Creating a Personal Data Management Exit Strategy

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Next

Click through for five steps that should be considered when preparing to hand over personal data to a specialized "personal-data" processor, as identified by Gartner, Inc.

Organizations should create a privacy program that keeps personal data at arm's length, but under control, according to Gartner, Inc. Gartner predicts that by 2019, 90 percent of organizations will have personal data on IT systems that they don't own or control.

Enterprises have traditionally been the target of security threats, and until recently, those hackers focused on attacking vulnerable IT infrastructure. As protection for such infrastructure improves, the attackers' attention shifts to softer targets, such as employees, contract workers, customers, citizens and patients.

"As the amount of personal information increases multifold, individuals and their personal data will increasingly become a security target. And, yet in most scenarios the organization is still ultimately accountable for the personal data on its IT systems," said Carsten Casper, research vice president at Gartner. "The time has come to create an exit strategy for the management of personal data. Strategic planning leaders will want to move away from storing and processing personal data in the next five years."

"The PCI Data Security Standard (DSS) requires the implementation of stringent controls of those who collect and store credit card data. In response, many companies have decided to eliminate credit card data from their own systems and completely entrust it to an external service provider," said Mr. Casper. "The same could happen with personal data. If control requirements are too strong and implementation is too costly, it would make sense to hand over personal data to a specialized 'personal-data processor.'"

Gartner has identified the following steps to prepare for such a strategy.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

CyphortSecurityParadigm0x Don't Let the IT Security Paradigm Shift Leave You Stranded

While funding and awareness have increased, it is unclear if organizations are making investments that keep up with the evolving security landscape. ...  More >>

AlientVaultMSSPMistakes0x Five Mistakes Managed Security Service Providers Should Avoid

MSSPs are at an exciting point where market acceptance, awareness and demand have converged. However, excitement and the prospect of profits can create haste, and with haste comes an increased risk of mistakes. ...  More >>

ITCareers34-190x128 Data Protection: Five Challenges Facing the Enterprise HR Department

HR departments are faced with unique security challenges - securing the flow of PII as well as sharing policies and inter-office communications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date