business’s core tasks, dispose of it properly.
16. Perform Compliance Audits - Have a dedicated team or outsourced vendor that reviews and
ensures your business is following data protection expectations.
17. Keep an Eye on Outside Data Access - Be careful on how third-party partners are accessing
data, but that they’re only using it when necessary and treating it as sensitive information with
the proper security protocols.
18. Beware of Phishing - Educate everyone on what to look out for including opening emails
from unknown senders, clicking random links, and even pop-ups.
19. Only Use Secure WiFi Networks - Remind employees to only use secure networks when
accessing company files and to avoid attempting to access sensitive information on unvetted
public networks unless they’re using a VPN.
20. Keep Passwords Fresh - Do not use the same word or phrase over and over as it increases the
risk of being hacked.
21. Leverage VPNs - Security protocols are not only for your computers but also for printers on
the LAN that aren’t password protected or covered by a VPN
22. Review Privacy and Cookie Policies for Accuracy - If you want to stay compliant with
regulators, make sure whatever data usage is listed in your privacy or cookie policies accurately
reflects how your business uses consumer data.
23. Create Dedicated Compliance Contacts - Create dedicated points of contact for this, as well
as stand-alone email accounts to address these queries. Finally, be proactive in responding to
emails as they arise.
24. Stay On Top of Data Privacy Laws - If you can’t personally manage this, take advantage of
tools like Enzuzo’s Privacy Policy Generator to ensure that your online presence meets with legal
requirements for some of the more stringent privacy regulations in the world like GDPR,
PIPEDA, and CCPA.
25. Don’t Forget Cookie Consent - If you’re not well-versed in the varying requirements,
Enzuzo’s Cookie Consent Banner Generator creates a compliant solution in minutes and can
quickly be installed on your website.
Compliance is Critical for Corporate Success. Enzuzo is a turn-key solution that is also
incredibly flexible, allowing businesses to leverage a customizable data privacy solution that
maintains compliance while providing a robust set of tools. From managing data requests to
creating privacy policies and cookie banners that address your business’s unique needs, Enzuzo
is here to ensure that you can focus on your key business activities and not run afoul of privacy
regulators from around the world.
How to Promote Privacy Best Practices at Work
To successfully protect enterprise and customer data, data privacy must be more than just a
C-suite priority. It must make its way down to the employees who handle this highly sensitive
information regularly. In that regard, there is undoubtedly work to be done. This is especially
prevalent in a post-pandemic environment that makes data exposure and privacy violations more
common.
IT leaders need to ensure that their teams (especially their hybrid workforce) protect peoples’
privacy. Employees need regular data privacy training. Today’s employees have a lot on their
minds. In addition to navigating the fallout from an unprecedented pandemic and a newly
decentralized operational environment, they have countless tasks and responsibilities that occupy
their time and attention. As a result, data privacy is not being prioritized. Leaders have an
opportunity to bolster their organization’s data privacy capacity by teaching their employees how
to protect customer data with regular data privacy training.
According to Teach Privacy, an organization that helps other organizations promote privacy
awareness in the workplace, IT leaders must answer critical questions and provide their teams
meaningful answers to questions such as:
● Why should people care about privacy?
● Why is privacy valued by the organization?
● What are the consequences of failures to protect the privacy of customers, clients and
colleagues?
● What are the consequences for the organization itself?
● What are the consequences for the individuals involved in the failure?
Employee monitoring is a powerful tool for providing employee insight without interfering with
existing workflows or overburdening teams with exhaustive reporting requirements. Employee
monitoring software allows organizations to:
● Set and enforce specific data access privileges (effectively restricting information access
and lessening the risk of a privacy violation)
● Assess data management practices (providing regular feedback on individual privacy
protection practices)
● Maintain regulatory compliance (ensuring that the latest privacy standards are always
met)
At the same time, employee monitoring also produces helpful risk-management assessments,
helping leaders identify high-risk workers and data management practices and allowing them to
update protocols appropriately.
In terms of privacy changes, it is rapidly evolving. Many consumers now view an organization’s
data privacy reputation as a meaningful, competitive differentiator while regulatory requirements
become more expansive and all-encompassing. It is beneficial for organizations to keep up with
the latest trends, listen to customer feedback and prepare employees to evolve accordingly.
