SECURITY AND PRIVACY
Week Ten ↓
TL;DR
It is important to understand the nuances between privacy
and security within the context of the interdependent relationship between both
programs. Security is more encompassing and is implemented through diverse
techniques. Privacy on the other hand requires laws and acts to function.
The terms security and privacy have a lot in common as
regards networks and technology. They are interdependent and coexist. There are
some arguments that one can have security without privacy, some are also of the
opinion that they are both closely related and cannot have one without the
other.
The continuous adaptation of technology has resulted in
various impacts in our lives, increasing the pace at which digital business is
growing. Organizations have adopted technologies such as; big data, cloud
computing, Internet of things, engendering an emphasis on the importance of
security (Ng, 2019).
Security
Security is a concept that is being embraced by technology
and its implementations. The more interconnections result from technologies,
the higher the need for security. Security is a measure that can be applied to
manage risks and protect our information from unauthorized users such as; hackers
and cyber criminals. Security ensures that the confidentiality, integrity and
availability of stored, processed and transmitted data are maintained by using
technology, policies and people.
With the advancement in technologies to store, retrieve and
send information more efficiently, not a lot of people will argue against the
proposition that there is a need to proactively secure these mechanisms. It is
sacrosanct to ensure that these technologies are immune to the ever-rising
formidable offensive approaches to jeopardize our Information’s safety (King,
2019). Cyber criminals or hackers have developed more stealthy way to acquire
information. Also, the presence of a security infrastructure does not
necessarily guarantee that information would not be compromised, but strict
implementation of security measures would make the data exfiltration a more
daunting task, thereby keeping malicious persons at bay and preventing
unauthorized access.
All security measures put in place for information security
address at least one of these three objectives:
·
Promoting availability
·
Protecting the confidentiality
·
Preserving the integrity of information assets
The application of these measures could be in areas such as;
administrative security, network security, personal security. The goal is to
strengthen internal controls and to restrict unauthorized access. Security
objectives must be defined and stated to have strong and robust security
policies. These will help to draw up a security plan for a secure system.
Privacy
Data privacy is concerned with the proper handling of data.
Privacy is one’s right to freedom form intruding and prying eyes. It usually
relates with personal data stored on computer systems. Personally Identifiable
Information (PIIs), Protected Health Information (PHI) such as; medical
records, political records, criminal records and financial records need privacy
for them to be properly maintained. Privacy is more like secrecy. Privacy
dictates the process used to collect, use and share data (King, 2019).
Information privacy is an important aspect of information
sharing. There is enormous value in collecting, sharing and using information. Top
companies like; Google, Facebook, Amazon, build their company around collecting
and sharing data (Ng, 2019). This made data privacy of utmost importance. Most
businesses are required to be transparent with their compliance with privacy
policies and how they operate and ensure privacy of customer data. This fosters
good relationship between businesses and customers. This is why data security
and data privacy go hand-in-hand.
Data Privacy Acts and Laws
Lawmakers have seen the importance of having data privacy
regulation and the need to hold companies responsible for end user data.
Different legislations have been put forth and passed into law in relation to
data privacy. Companies are now mandated to know what data privacy acts or laws
affect their users, for example, the origin of data, the content of that data
and how it is to be used must be known in certain scenarios. These regulations
have resulted in certain impacts.
·
General Data Protection Regulation (GDPR)
This regulation was passed in 2018, with
the aim of protecting EU citizens personal data. For companies to be compliant,
there are a lot of steps for them to take, for example; explicit opt-in
consent, the right to request data by users, the right to delete their data
(Siegel, 2016). GDPR gives consumers certain rights over their data while also
placing security obligations on companies holding their data.
·
Health Information Privacy and Portability
Act (HIPAA)
This regulation is one of the most
prominent data protection and privacy laws in the US. It was passed by federal
lawmakers to safeguard patient personal health information.
·
Gramm-Leach-Bliley Act (GLBA)
This is another law that is important, and
it is aimed solely at the financial institutions. This law requires that
financial institutions protect customers financial information.
·
California Consumer Privacy Act (CCPA)
This law was passed by the state of
California and the regulation with start to take effect from January 2020.
Businesses in this state must be ready before then for the full implementation.
This law gives consumers the right to control how companies collect and use
their data.
·
Sarbanes Oxley Act (SOX)
This was Enacted in 2002, the Sarbanes
Oxley Act is designed to protect investors and the public by increasing the accuracy
and reliability of corporate disclosures.
·
The Digital Millennium Copyright Act (DMCA)
The DMCA is a United States’ copyright law
that implements two 1996 treaties of the World Intellectual Property
Organization (WIPO). It defines legal prohibitions against circumvention of
technological protection measures employed by copyright owners to protect their
works, and against the removal or alteration of copyright management
information.
·
Federal Information Security Management Act
(FISMA)
The FISMA provides a comprehensive
framework for ensuring the effectiveness of information security controls over
information resources that support Federal operations and assets.
REFERENCES
Ng, C. (April, 2019). Data Privacy: Definition, Explanation
and Guide. Retrieved from https://www.varonis.com/blog/data-privacy/
King, N. (March, 2019). The importance of information
security. Retrieved from https://securityboulevard.com/2019/03/the-importance-of-information-security/
Siegel, B. (May, 2016). What is the difference between
privacy and security? Retrieved from https://www.csoonline.com/article/3075023/the-difference-between-privacy-and-security.html

Comments
Post a Comment