Creating a Personal Data Management Exit Strategy

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Next

Click through for five steps that should be considered when preparing to hand over personal data to a specialized "personal-data" processor, as identified by Gartner, Inc.

Organizations should create a privacy program that keeps personal data at arm's length, but under control, according to Gartner, Inc. Gartner predicts that by 2019, 90 percent of organizations will have personal data on IT systems that they don't own or control.

Enterprises have traditionally been the target of security threats, and until recently, those hackers focused on attacking vulnerable IT infrastructure. As protection for such infrastructure improves, the attackers' attention shifts to softer targets, such as employees, contract workers, customers, citizens and patients.

"As the amount of personal information increases multifold, individuals and their personal data will increasingly become a security target. And, yet in most scenarios the organization is still ultimately accountable for the personal data on its IT systems," said Carsten Casper, research vice president at Gartner. "The time has come to create an exit strategy for the management of personal data. Strategic planning leaders will want to move away from storing and processing personal data in the next five years."

"The PCI Data Security Standard (DSS) requires the implementation of stringent controls of those who collect and store credit card data. In response, many companies have decided to eliminate credit card data from their own systems and completely entrust it to an external service provider," said Mr. Casper. "The same could happen with personal data. If control requirements are too strong and implementation is too costly, it would make sense to hand over personal data to a specialized 'personal-data processor.'"

Gartner has identified the following steps to prepare for such a strategy.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IpswitchDisruptiveTech0x 6 Devices Poised to Disrupt Your Network in 2016

With all the new products being introduced to company networks, the opportunity for vulnerabilities and security and compliance complications continues to escalate for IT teams. ...  More >>

xMattersIncidentMgmt0x 8 Major Incident Management Trends Worth Noticing

Survey results suggest management may be placing more emphasis on being kept informed during an event than on ensuring timely resolution. ...  More >>

Security94-190x128 The Human Factor: 5 Security Blunders People Keep Making

No matter how much you nag people, plead with them and warn them, these mistakes and risky behaviors never seem to end. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.