10 data privacy best practices in 2022
These days, businesses aren’t just improving data privacy protections to comply with
regulations; an increasing number of businesses recognize that stronger data privacy measures
add new business value. It can require changing mindsets, securing budgets, changing vendors,
maintaining process inventories, holding training events, adopting a privacy governance model,
new levels of accountability and more.
1. Adopt an enterprise data governance strategy - Make sure that businesses and
functional leadership approve of and support new data governance initiatives ahead of
implementation.
2. Show program value - Develop realistic goals and expectations for your business
3. Know your data - Dispose data that your business has but doesn’t actually need, as it
may pose undue security risks.
4. Review your data collection process - Avoid collecting data simply to have it available
for unspecified future use, as it will impose storage costs and security stress.
7. Security for backups - Always evaluate your backup storage group’s security measures.
8. Inform your clients - Provide consumers with a general overview of measures in place
to protect data can help build trust, loyalty and a competitive brand identity.
10. Ask thoughtful questions - Drive new conversations around appropriate leadership,
structure, resources and supports for addressing data privacy management.
The 8 Most Challenging Data Privacy Issues
1. Embedding data privacy - Make sure you choose tools that support your current privacy
policies, for example by making data anonymization easier.
2. Proliferating devices - ensure you have the right data governance procedures in place.
3. Increasing maintenance costs - It helps in reducing the number of data silos, eliminate
points of friction and manual processing, reduce risk of human error, more opportunities
for de-duplication, Improved governance and control, lower costs
4. Access control is difficult in many industries - must need an effective data architecture
and strong data governance processes.
5. Getting visibility into all your data - Using tools to discover and classify your data will
ensure you can treat data uniquely and protect your sensitive data from any privacy
issues.
6. A bad data culture - build a great data culture that understands the value of data and
data privacy.
7. The ever-increasing scale of data - As cloud storage and compute costs come down,
businesses are now drowning in data. You will need a solution that can handle the scale.
8. A long list of regulations and documentation to follow - By building processes, data
modeling, and automating as much as possible, you can make it easier to handle the
complexity of different regulations.
3. Not Having Visibility Over Personal Data Collection, Use, and Sharing
Ensure you adequately disclose to your users what data you’re collecting, using, and sharing.
As businesses collect more and more personal data from an increasing number of sources, it
becomes difficult to understand each of your departments’ data processing practices.
To prevent data visibility issues from occurring, your business should perform something called
data mapping which is the practice of creating a record of personal data you hold and why.
You usually need to record all of the following:
● The types of personal data you collect
● The sources of the data (i.e., collected directly or indirectly, from whom)
● Your purposes for collecting the data
● Any third parties to which you disclose the data to
To prevent a rocky relationship between the business and the privacy professional, business
owners should build data privacy literacy into every aspect of their process.
To increase your controls over the access of the personal data your business collects, determine
who internally is allowed to access the data, set up access controls that involve authentication
and authorization of the users, and be sure to grant the appropriate level of access based on the
context of each role, location, device, and so on.
Providing access, sometimes without the company’s total knowledge, to third parties can turn out
to be a real threat.
Ensure you only use a new feature or resource after doing your due diligence. Take the time to do
research on the systems you want to integrate with and have your privacy team or a lawyer verify
if everything is legally compliant based on applicable laws.
Train every team member on data privacy and cybersecurity issues to prevent human errors. It’s
also a best practice to create backup and recovery plans.
It is important to note that there isn't a universal data privacy standard that applies to every
organization. Your company should ensure strict compliance with each data privacy law relevant
to your managed data type, industry, and location. Meeting the latest guidelines of these laws can
help optimize consumer data privacy.
Privacy issues on the internet have increased with the mobile accessibility of the web. It is
essential for your company to recognize the data issues on the internet associated with increased
connectivity and to implement the best privacy practices for various online traffic.
1. NPPI considerations - Signing up for an online platform usually requires the submission of
non-public personal information (NPPI), like a person’s marital status and political affiliations,
submitted via an online form. In such cases, your data privacy practices should account for NPPI
management processes.
2. Data sharing concerns - Your team should always disclose data-sharing practices with
third-party vendors or collaborators. Failing to do so can result in the violation of privacy rights,
heavy fines, and legal claims that cause reputational harm.
3. Ever-growing data volume - Your organization needs a programmatic privacy solution that
scales with your database needs.
4. Complex access permissions and control - A lack of a proper cloud-supported data privacy
infrastructure could lead to governance and compliance issues. In these instances, teams cannot
effectively oversee permissions and controls, increasing the risks of unauthorized access and
database breaches.
