Skip to main content
banner image
venafi logo

Privacy and Encryption: Your Allies in Safeguarding Intellectual Assets

Privacy and Encryption: Your Allies in Safeguarding Intellectual Assets

encryption and privacy breaches
August 2, 2017 | Billy Spears

What does Privacy mean within your organization? How much privacy does an organization need? Should you even have a privacy function?

There isn’t a shortage of definitions on what ‘Privacy’ means. I did a quick google search on the key words “Privacy Definition” and it returned 173,000,000 results. Why isn’t there a single simple interpretation? Suppose I had a discussion with a broader group of privacy professionals and during our conversation I asked each of them what their definition or interpretation of privacy is? Do you think these ‘experts’ would agree on a single interpretation? Highly unlikely. Why not?

There are actually a number of definitions and dimensions to privacy. It is not my intent to debate those perspectives in this post. I just want to illustrate that privacy is complicated, the privacy profession is sophisticated and each professional is highly specialized. As a privacy professional, I believe it is my responsibility to advocate for humans whom do not understand they need this support.

Ok, so what is this privacy stuff about? Basically, Privacy is about safeguarding the appropriate use of personal data or Personally Identifiable Information (PII). What about the rest of our information? Should we protect that too?

Some of the most common questions I am asked are things like “How much privacy do I need?” What does the company need to protect? Why do we need so many tools? How much should data protection cost?

These are great questions. In order to effectively answer these questions, it is imperative that you understand the value of data within your organization. Investing in protecting all data equally seems like a phenomenal technique to increase costs and unnecessarily decrease shareholder dividends. The strategic implications for investing in governance, encryption, monitoring and storage (cloud or infrastructure) solutions brings associated expenses to your operating expenses. So, you really need to strategically assess how much and when to invest in the appropriate solution that makes sense for your organization’s needs.

In our current economy, information is being exchanged at exponential rates around the globe. Both consumers and businesses have a ”Data-On-Demand” mentality. Neither segment consciously thinks about the risks associated with each business dealing. For example, when you provide your data to a business in exchange for a product or service what happens next? Does your information stop at the completion of that transaction or is it looped through an infinite network of information exchange downstream? Let’s play this scenario out for a minute to illustrate this point.

Let’s say you are a consumer who loves music. You and a few friends are going to catch a concert at your local stadium. This seems like a simple night, but let’s analyze what happens to your information.

Your first stop is probably going to be to purchase your tickets online using your favorite credit card that doubles points and rewards you with cash back incentives for each purchase. Next you realize you have nothing to wear so you head to the local department store for some retail therapy. After finding the perfect concert apparel you need an energy boost. You decide to order a Starbucks using their app. In the car, you notice that your vehicles gas light indicates you need to stop for fuel. After picking up the cappuccino you swing by the local Costco to maximize your savings on gas prices.

Billy-privacy.png

Later that evening your friends all arrive and you guys head to the concert venue. None of you have cash for parking, so you stop at an ATM. Once arriving at the venue, you pay for parking, go through security and are admitted into the stadium. You pass a few concessions stands and decide to purchase refreshments and other items. You make it to your seat but continue purchasing refreshments throughout the evening. At the end of the evening your group decides to leave your car and Uber to an after events. There you decide to upload all of your excitement to social media.

What are the data risks in that scenario? There are at least eight types of data transactions to consider. What security controls does each business have to ensure the security of your data? Do you think the transfer of your data is encrypted? Should you care? Shouldn’t the secure exchange of information be a critical factor for every business. After all, isn’t data their most valuable commodity?

A very important element to any organization is ensuring appropriate safeguards are in place to protect exchanges of personal information. These are vital to preventing fraudulent activity, identity theft, and the confidence of your customers.

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

Data is valuable to you and cyber criminals

Cyber Criminals Know How Valuable Your Data Is. Do You?

hacker training

Hacking Requires Exceptional Skills: Can IT Security Pros Keep Up?

About the author

Billy Spears
Billy Spears

Billy is the Chief Information Security Officer at loanDepot. He has more than 20 years as a collaborative business partner and possesses deep expertise across the cyber security, privacy, and risk management fields.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat