Organizations should create a privacy program that keeps personal data at arm's length, but under control, according to Gartner, Inc. Gartner predicts that by 2019, 90 percent of organizations will have personal data on IT systems that they don't own or control.
Enterprises have traditionally been the target of security threats, and until recently, those hackers focused on attacking vulnerable IT infrastructure. As protection for such infrastructure improves, the attackers' attention shifts to softer targets, such as employees, contract workers, customers, citizens and patients.
"As the amount of personal information increases multifold, individuals and their personal data will increasingly become a security target. And, yet in most scenarios the organization is still ultimately accountable for the personal data on its IT systems," said Carsten Casper, research vice president at Gartner. "The time has come to create an exit strategy for the management of personal data. Strategic planning leaders will want to move away from storing and processing personal data in the next five years."
"The PCI Data Security Standard (DSS) requires the implementation of stringent controls of those who collect and store credit card data. In response, many companies have decided to eliminate credit card data from their own systems and completely entrust it to an external service provider," said Mr. Casper. "The same could happen with personal data. If control requirements are too strong and implementation is too costly, it would make sense to hand over personal data to a specialized 'personal-data processor.'"
Gartner has identified the following steps to prepare for such a strategy.
In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like endpoint and mobile security. ... More >>
Looking at cyber data through a business intelligence lens ensures that security-related trends and potential impacts to organizations can be understood and effectively addressed. ... More >>
Findings from a new study take a closer look at the evolution of encryption, analyzing adoption rates of the technology and the evolution of privacy awareness. ... More >>