SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
52 Issue 46 | Quarter Two 2014
FEATURE
I
t’s the information age; there’s data, data
everywhere. By 2020 IDC forecasts that we
will generate 40 zettabytes (ZB) of data. To
give you an idea of just how much data that
is, American linguist Mark Liberman calculated the
storage requirements for all human speech ever
spoken at 42 zettabytes if digitized as 16 kHz 16-bit
audio. Every minute of every day we create more
than 204 million email messages, over two million
Google search queries and $272,000 is spent on
e-commerce. Not only is that a lot of information,
but amongst it is a great deal of data that is
categorised as sensitive – financial information,
personal health information, personally identifiable
information and trade secrets and intellectual
property. And being breached.
Mega breaches and new targets
The OpenSSL Heartbleed vulnerability was a
timely reminder that sensitive data is not always as
secure as it should be. Symantec’s Internet Security
Threat Report 2014 also showed that data breaches
are getting bigger. It declared 2013 “the year of
the mega breach”. A mega breach is a breach that
exposed one or more pieces of information about
more than 10 million identities. In 2012 there was
only one mega breach. In 2013 there were eight.
In total Symantec says over 552 million identities
were breached in 2013, “putting consumer’s credit
card information, birth dates, government ID
numbers, home addresses, medical records, phone
numbers, financial information, email addresses,
logins, passwords, and other personal information
into the criminal underground”. The total number
of breaches in 2013 was 62 percent greater than
in 2012 with 253 total breaches and the top types
of information breached were real names, birth
dates and government ID numbers (such as social
security). Along with the usual targets, Symantec
says that attackers are now turning to the internet
of things and wearables.
“Baby monitors, as well as security cameras and
routers, were famously hacked in 2013. Furthermore,
security researchers demonstrated attacks against
smart televisions, automobiles and medical
equipment. This gives us a preview of the security
challenge presented by the rapid adoption of the
internet of things (IoT),” the report states.
Symantec’s director of technology Sean Kopelke
noted; “If we can hack Google Glass then we can
actually see someone punch in their PIN.”
The revelations of the Heartbleed vulnerability in April and the recent
implementation of Australia’s new privacy regime in March have put data
breaches firmly back in the limelight. Clare Coulson finds out more...
Protect
and serve
how safe is your
personal data?
Image:midnightrider79
53Issue 46 | Quarter Two 2014
Although many organisations have invested in
anti-virus technology, sniffers and next-generation
firewalls, security experts attending the Techleaders
Forum in Queensland in February said these were
no longer a guarantee of security as they generally
only protected organisations from a known threat.
Vendors recommended companies take a layered
approach to security using a range of tools and
services in order to provide themselves with the
best chance of protection.
Who is sharing your information?
Last year the Wall Street Journal conducted
a test to identify what personal information gets
passed to other companies when users log in to
a site. It reported that it had tested: “50 of the top
sites (by US traffic) that offer registration, excluding
sites that required a real-world account, such as
banking sites.
The results showed that 50 percent of the
sites tested were sharing some kind of data with
third parties, including email addresses, names,
usernames, age or year of birth, zip code or other
information either in full, in part or encoded. Fifty-
three percent of the sites that sent either email
addresses or usernames, sent them in full.
In general the information shared with third
parties was for analytics, targeted self-promotion or
to serve advertising. In some cases, such as dating
and networking sites, the information was also used
to perform services on users’ behalf.
Five of the 50 sites tested shared full, unencoded
email addresses, including CNN.com, Ask.com,
Pinterest, Whitepages and the Wall Street Journal
itself. Another five shared partial or encoded email
addresses. CNN and the Whitepages responded to
the Journal saying they were investigating while
Pinterest and Ask.com said they no longer practice
this. The WSJ.com said most of its personally
identifiable information detected was transmitted in
error and that it is working to close that hole.
Those sites that pass on the most data fields
can be seen as instrumental in leaking sensitive
information – even anonymous data can be
gathered and later paired with email addresses
from other sources to reveal the behaviour of
a named person for more targeted advertising
purposes.
A/NZ by the numbers
In his keynote speech Federal Attorney General,
Senator George Brandis told the Cebit conference
in Sydney in May that cybercrime was now costing
Australia over $1 billion a year. He said that although
IT was a key enabler of business and all aspects
of modern life it was “unfortunately also a key
enabler of crime and security threats”. In a separate
Cebit speech Joe Franzi, assistant secretary cyber
security at the Australian Signals Directorate,
confirmed that attacks were on the rise, with
reports to the Cyber Security Operations Centre up
