At present, one of the most valuable resource - unless the most - is information. Data protection became essential part of almost any area of the everyday life. The broad term of data protection could be divided in two separate aims.
Most obvious goal is to keep and process data in a secure manner. CIA triad could expand the meaning of secure in this context (SecurityScorecard, 2021).
C for Confidentiality. This component ensures that the right information could be accessed by individual with correct authorization. Unless information is public, any subject should have legitimate reason to access certain data. Permission should be granted only for necessary data and only for period of time when such data is needed. Authorization should be revoked immediately after access to data is no longer required.
I for Integrity. Another fundamental component that protects information itself. Data has to be reliable and correct, thus must be kept safe from unauthorized changes.
A for Availability. Information needs to be accessible to authorized entities at any time. Disruption in availability could be caused by corruption or deletion of data, interference with storing device or with the transfer of data - for example by denial of service attack.
The other less obvious aim of data protection is to ensure entities have control over their data and to enforce their rights regarding information. Information subject must express consent before data is collected or processed - consent could not be assumed. Subject has also right to modify or request deletion of part or all data. Any data leak or security breach that could have possibly exposed individual information needs to be disclosed to all affected entities. Those are examples of rights every data subject have regarding their information (ICO, 2018).
At present, there is increasingly more attention from governments to privacy and data protection issues. The law is getting more precise and tend to get unified internationally for extensive protection and adaptation to services accessible worldwide.
References:
ICO, 2018. Guide to the General Data Protection Regulation (GDPR)/ Individual rights. [online] Information Commissioner's Office. Available at: <https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/> [Accessed 11 May 2022].SecurityScorecard, 2021. What is the CIA Triad? Definition and Examples. [online] SecurityScorecard. Available at: <https://securityscorecard.com/blog/what-is-the-cia-triad> [Accessed 11 May 2022].
Expand on your secondary research base to have more relevant information for this research.
ReplyDelete