Creating a Personal Data Management Exit Strategy

1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Next

Click through for five steps that should be considered when preparing to hand over personal data to a specialized "personal-data" processor, as identified by Gartner, Inc.

Organizations should create a privacy program that keeps personal data at arm's length, but under control, according to Gartner, Inc. Gartner predicts that by 2019, 90 percent of organizations will have personal data on IT systems that they don't own or control.

Enterprises have traditionally been the target of security threats, and until recently, those hackers focused on attacking vulnerable IT infrastructure. As protection for such infrastructure improves, the attackers' attention shifts to softer targets, such as employees, contract workers, customers, citizens and patients.

"As the amount of personal information increases multifold, individuals and their personal data will increasingly become a security target. And, yet in most scenarios the organization is still ultimately accountable for the personal data on its IT systems," said Carsten Casper, research vice president at Gartner. "The time has come to create an exit strategy for the management of personal data. Strategic planning leaders will want to move away from storing and processing personal data in the next five years."

"The PCI Data Security Standard (DSS) requires the implementation of stringent controls of those who collect and store credit card data. In response, many companies have decided to eliminate credit card data from their own systems and completely entrust it to an external service provider," said Mr. Casper. "The same could happen with personal data. If control requirements are too strong and implementation is too costly, it would make sense to hand over personal data to a specialized 'personal-data processor.'"

Gartner has identified the following steps to prepare for such a strategy.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

email8-190x128 Phishing 101: Beware and Prepare this Holiday Season

With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks. ...  More >>

Poremba2016Security0x 10 Security Trends to Look for in 2016

So what is on the horizon for 2016? Most experts expect to see continued growth in mobile malware and even more security breaches, especially in the health care and financial industries. ...  More >>

Security86-290x195 Reduce Data Breach Damage by Improving Detection and Response

The new age of security technology will focus on solutions that speed up, automate and ideally combine phases of the typical security process. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.