from 1259 in 2011 to 2168 last year. He said mining
and resources, energy, defence, technology and
financial sector organisations were at greatest risk.
In New Zealand the 2013 annual report from
the Office of the Privacy Commissioner showed
a sharp increase in the number of data breaches
being voluntarily reported. While such reporting
remains voluntary in New Zealand the Office of the
Privacy Commissioner has recently started to track
breach notifications more formally. In 2012-13 there
were 107 breaches reported, only 23 of which came
from the private sector. Government, hospitals
and other health agencies reported the most
breaches. Interestingly the data also shows that
the largest number of breaches seemed to come
down to human error, with ‘ Electronic information
sent to wrong recipient ‘ and ‘Physical information
sent to wrong recipient’ being the most frequent
cause of breaches, followed by website problems.
Only four instances of data breach were caused
by hacking in 2012-13. However, because breach
reporting is entirely voluntary at present the Privacy
Commission’s figures are unlikely to reflect the actual
number of breaches that occur and who they are
happening to, with many private companies likely
reluctant to broadcast such information.
A new regime
On March 12 Australia implemented its new
privacy regime; the most significant shakeup in
its privacy laws in over two decades. The 13 new
Australian Privacy Principles (APPs) replace the
previous 10 National Privacy Principles and affect
Government departments, most private enterprises
and not-for-profit organisations.
To be compliant organisations have to have
processes and technology in place to allow access
to information not just on corporate CRMs for
example, but also information collected from emails
or social networks. The onus is now on businesses
and other organisations to protect the information
and privacy of their clients. To achieve this APP 1
requires entities to consider a ‘privacy by design’
approach to systems and procedures, and embed
“On March 12 Australia
implemented its new
privacy regime; the
most significant
shakeup in its privacy
laws in over two
decades.”
54 Issue 46 | Quarter Two 2014
FEATURE // DATA BREACHES
privacy protections in the design of their information
handling practices. Compliance will help to establish
an organisational culture and processes that will
assist with compliance with all the other APPs.
At the very minimum these organisations need
to have a clearly defined and well-publicised policy
regarding data management and ensure that staff
understand and comply with that policy. The new
rules also require much more transparency on the
part of large organisations which use personal data
so consumers receiving direct marketing materials
can now find out more about what information is
being held and how it is being used.
A whitepaper by Hitachi Data Systems, says
that data quality and integrity are paramount for a
successful privacy programme. It says that entities
affected by the new regime will need to ensure that
any customer data that is to be retained, whether
it is structured data in a CRM or unstructured
data in emails, log files or social media, needs
to be managed in an “immutable, auditable and
versioned” manner. This means the data needs to
be protected, copied and searchable.
According to law firm Corrs Chambers Westgarth,
even foreign companies conducting activities in
Australia are subject to the new Principles. And their
activities outside Australia are covered by the Act, if:
a) 	 they “carry on business in Australia”; and
b) 	 they collect or hold personal information in
Australia.
This is the case even if they have no physical
premises in Australia but a web presence that collects
the personal information of people who are physically
in Australia. A foreign company will also find that if it
enters a transaction with an Australian organisation
that involves the transfer of personal information
from Australia to the foreign company, the Australian
organisation will seek a contractual obligation by the
foreign company to uphold the APPs. 
The missing piece
Although the new privacy rules in Australia have
created penalties of up to $1.7 million for enterprises
which fail to properly protect data, they stop short
of requiring that data breaches be disclosed as they
are in the USA.
In New Zealand disclosure also remains
voluntary, however, in its 2011 review of New
Zealand privacy legislation the Law Commission
recommended that New Zealand needs to move
to mandatory breach reporting in cases of serious
breaches – something the Office of the Privacy
Commission is publically supportive of.
Until such requirements are law, however, it
is likely that there will not be enough incentive
for proper data protection and disclosure by the
corporate sector in particular for fear that such
revelations may do more damage than good. And
with estimates that the Target credit card hack in
the lead up to last Christmas cost the company
more than $500 million and wiped 10 percent off its
market capitalisation one can see why.
Australian Privacy Principles
— a summary
The Office of the Australian Information
Commissioner has put together a
summary of the new Australian Privacy
Principles for private sector organisations,
Australian Government and Norfolk Island
agencies covered by the Privacy Act 1988.
It, along with other information, can be
found at: http://www.oaic.gov.au/privacy/
privacy-resources/privacy-guides/app-
quick-reference-tool

Más contenido relacionado

La actualidad más candente

The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Data Theft Restrospective
Data Theft RestrospectiveData Theft Restrospective
Data Theft Restrospectiveolambel
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesEchoworx
 
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...Jessica Pattison
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securitySamo Zavašnik
 
Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsThe Economist Media Businesses
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher EducationRapid7
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraRapid7
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015James Sheehan
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadashibrah76
 
GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?MediaPost
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 

La actualidad más candente (20)

The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 
Data Theft Restrospective
Data Theft RestrospectiveData Theft Restrospective
Data Theft Restrospective
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
Cybersecurity White Paper 05_2016
Cybersecurity White Paper 05_2016Cybersecurity White Paper 05_2016
Cybersecurity White Paper 05_2016
 
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL security
 
Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next steps
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher Education
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 

Similar a iStart feature: Protect and serve how safe is your personal data?

Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decadestudentinternetdeals33
 
Iso 27001 whitepaper
Iso 27001 whitepaperIso 27001 whitepaper
Iso 27001 whitepaperSyzygal
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Data security
Data securityData security
Data securityoco26
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERYashiVaidya
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 

Similar a iStart feature: Protect and serve how safe is your personal data? (20)

IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
Iso 27001 whitepaper
Iso 27001 whitepaperIso 27001 whitepaper
Iso 27001 whitepaper
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Data security
Data securityData security
Data security
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPER
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 

Más de Hayden McCall

iStart feature: Satisfaction calling: does outsourcing contact centres work?
iStart feature: Satisfaction calling: does outsourcing contact centres work?iStart feature: Satisfaction calling: does outsourcing contact centres work?
iStart feature: Satisfaction calling: does outsourcing contact centres work?Hayden McCall
 
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...Hayden McCall
 
iStart feature: Tracking the customer pulse
iStart feature: Tracking the customer pulseiStart feature: Tracking the customer pulse
iStart feature: Tracking the customer pulseHayden McCall
 
iStart feature: All you need is love: A modern marketers's tech guide
iStart feature: All you need is love: A modern marketers's tech guideiStart feature: All you need is love: A modern marketers's tech guide
iStart feature: All you need is love: A modern marketers's tech guideHayden McCall
 
iStart - feature: The anatomy of technology as a change agent
iStart - feature: The anatomy of technology as a change agentiStart - feature: The anatomy of technology as a change agent
iStart - feature: The anatomy of technology as a change agentHayden McCall
 
iStart - Technology in business Q3 2013 Magazine
iStart - Technology in business Q3 2013 MagazineiStart - Technology in business Q3 2013 Magazine
iStart - Technology in business Q3 2013 MagazineHayden McCall
 
iStart - Business Intelligence: What are you really investing in?
iStart - Business Intelligence: What are you really investing in?iStart - Business Intelligence: What are you really investing in?
iStart - Business Intelligence: What are you really investing in?Hayden McCall
 
iStart - ANZ bank merger is no horseplay
iStart - ANZ bank merger is no horseplayiStart - ANZ bank merger is no horseplay
iStart - ANZ bank merger is no horseplayHayden McCall
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationHayden McCall
 
iStart - eHealth Vital signs for the future of health technology
iStart - eHealth Vital signs for the future of health technologyiStart - eHealth Vital signs for the future of health technology
iStart - eHealth Vital signs for the future of health technologyHayden McCall
 
iStart - Unified Communications comes of age
iStart - Unified Communications comes of ageiStart - Unified Communications comes of age
iStart - Unified Communications comes of ageHayden McCall
 
iStart - Ignoring the gut feel: The emerging world or predictive analytics
iStart - Ignoring the gut feel: The emerging world or predictive analyticsiStart - Ignoring the gut feel: The emerging world or predictive analytics
iStart - Ignoring the gut feel: The emerging world or predictive analyticsHayden McCall
 
iStart - Brave New World: GIS solutions in the cloud
iStart - Brave New World: GIS solutions in the cloudiStart - Brave New World: GIS solutions in the cloud
iStart - Brave New World: GIS solutions in the cloudHayden McCall
 
iStart - Sharepoint: Getting to the point
iStart - Sharepoint: Getting to the pointiStart - Sharepoint: Getting to the point
iStart - Sharepoint: Getting to the pointHayden McCall
 
iStart - 15 things your CRM system could be telling you (but probably isn't)
iStart - 15 things your CRM system could be telling you (but probably isn't)iStart - 15 things your CRM system could be telling you (but probably isn't)
iStart - 15 things your CRM system could be telling you (but probably isn't)Hayden McCall
 
iStart - eprocurement: Corral your maverick spend
iStart - eprocurement: Corral your maverick spendiStart - eprocurement: Corral your maverick spend
iStart - eprocurement: Corral your maverick spendHayden McCall
 
iStart plugged in POS
iStart plugged in POSiStart plugged in POS
iStart plugged in POSHayden McCall
 
iStart the desktop goes virtual
iStart the desktop goes virtualiStart the desktop goes virtual
iStart the desktop goes virtualHayden McCall
 
iStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computingiStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computingHayden McCall
 

Más de Hayden McCall (19)

iStart feature: Satisfaction calling: does outsourcing contact centres work?
iStart feature: Satisfaction calling: does outsourcing contact centres work?iStart feature: Satisfaction calling: does outsourcing contact centres work?
iStart feature: Satisfaction calling: does outsourcing contact centres work?
 
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...
 
iStart feature: Tracking the customer pulse
iStart feature: Tracking the customer pulseiStart feature: Tracking the customer pulse
iStart feature: Tracking the customer pulse
 
iStart feature: All you need is love: A modern marketers's tech guide
iStart feature: All you need is love: A modern marketers's tech guideiStart feature: All you need is love: A modern marketers's tech guide
iStart feature: All you need is love: A modern marketers's tech guide
 
iStart - feature: The anatomy of technology as a change agent
iStart - feature: The anatomy of technology as a change agentiStart - feature: The anatomy of technology as a change agent
iStart - feature: The anatomy of technology as a change agent
 
iStart - Technology in business Q3 2013 Magazine
iStart - Technology in business Q3 2013 MagazineiStart - Technology in business Q3 2013 Magazine
iStart - Technology in business Q3 2013 Magazine
 
iStart - Business Intelligence: What are you really investing in?
iStart - Business Intelligence: What are you really investing in?iStart - Business Intelligence: What are you really investing in?
iStart - Business Intelligence: What are you really investing in?
 
iStart - ANZ bank merger is no horseplay
iStart - ANZ bank merger is no horseplayiStart - ANZ bank merger is no horseplay
iStart - ANZ bank merger is no horseplay
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
 
iStart - eHealth Vital signs for the future of health technology
iStart - eHealth Vital signs for the future of health technologyiStart - eHealth Vital signs for the future of health technology
iStart - eHealth Vital signs for the future of health technology
 
iStart - Unified Communications comes of age
iStart - Unified Communications comes of ageiStart - Unified Communications comes of age
iStart - Unified Communications comes of age
 
iStart - Ignoring the gut feel: The emerging world or predictive analytics
iStart - Ignoring the gut feel: The emerging world or predictive analyticsiStart - Ignoring the gut feel: The emerging world or predictive analytics
iStart - Ignoring the gut feel: The emerging world or predictive analytics
 
iStart - Brave New World: GIS solutions in the cloud
iStart - Brave New World: GIS solutions in the cloudiStart - Brave New World: GIS solutions in the cloud
iStart - Brave New World: GIS solutions in the cloud
 
iStart - Sharepoint: Getting to the point
iStart - Sharepoint: Getting to the pointiStart - Sharepoint: Getting to the point
iStart - Sharepoint: Getting to the point
 
iStart - 15 things your CRM system could be telling you (but probably isn't)
iStart - 15 things your CRM system could be telling you (but probably isn't)iStart - 15 things your CRM system could be telling you (but probably isn't)
iStart - 15 things your CRM system could be telling you (but probably isn't)
 
iStart - eprocurement: Corral your maverick spend
iStart - eprocurement: Corral your maverick spendiStart - eprocurement: Corral your maverick spend
iStart - eprocurement: Corral your maverick spend
 
iStart plugged in POS
iStart plugged in POSiStart plugged in POS
iStart plugged in POS
 
iStart the desktop goes virtual
iStart the desktop goes virtualiStart the desktop goes virtual
iStart the desktop goes virtual
 
iStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computingiStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computing
 

Último

Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 

Último (20)

Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

iStart feature: Protect and serve how safe is your personal data?