3. Are location settings secure? The registered location of your social media account can
provide malicious actors with a clearer idea of your online profile for an organized
network attack.
Privacy breaches often involve a wide range of company information. While account credentials,
usernames and passwords, are likely the first pieces of information that come to mind when
considering data privacy issues, plenty of other details are susceptible to access, theft, and sale.
These include:
1. Insufficient Data Privacy Plans - You should consider each piece of new data as a
potential weak spot in your privacy policies. Any preventative software or procedure
should address specific privacy concerns at scale.
Potentially harmful undertakings includes Identity theft, Data hostaging, Targeted advertising,
and Data traders
3. Location Tracking
In the business sector, location tracking can be insidious. Hackers can infiltrate your employees’
location data to reveal or sell trade secrets, confidential consumer data, supply chain information,
and business development efforts.
In addition to work-issued smartphones, tablets, and PCs, businesses should also include the
following devices in their data privacy plan:
Even with the best data privacy platform at their disposal, humans can still make mistakes.
Companies must also develop standard operating procedures (SOPs) for data privacy.
SOPs should include procedures like: new device setup and privacy protection, protocol
concerning employee devices, document naming and filing conventions, when, why, how, and by
whom the SOP should be reviewed and updated
6. Data Hoarding
You should perform some spring cleaning to dispose of any redundant or outdated files on your
server, in the cloud, or on individual devices to prevent any privacy issues from arising.
Data privacy should be a great matter of concern nowadays especially that people are very fond
and addicted to the internet. We all prefer more online deals and transactions because it is easier
and makes life lighter.
Our full names, addresses, contact details, etc. can be easily identified by the hackers and can be
misused. Our personal, private details are not that safe and it is really not a time to sit back being
tension free. It is indeed a matter of concern.
So how does it happen? How do they get our personal data? Of course we won't share our own
data ourselves and risk our lives. Then how? Whatever we do on the internet is not hidden. The
problem is the fact that our details are always being shared with some or the other third party in
order to let the internet world enhance our experience. Now, we don't actually know if the data
sharing is helping the cyber thieves or not. If the hackers or cyber thieves obtain our personal
data, they may use our details and misuse them. They can also hack our mobile through our
numbers and misuse it. The most common example, someone may get our phone number and
call us and pretend to be from one of our banks asking for the bank details for some emergency
purpose. After obtaining the details, they will take out all the money from our bank.
So it is very important that we start concerning data privacy and start adapting strategies for data
protection.
Start avoiding downloading unknown apps, don't click on suspicious links. Verify the links. Be
cautious of malicious websites. Prefer using end-to-end encryption services, it is safer.
C.
● Briefly enumerate (in short, numbered items or bullet points) the best practices and
issues/challenges discussed).
Not Having Visibility Over Personal Data Collection, Use, and Sharing
This is one of the challenges being faced by our company. We have a lot of information collected
from various people that are being kept in the company. As we collect more and more personal
data from an increasing number of sources, it becomes difficult to understand each of our
departments’ data processing practices.
● Based on the issues/challenges your organization is facing, can any of the best
practices address those issues? Explain how and/or why.
To prevent data visibility issues from occurring, data mapping should be performed to practice
creating a record of personal data. These data has to be recorded. The types of personal data you
collect
- The sources of the data (i.e., collected directly or indirectly, from whom)
- Your purposes for collecting the data
- Any third parties to which you disclose the data to
D.
1. privacy-by-design and privacy-by-default approach to data processing.
2. Data minimization - It applies to the third principle of data protection introduced by the Data
Protection Directive 95/46/EC and has been incorporated into the GDPR.
The third principle of data protection specifies that personal data shall be adequate, relevant and
limited to what is necessary in relation to the purposes for which they are processed.
3. Regular data audits - Data audits, while often avoided, are important to ensure transparency
about who is using sensitive data and for what purpose. This process is necessary to ensure the
organization secures sensitive data, remains compliant, and translates that data into
well-informed decisions.
Risk assessments - is a process used to identify potential hazards and analyze what could
happen if a disaster or hazard occurs.
Privacy impact assessments to identify and mitigate privacy risks - A privacy impact
assessment (PIA) is an analysis of how personally identifiable information (PII) is handled to
ensure compliance with appropriate regulations, determine the privacy risks associated with
information systems or activities, and evaluate ways to reduce the privacy risks.
Works Cited
“Risk Assessment.”