Protect Privacy

In this part of this tutorial, we’ll take a look at protecting privacy to help you understand the different aspects of protecting privacy. One of the important aspects of cyber security is protecting privacy. The requirement for data privacy, is to share personal data securely to authorized parties depending upon the requirement.

Data Owners

A data owner can provide approval to process or share the personal information with others (like corporations). So, the entity that processes, stores, or transmits the information on behalf of the owner is called a licensee.

Data Processors

When a third-party vendor is affianced by the license to create, receive, maintain, or transmit personal information, such entities are called data processors.

Data Remanence

Data that remains even after erasing or formatting digital media is called Residual Data and the property to retain such data is called Data Remanence.

Delete the data from digital media (Of course, after they have been backed up) It is not usually done completely. The possibility of residual data remains. Even, in some systems, only the table entries for the data are removed.

ITperfection-Server room-Computer Networking Computer Networking ITperfection-Data-Secuirty-Network-Security-Cyber Computer Networking Cyber Security Support Hack-Network Security-HIPPA, CISSP- IT security-Data security-IT service provider- Networking- CISSP-CEH

Data Collection Limitations

  • Data collection must is legal and fair
  • Data collection with the knowledge and approval of the subject.
  • Do not use personal data for other purposes
  • Collected data to be accurate and kept up to date.
  • Do not disclose personal data with other parties without the permission of the subject.
  • Secure personal data against intentional or unintentional access, use, disclosure, destruction, and modification.

Go CISSP’s Home