  • 1. 52 Issue 46 | Quarter Two 2014 FEATURE I t’s the information age; there’s data, data everywhere. By 2020 IDC forecasts that we will generate 40 zettabytes (ZB) of data. To give you an idea of just how much data that is, American linguist Mark Liberman calculated the storage requirements for all human speech ever spoken at 42 zettabytes if digitized as 16 kHz 16-bit audio. Every minute of every day we create more than 204 million email messages, over two million Google search queries and $272,000 is spent on e-commerce. Not only is that a lot of information, but amongst it is a great deal of data that is categorised as sensitive – financial information, personal health information, personally identifiable information and trade secrets and intellectual property. And being breached. Mega breaches and new targets The OpenSSL Heartbleed vulnerability was a timely reminder that sensitive data is not always as secure as it should be. Symantec’s Internet Security Threat Report 2014 also showed that data breaches are getting bigger. It declared 2013 “the year of the mega breach”. A mega breach is a breach that exposed one or more pieces of information about more than 10 million identities. In 2012 there was only one mega breach. In 2013 there were eight. In total Symantec says over 552 million identities were breached in 2013, “putting consumer’s credit card information, birth dates, government ID numbers, home addresses, medical records, phone numbers, financial information, email addresses, logins, passwords, and other personal information into the criminal underground”. The total number of breaches in 2013 was 62 percent greater than in 2012 with 253 total breaches and the top types of information breached were real names, birth dates and government ID numbers (such as social security). Along with the usual targets, Symantec says that attackers are now turning to the internet of things and wearables. “Baby monitors, as well as security cameras and routers, were famously hacked in 2013. Furthermore, security researchers demonstrated attacks against smart televisions, automobiles and medical equipment. This gives us a preview of the security challenge presented by the rapid adoption of the internet of things (IoT),” the report states. Symantec’s director of technology Sean Kopelke noted; “If we can hack Google Glass then we can actually see someone punch in their PIN.” The revelations of the Heartbleed vulnerability in April and the recent implementation of Australia’s new privacy regime in March have put data breaches firmly back in the limelight. Clare Coulson finds out more... Protect and serve how safe is your personal data? Image:midnightrider79
  • 2. 53Issue 46 | Quarter Two 2014 Although many organisations have invested in anti-virus technology, sniffers and next-generation firewalls, security experts attending the Techleaders Forum in Queensland in February said these were no longer a guarantee of security as they generally only protected organisations from a known threat. Vendors recommended companies take a layered approach to security using a range of tools and services in order to provide themselves with the best chance of protection. Who is sharing your information? Last year the Wall Street Journal conducted a test to identify what personal information gets passed to other companies when users log in to a site. It reported that it had tested: “50 of the top sites (by US traffic) that offer registration, excluding sites that required a real-world account, such as banking sites. The results showed that 50 percent of the sites tested were sharing some kind of data with third parties, including email addresses, names, usernames, age or year of birth, zip code or other information either in full, in part or encoded. Fifty- three percent of the sites that sent either email addresses or usernames, sent them in full. In general the information shared with third parties was for analytics, targeted self-promotion or to serve advertising. In some cases, such as dating and networking sites, the information was also used to perform services on users’ behalf. Five of the 50 sites tested shared full, unencoded email addresses, including CNN.com, Ask.com, Pinterest, Whitepages and the Wall Street Journal itself. Another five shared partial or encoded email addresses. CNN and the Whitepages responded to the Journal saying they were investigating while Pinterest and Ask.com said they no longer practice this. The WSJ.com said most of its personally identifiable information detected was transmitted in error and that it is working to close that hole. Those sites that pass on the most data fields can be seen as instrumental in leaking sensitive information – even anonymous data can be gathered and later paired with email addresses from other sources to reveal the behaviour of a named person for more targeted advertising purposes. A/NZ by the numbers In his keynote speech Federal Attorney General, Senator George Brandis told the Cebit conference in Sydney in May that cybercrime was now costing Australia over $1 billion a year. He said that although IT was a key enabler of business and all aspects of modern life it was “unfortunately also a key enabler of crime and security threats”. In a separate Cebit speech Joe Franzi, assistant secretary cyber security at the Australian Signals Directorate, confirmed that attacks were on the rise, with reports to the Cyber Security Operations Centre up from 1259 in 2011 to 2168 last