Creating a Personal Data Management Exit Strategy

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for five steps that should be considered when preparing to hand over personal data to a specialized "personal-data" processor, as identified by Gartner, Inc.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

Organizations should create a privacy program that keeps personal data at arm's length, but under control, according to Gartner, Inc. Gartner predicts that by 2019, 90 percent of organizations will have personal data on IT systems that they don't own or control.


Enterprises have traditionally been the target of security threats, and until recently, those hackers focused on attacking vulnerable IT infrastructure. As protection for such infrastructure improves, the attackers' attention shifts to softer targets, such as employees, contract workers, customers, citizens and patients.

"As the amount of personal information increases multifold, individuals and their personal data will increasingly become a security target. And, yet in most scenarios the organization is still ultimately accountable for the personal data on its IT systems," said Carsten Casper, research vice president at Gartner. "The time has come to create an exit strategy for the management of personal data. Strategic planning leaders will want to move away from storing and processing personal data in the next five years."

"The PCI Data Security Standard (DSS) requires the implementation of stringent controls of those who collect and store credit card data. In response, many companies have decided to eliminate credit card data from their own systems and completely entrust it to an external service provider," said Mr. Casper. "The same could happen with personal data. If control requirements are too strong and implementation is too costly, it would make sense to hand over personal data to a specialized 'personal-data processor.'"

Gartner has identified the following steps to prepare for such a strategy.

 

More Slideshows

LogRhythmHeartbleed0x Heartbleed: Eight Tips and Strategies for Keeping Safe

One of the most dangerous IT security threats of all time emerged recently -- a bug called Heartbleed. Here are eight tips for keeping your data safe. ...  More >>

Security27-290x195 Seven Key Components to Start Your Incident Response Plan

Regardless of the size of an enterprise or its industry, organizations must create and implement an incident response program to effectively and confidently respond to the current and emerging cyber threats. ...  More >>

Misc21-290x195 Final Patch Tuesday Quietly Ushers Out XP and 2003

In the final Patch Tuesday for Windows XP and Office 2003, Microsoft released four patches today, two critical and two important, that cover a total of just 11 CVEs. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.