Are we on the road to enabling better data protection and privacy regulations for private enterprise organizations?

1.3k viewscircle icon4 Comments
Sort by:
Executive Coach / Global Chief Information Officer & CISO in Education4 years ago

Two years ago, Illinois passed their own biometric laws and “people” oversight. There’s the General Data Protection Regulation (GDPR CNIL), and the California Consumer Privacy Act (CCPA), and every permutation: all “people” oversight. There are the opt-out compliance components, too. I love that you have to opt in at GDPR. I'm crushing every ad and cookie—I have every ad block because I don't trust the retargeting networks and everything else that Apple cited in their stance on blocking, which I'm all for.

Because when you go to the coffee shop, they'll follow you all the way to your house. So, trust was earned by some, and then it started to be removed by others. If it wasn't for some of the social media, and other integrations I'd be off Facebook and Twitter. But, it's nauseating that we have to lower the protections key to who we are and what we do, and just bolt on tools and process and oversight, etc., on top of that.

CTO4 years ago

There is an important legal theory called mosaic theory—if you aren't yet aware of it, I encourage you to go and look up. It’s about using obfuscation to some level to preserve privacy. For example, if you're my carrier, you know exactly where I am, you know where my house is, you know where I do everything. Should that data be made available to anybody else? Mosaic theory says that if you stand far back, you can see a mosaic as a full picture, but if you are close-up and I give you just a tile, like my city, then you’ll know I'm in my city, but you don't get any more than that. Mosaic theory is actually quite well established in law now, and I'd love to see it taken up more as part of a digitally-aware constitution.

2 Replies
no title4 years ago

If that were the case I and everything else on the planet would fall apart, because you’d only get one piece of validating information and you wouldn't be able to tie that together. But using transmit security, ForgeRock—or any of the other proof and variant—and every other call center component for verification, that's how you create a frictionless business piece, but you create those layers so you can step everybody up.

Lightbulb on1
no title4 years ago

It’s interesting to put the user back in control of that, because it's fine to use lots of information, although you don't need that much to know that it's me. It's important that the user is emailed the decision when a query is made, but then the problem is that lots of people could be asking. It's quite difficult.

Content you might like

AI-driven threats (deepfakes, automated attacks) 21%

Software supply chain risks 21%

Insider risk (both malicious & accidental) 13%

Regulatory compliance 11%

Cloud misconfigurations 13%

Shadow IT (or shadow AI) 11%

Ransomware 4%

Talent shortage in cybersecurity4%

Something else (comment to explain)2%

View Results

Artificial Intelligence / Machine Learning41%

Automation18%

Cloud17%

Edge / IoT6%

Augmented / Virtual Reality6%

Blockchain4%

5G3%

Other (comment)

View Results