In this first part of a two-part series, we explore some of the issues around government surveillance and the search for that elusive balance between security and privacy. In this first part, we explore how serious the threat of cyber snooping by government surveillance is and why we shouldn’t panic just yet.
Data Privacy
Technological development has always outpaced privacy concerns, but never more so than in the past decade. Collection and centralization of personally identifiable information (PII), tracking of movements and digital surveillance are all at unprecedented levels. Regulations and laws are only just beginning to catch up to the ability of both governments and private entities to deploy these capabilities.
What exactly is there to worry about? The mass collection and centralization of data by giant multinationals such as Facebook and Google is as good of a place to start as any. Two decades of vacuuming up the personal data of users of various online services has created the most impressive marketing capabilities in history, but these profiles have astounding potential for damage when they are used the wrong way or fall into the wrong hands.
Unauthorized information that is captured in data breaches tends to find its way to massive “combo lists” that are sold and traded on the dark web. Social security numbers are added from this breach, home addresses and phone numbers from that one, personal health information from yet another. Soon, a frighteningly complete profile of millions of individuals is available to anyone willing to pay the asking price.
These are just the established data privacy issues. The emerging ones are even worse. High-quality facial recognition technology is just beginning to roll out across the public places of some countries. Artificial intelligence is not only making mass facial recognition possible, but magnifies the power and reach of any application that involves capturing and sorting information: scanning pictures, analyzing speech, sifting through text and location data. This threatens to not only shatter anonymity and privacy, but allow for highly advanced impersonation and take the concept of “identity theft” to new levels.
Some businesses chafe at the trouble and added expense of new and emerging data privacy regulations, but they are vital to both protecting rights and privacy and instilling confidence in end users. Customers want to be able to submit their payment information without worry about data breaches and identity theft, use services without wondering what is being done with their personal information and use devices without fear of surveillance or having location data tracked. The need for meaningful safeguards only grows greater as technological capabilities increase.
We give some insight into how companies could use a privacy impact assessment (PIA) in conjunction with data mapping practices to understand how data flows through an organisation, making it the perfect tool to document and track new initiatives.
In June 2016 the Korean government announced new guidelines on personal data de-identification measures which have contributed to a greater clarity around the use and transfer of personal data for purposes other than those consented to by the data subject. How will they positively impact the big data market?
The Data Privacy Asia 2016 Conference will feature top ranked industry experts from more than 15 countries and a more interactive audience experience than ever before. The Conference, which is themed Building Digital Trust: Establishing an Ecosystem of Trust and Protection in the Digital Age will examine subjects like trust vs. innovation and privacy vs. security, how enterprises can meet the challenges of a globally diverse regulatory and compliance landscape, and the privacy challenges on IT and security.
To help information security, privacy and compliance professionals architect and implement the best security and privacy practices for your organization, Rebecca Herold, lead developer and author of ISACA's Privacy Principles and Program Management Guide, provides an overview of the 14 principles and explain the importance for each business, in any country, to implement them within their own organizations.
To help information security, privacy and compliance professionals architect and implement the best security and privacy practices for your organization, Rebecca Herold, lead developer and author of ISACA's Privacy Principles and Program Management Guide, provides an overview of the 14 principles and explain the importance for each business, in any country, to implement them within their own organizations.
Data privacy has long been an issue of public concern, and with changes in online technology, the problem has only deepened. From a legal perspective, a website’s privacy policy essentially functions as an agreement with a site’s users in which the operator seeks consent or agreement from the users to collect and process their personal information. The privacy policy also informs users of the specific type of information the site collects, and how this information will be utilised, processed or shared with third parties.
Improvements to the first Privacy Shield include better data retention provisions and independent Ombudsman, but Data Protection Authorities still cautious.
In this, the final instalment in the series, Pauline C. Reich, Professor and Director of the Asia-Pacific Cyberlaw, Cybercrime and Internet Security Research Institute at the Waseda University School of Law in Tokyo, Japan examines the implications of the recent US v. Apple case in terms of disclosure requirements in Asia and across the globe.
The use and disclosure of personal data for direct marketing purposes is strictly regulated in Hong Kong with more severe consequences for non-compliance than other breaches of Hong Kong privacy law, and is often found to be significantly more onerous than in other jurisdictions. This article summarises some of the key elements of Hong Kong’s direct marketing regime.