Embedding privacy and security to gain a competitive advantage
Ann Cavoukian and
Nandini Jolly
Journal of Data Protection & Privacy, 2018, vol. 1, issue 4, 400-409
Abstract:
Preserving privacy and protecting sensitive data are fundamental to the core values of individuals and free societies. There have been endless debates on how these values and obligations may be embedded into systems, preferably from the very beginning of the design process. This paper discusses the importance of security and Privacy by Design, both for individuals, as well as for corporations. It highlights a compelling approach for corporations to embrace security and Privacy by Design as a competitive advantage. Aside from adhering to changing regulations, there is power in using the latest cuttingedge technologies to increase consumer confidence. In light of the upcoming General Data Protection Regulation (GDPR), growing threats to sensitive data and the ongoing need to preserve privacy, a data-centric approach, where the protection follows the data wherever it goes, brings a disruptive approach in protecting personal and sensitive business data. Disruptive technologies such as the Circles of Trust security suite, offer persistent data protection for all digital assets. Encryption follows the data and sensitive assets remain protected, both at rest and regardless of where they travel, only allowing authorised personnel to access them, anywhere, everywhere. This also facilitates secure cross-border sharing and collaboration. All organisations have full control over their shared assets. Access can be revoked anytime. These privacy-enhancing capabilities extend to mobile devices as well as cloud storage. As custodians of people’s information and personal data, it is our duty to proactively protect the sanctity of this information. Innovation today offers proactive tools to maintain business continuity while protecting personal and business information from getting out into the public arena and being exploited — win/win!
Keywords: encryption; General Data Protection Regulation (GDPR); Privacy by Design; Circles of Trust; competitive advantage (search for similar items in EconPapers)
JEL-codes: K2 (search for similar items in EconPapers)
Date: 2018
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/3073/download/ (application/pdf)
https://hstalks.com/article/3073/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:jdpp00:y:2018:v:1:i:4:p:400-409
Access Statistics for this article
More articles in Journal of Data Protection & Privacy from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().