Wednesday 10 August 2011

Organizations should Review the Privacy Policies as soon as possible: Report

Up to half of all facilities according to a new report by Gartner in 2012 to review the privacy policies. The above reasons, the vulnerability in progress, new technologies and the emergence of regulations and changes and challenges in the amount of privacy.

At the same time, privacy is likely to remain low budget. Develop appropriate privacy policies, those responsible for the privacy of open communication within the organization and external regulators. Organizations will be keeping an eye on the future of the Gartner has identified the top five privacy issues:
Security vulnerabilities

There are major privacy issue security breaches are still organizations. Gartner, mobile devices, data encryption, when transmitted over public networks to access, data encryption, restricting the storage of personal information, and advice sections of these organizations to encrypt data to protect users, administrators are given authority by unauthorized hackers. Tools for data loss, tokenization, management tools for masking data and privacy are encouraged to avoid.

Gartner, about 10% of the time, the authorities of privacy, "said the security breaches will be devoted to solving the problems of confidentiality.

Location services

GPS and other positioning tools, cell towers, the spread of wireless access points and IP addresses provides location information is now collected on an unprecedented scale. Large amounts of data collected by different service providers, there are serious privacy risks.

Privacy policies for location-based services, managers of private life of about 5-20% of their time to spend.

Cloud computing

Cloud computing is opening a Pandora's privacy policy. Although privacy laws to change the country aspires to be the same in all countries, public clouds. It is information taken out of the country because of export control and national security laws to prevent complicated.

However, most privacy laws, with some flexibility, and in most cases there are legal means. In addition, respect for confidentiality, privacy violations, except in some well known, does not require storage for the country. Privacy issues in cloud computing is likely to occupy 20-30% of the time an official of the isolation.
Difficult to define or measure the values ​​of privacy

Personal information is used only in the context, it becomes a privacy issue. The laws and regulations tend to lag behind technological change and cultural norms of what is right and wrong can not provide a clear answer.

The research firm for the design of business processes, rather than the privacy of parties after consultation recommends that these agents. The process was created, 10% more than the time should be devoted to monitoring the risks to privacy.
Amendments to Regulation

These smart meters, in a closed, face detection, presence detection of vehicles and equipment, body scanners, etc., and all databases using emerging technologies in tandem. It is a very specific information when a move or two points will be collected. Gartner predicts that the confidentiality rules and new laws are created to meet the new requirements.

However, Gartner also this privacy policy will not only suggest that the effect in the medium to long term. In the short term, businesses can continue to use existing laws to privacy in the development of policies. Monitoring regulatory changes and changes in the privacy policies of the organization, time privacy official is estimated at 50-10% coverage.

Carsten Casper, according to Gartner research director of the Privacy Officer "program when privacy is 15-50%, government relations, privacy, organizational management, comments must be devoted to the development implementation of applications, review of policies, documents, confidentiality agreements, legal advice, answer questions, training, monitoring and privacy surveillance program checks in terms of project. "

No comments:

Post a Comment