Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Private I’s and Prying Eyes: Balancing Transparency and Access with PII

Privacy Is Impossible Without Security, and Security is Being Challenged By the Privacy Requirements of Transparency and Access.

Privacy Is Impossible Without Security, and Security is Being Challenged By the Privacy Requirements of Transparency and Access.

You can have security without privacy, but you cannot have privacy without security. This means you can have excellent security, let’s say, in the workplace, if you make everyone work without clothes on a system without Internet access as you log every keystroke they make and record their phone conversations. But this environment would be somewhat lacking in privacy.

To have privacy, you must have security to protect things you wish not to share from those who are interested. A simple form of security to maintain privacy is the window curtain. Privacy relies heavily on security. But the relationship becomes strained when it comes to transparency and access.

Privacy and SecurityTransparency and access mean that people should be able to see what information is collected about them and be able to update or delete this information. Last February, the White House released the Consumer Privacy Bill of Rights that included the principles of transparency and access. In July, the Commerce Department started holding meetings to decide concrete enforcement terms for the Privacy Bill of Rights with a focus on creating a consumer data transparency code of conduct for mobile apps. California’s Attorney General’s office is going after app developers that don’t have privacy statements and clear descriptions of how data is collected and used.

Transparency and access are rising in priority in the US and in the EU. The EU, while it is not law yet, would have transparency and access go so far as to grant people the right to be forgotten. This idea, being socialized currently by Viviane Reding, the Vice President of the European Commission, would mean that Google and Facebook would have to dump a person’s personal information on demand. Unsurprisingly, they are not huge fans of this.

How Does this Affect Network Managers and Security Professionals?

Implementing the systems required for transparency and access creates a host of technical challenges. For example, allowing consumers access to their information means that network managers have to develop and implement policies and procedures to allow access and modification. This leads to a huge authentication issue. Is it your customer, partner or employee wishing to see their information or is it someone posing as one of these persons? Imagine there is a boat with holes below the waterline for the propeller and the rudder. Holes like this are, of course, necessary but each additional hole, like water intake to cool the engine, means one more way for water to get in.

Now, think of this in terms of your network. Consumer access will create a huge hole below the waterline. And the way you implement the access needs to be transparent and user-friendly for the consumer. It can’t be a treasure hunt to find and modify information.

What Should You Be Doing?

Advertisement. Scroll to continue reading.

Start thinking now about what information your company has that could be considered personal information. First of all, what is personal information? Under the California Online Privacy Protection Act, personally identifiable information includes first and last name, physical or email address, telephone number, social security number, or any other identifier that permits the physical or online contacting of a specific individual. Second, do you collect any of this data? If so, where do you store it and how would you give a customer access to this info, allow them to correct misinformation, and possibly remove this information from your database?

How Is This Really Going to Play Out?

While I think security professionals need to prepare to be a part of the transparency and access solution, the implementation will be limited and the right to be forgotten will have an even more narrow scope. What is coming, instead, is a higher expectation that companies: 1) know what information they are collecting, where it is stored, how it is used and whom it is shared with, 2) describe all of this in understandable language for the user, and 3) have a rock solid plan for ensuring information is aggregated and made anonymous in a way that even disclosure will not automatically lead to financial harm or personal embarrassment to the data subjects. This last one is no easy task in the age of Big Data pinpoint profiling. Companies are going to be faced with the choice of greater transparency and access (creating holes below the waterline) or re-thinking the way they collect and use information in order to de-link it from the individual.

Privacy is impossible without security, and security is becoming more of a challenge with the privacy requirements of transparency and access. For companies concerned with the security burden of implementing transparency and access and loath to allow folks to be forgotten, the solution will be to devise new ways to collect enough information for the business purpose but not so much that the data subject has cause for financial or personal concern. Companies that solve this dilemma will see their futures rise above others.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Compliance

Web scraping is a sensitive issue. Should a third party be allowed to visit a website and use automated tools to gather and store...

Cloud Security

Proofpoint removes a formidable competitor from the crowded email security market and adds technology to address risk from misdirected emails.