Jamaica Gleaner

DATA PRIVACY VS DATA SECURITY: WHAT IS THE DIFFERENCE?

- Taken from www. fortra.com

WHILE DATA privacy focuses on the governance of personal data, and data security concerns itself with protecting data from external and internal threats, both data security and data privacy are essential and should be addressed with layered security solutions. Discover the difference­s between the two concepts and how they overlap.

DATA SECURITY AND PRIVACY ARE DIFFERENT

Understand­ably, the terms data security and data privacy are frequently muddled together and sometimes used interchang­eably. While they are naturally connected, they are also unique and separate concepts.

To help ensure that the data your customers and employees entrust to your organisati­on is both handled appropriat­ely and secured throughout its lifecycle, review these concepts, along with their associated policies, procedures, and technologi­es, to help prevent malicious or unintentio­nal misuse or loss of data.

WHAT IS DATA PRIVACY?

Data privacy focuses on how personal data is collected, used, and shared – in other words, its governance. Regulation­s and laws addressing data privacy can vary by state and country in terms of how stringent they are and how they are enforced.

Worldwide, countries are coming to the realisatio­n that the strict guidelines designed to protect personal data privacy are in the best interest of both an organisati­on and individual­s. The European Union’s General Data Protection Regulation (GDPR) is the strictest regulation to date, with other countries modelling regulation­s after the privacy mandates of the GDPR.

While these enacted and proposed regulation­s are a huge step in ensuring data privacy, without a solid data-security foundation and technologi­cal solutions in place, data privacy simply cannot happen.

WHAT IS DATA SECURITY?

Data security, as opposed to data privacy, focuses on how data is protected from the many external and internal threats that exist. Data security policies and procedures can mitigate cyberthrea­ts and inadverten­t misuse; however, just putting these measures in place does not typically fully address data privacy concerns and regulation­s.

Data security encompasse­s the actual solutions an organisati­on puts in place to protect digital data at all points – from endpoints to networks to the perimeter.

A comprehens­ive data security policy should form the blueprint for your data security measures and cover three key areas: people, processes, and technologi­cal solutions to help enforce any policies set to surround and protect sensitive and private data.

WHAT’S THE DIFFERENCE BETWEEN DATA PRIVACY AND DATA SECURITY?

First, data privacy is NOT the same as data security. Data security is all the measures, policies, and technologi­es taken to protect data from external and internal threats. However, applying data security measures alone does not necessaril­y satisfy data-privacy requiremen­ts. Data privacy still requires adherence to regulation­s surroundin­g how the data organisati­ons secure is collected, shared, and used.

Data security protects data from malicious threats; data privacy addresses responsibl­e governance or use of that data. When developing data-security policies, the focus of protection measures is on preventing unauthoris­ed access to data. Tools such as encryption, user authentica­tion, and tokenisati­on can all amp up an organisati­on’s security stance.

When tackling data-privacy concerns, the focus is on data being procured,

processed, stored, and sent in compliance and with consent of the data subject. If an organisati­on is gathering data, individual­s need to know what type of data will be collected, why it is needed, and who will share this data for transparen­cy. In addition, the data subject needs to agree to these terms.

Using data with respect to an individual’s privacy is the key to data privacy. Data security measures can help ensure that personal identifica­tion in collected data is protected.

PROTECT DATA PRIVACY AND SECURITY WITH LAYERS OF SECURITY SOLUTIONS

Is there a singular solution to offer protection? No. However, establishi­ng policies and procedures to address sensitive data protection, as well as layering security solutions, can provide outstandin­g protection to data throughout its lifecycle. Layering solutions can address both privacy and security concerns. When choosing technology to support your organisati­onal privacy and security policies, check to ensure that the solutions can easily integrate to address these five key tactics:

1. Identify and classify files that may contain sensitive data.

2. Encrypt data to render sensitive data unreadable unless authorised.

3. Detect and prevent leaks of sensitive informatio­n outside your organizati­on

4. Secure and protect sensitive data that is shared inside and outside your organisati­on.

5. Manage rights to digital data to encrypt and control access to data no matter where it travels.

 ?? ??
 ?? ??

Newspapers in English

Newspapers from Jamaica