SHARE
Facebook X Pinterest WhatsApp

PII Will Still Be Vulnerable Under GDPR

In these waning days of a world without GDPR regulations in effect, I think there is only one thing we are absolutely sure of: Data will never be 100 percent secure. Case in point is ICANN, the entity that manages the global domain name system. The ICANN organization proposed removing information provided in WHOIS, the […]

Written By
SP
Sue Poremba
May 24, 2018

In these waning days of a world without GDPR regulations in effect, I think there is only one thing we are absolutely sure of: Data will never be 100 percent secure.

Case in point is ICANN, the entity that manages the global domain name system. The ICANN organization proposed removing information provided in WHOIS, the system for querying databases. To help domain registrants comply with the GDPR, ICANN would remove registrants’ names, phone numbers and emails. However, ICANN would allow self-certified third parties to request access to the data at the approval of a higher authority.

Privacy experts have opposed the proposal, worrying that malicious actors will pose as anti-abuse professionals to gain access to user data. As privacy expert Angela Gunn told ZDNet:

Privacy and security belong together, but concealing WHOIS information offers a low return for privacy effort. Meanwhile, security researchers, investigators, other site admins, even ordinary citizens will pay dearly for the concealment.

ICANN’s approach is a high-profile example of the challenges all organizations will face in attempts to be GDPR compliant. It may be that as we think our data is going to have all of these levels of protection, our PII could be just as vulnerable under GDPR. I asked Mike Byrnes, senior manager of Identity and Access Management at Entrust Datacard, about PII’s vulnerability risks under GDPR. This is what he told me:

While GDPR does well to advance data privacy and security, it does not provide prescriptive details on how to become compliant, how to protect data and how to secure access to PII. PSD2 takes a far more comprehensive approach to outlining specific security requirements based on defined scenarios. In becoming GDPR compliant, security teams have the option of self-assessing the level of their data protection.

In the past, most organizations would focus on protecting and encrypting data on portable devices. Now, more companies will start to focus on data encryption across the entire organization – but it’s not guaranteed.

Another concern with GDPR is that while organizations have to continue to protect data in the future, they also need to find existing data that wasn’t considered PII before the regulation and make sure it is protected, as PII and GDPR’s definition of personal data are not completely aligned.

What this says to me is there are going to be a lot of mistakes made with GDPR, and those mistakes may add risk to our PII. There’s going to be a learning curve, to be sure. I can’t wait to revisit where GDPR stands this time next year.

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.