year. He said mining and resources, energy, defence, technology and financial sector organisations were at greatest risk. In New Zealand the 2013 annual report from the Office of the Privacy Commissioner showed a sharp increase in the number of data breaches being voluntarily reported. While such reporting remains voluntary in New Zealand the Office of the Privacy Commissioner has recently started to track breach notifications more formally. In 2012-13 there were 107 breaches reported, only 23 of which came from the private sector. Government, hospitals and other health agencies reported the most breaches. Interestingly the data also shows that the largest number of breaches seemed to come down to human error, with ‘ Electronic information sent to wrong recipient ‘ and ‘Physical information sent to wrong recipient’ being the most frequent cause of breaches, followed by website problems. Only four instances of data breach were caused by hacking in 2012-13. However, because breach reporting is entirely voluntary at present the Privacy Commission’s figures are unlikely to reflect the actual number of breaches that occur and who they are happening to, with many private companies likely reluctant to broadcast such information. A new regime On March 12 Australia implemented its new privacy regime; the most significant shakeup in its privacy laws in over two decades. The 13 new Australian Privacy Principles (APPs) replace the previous 10 National Privacy Principles and affect Government departments, most private enterprises and not-for-profit organisations. To be compliant organisations have to have processes and technology in place to allow access to information not just on corporate CRMs for example, but also information collected from emails or social networks. The onus is now on businesses and other organisations to protect the information and privacy of their clients. To achieve this APP 1 requires entities to consider a ‘privacy by design’ approach to systems and procedures, and embed “On March 12 Australia implemented its new privacy regime; the most significant shakeup in its privacy laws in over two decades.”
  • 3. 54 Issue 46 | Quarter Two 2014 FEATURE // DATA BREACHES privacy protections in the design of their information handling practices. Compliance will help to establish an organisational culture and processes that will assist with compliance with all the other APPs. At the very minimum these organisations need to have a clearly defined and well-publicised policy regarding data management and ensure that staff understand and comply with that policy. The new rules also require much more transparency on the part of large organisations which use personal data so consumers receiving direct marketing materials can now find out more about what information is being held and how it is being used. A whitepaper by Hitachi Data Systems, says that data quality and integrity are paramount for a successful privacy programme. It says that entities affected by the new regime will need to ensure that any customer data that is to be retained, whether it is structured data in a CRM or unstructured data in emails, log files or social media, needs to be managed in an “immutable, auditable and versioned” manner. This means the data needs to be protected, copied and searchable. According to law firm Corrs Chambers Westgarth, even foreign companies conducting activities in Australia are subject to the new Principles. And their activities outside Australia are covered by the Act, if: a) they “carry on business in Australia”; and b) they collect or hold personal information in Australia. This is the case even if they have no physical premises in Australia but a web presence that collects the personal information of people who are physically in Australia. A foreign company will also find that if it enters a transaction with an Australian organisation that involves the transfer of personal information from Australia to the foreign company, the Australian organisation will seek a contractual obligation by the foreign company to uphold the APPs.  The missing piece Although the new privacy rules in Australia have created penalties of up to $1.7 million for enterprises which fail to properly protect data, they stop short of requiring that data breaches be disclosed as they are in the USA. In New Zealand disclosure also remains voluntary, however, in its 2011 review of New Zealand privacy legislation the Law Commission recommended that New Zealand needs to move to mandatory breach reporting in cases of serious breaches – something the Office of the Privacy Commission is publically supportive of. Until such requirements are law, however, it is likely that there will not be enough incentive for proper data protection and disclosure by the corporate sector in particular for fear that such revelations may do more damage than good. And with estimates that the Target credit card hack in the lead up to last Christmas cost the company more than $500 million and wiped 10 percent off its market capitalisation one can see why. Australian Privacy Principles — a summary The Office of the Australian Information Commissioner has put together a summary of the new Australian Privacy Principles for private sector organisations, Australian Government and Norfolk Island agencies covered by the Privacy Act 1988. It, along with other information, can be found at: http://www.oaic.gov.au/privacy/ privacy-resources/privacy-guides/app- quick-reference-tool