Data Privacy – Growing concern or a mere exaggeration?

posted in: Security | 0

How often are we coming across conversations around privacy of shared information these days? 1 in every 4 people are talking about the internet getting creepier by the day. We often share personal information on various sites such as Credit Card numbers, Bank Account details, Aadhar, along with Email IDs and Phone numbers. What most of us don’t realise is that this information is being used by organisations in developing intelligent technologies. Data drives technological innovation and there is no two ways about it. But, is this innovation turning into an invasion of privacy and becoming growing concern. or are we exaggerating because systems and software tools are getting intelligent by the day?


Is it a good thing that we are able to move into a phase where intelligent systems? will be able to provide better solutions to problems that are too complex for the human brain? One could agree to this without blinking! But if the possibility of this intelligence surpasses the boundaries of being helpful. in solving problems to create some like ID theft and fraud. then information and cyber security become a growing concern. And that is exactly what everybody is talking about lately. If you have watched ‘The Social Dilemma” on Netflix, you would agree that nothing we share on the web is safe anymore. we are providing a free hand for platforms, systems and software to pick our personal information and turn it into money making data for organisations to use at their will. It has become important to start thinking about securing the information being shared on the web. In the list of the worlds’ 70 largest platforms about market capitalization – America has 73%, China has 18% and Europe has 4% of the platforms. One of the primary drivers of the value of these companies is their ability to collect and analyze data of users. which often leads to network effects that help them grow and become very dominant actors in the economy. These companies have also been at the forefront of adopting AI to analyze this data.


It is proven without a doubt that we cannot live without the web or sharing information. We are a part of the generation that believes and thrives in digital transformation. On one side we have proponents of Data Democratisation. Believers of Data Democratisation propagate the idea. since it enables transparency, competitive advantage and empowers individuals at all levels of ownership and responsibility to use this data in their decision making. And then there are serious critics, individuals and professionals who have started voicing concerns about data being misused, misinterpreted and / or manipulated for commercial gains. Data exists in silos across the web, and with recent technologies organisations are able to gather this scattered data and compile it into useful, meaningful information. which helps in decision-making. The problem occurs when this information is being misused for personal gains or causes security risks without maintaining integrity.


There are many applications at various units of an organisation, that are used. but not created with the principle of “Privacy by design”. Data collected from IoT devices are not considered private. Making a customer the Data Owner, letting the customer manage their privacy, providing the ability to revoke the rights to the data or right to forget is an afterthought or as in most cases not considered at all.


The enterprise applications, off-the-shelf applications or SaaS applications, that almost always deal with sensitive, critical and PII data do not build with “Privacy accountability”. There is no unified framework for all these data sets enforcing Data Security, Data Privacy, and Data Governance. There are multiple solutions such as DLP, IRM, CASB, Data tokenisation, Data masking, access controls, among others are deployed. But they do not talk to each other. They do not know which policies, consent, access controls to be applied for various datasets in an organisation. Finally, digital transformation and innovation are hampered. when there is a constant worry about data security, data privacy and data governance. Hence creating a real need to have an Automated system or a unified Data Security Governance framework in an organisation. that helps them with digital transformation, innovation, staying competitive. while ensuring data security, data privacy and data governance go hand in hand whilst enforcing appropriate policies, access controls, consent at the data level.
4 years ago, when data privacy and governance were rare topics of discussion at select forums. we understood that this is going to become one of the major concerns in the coming years. We invested into understanding these issues and conducting in depth R&D to develop curated systems. which will not interfere with any individual or organisation’s operational will to share information. Our in-depth awareness about the risks and issues related to Data being unsecure led us to understand that Data Privacy is valuable to organisations beyond meeting regulations.
This understanding and analysis encouraged us to develop systems that empower organisations and individuals with the ownership of the information that they have created. Data that you share can no longer be dispersed without your consent. If done so somehow, you are at the very least aware of what is happening to it. And that is how SecurelyShare came into existence.

After years of R&D, Securely Share has filed and obtained the following seven patent grants (USPTO):

USPTO Patent No
Patent Description
US 8,806,200 B2
Method and System for Securing Electronic Data
US 9,124,641 B2
System and Method for Securing the Data and Information Transmitted as e-mail Attachments
US 9,015,483 B2
Method and System for Secured Data Storage and Sharing over Cloud Based Network
US 8,909,925 B2
System for Secure Electronic Content, enforce usage Polices and Provide Configurable Functionalities
US 9,118,660 B2
Method and System for Providing Access to Encrypted Data Files. for Many Federated Authentication Providers and Verified Identities
US 9,571,469 B2
Computer Implemented System and Method for Ahead-of-Time Delivery of Electronic Content
US 10,579,809 B2


National Identification Number Based Authentication and Content Delivery
With the introduction of new data privacy laws & regulations across the globe like GDPR, CCPA, PDP Bill, etc.,. organisations need towards data management has changed significantly. The need to have a single comprehensive solution to address the end-to-end data security, privacy & governance solution. for structured and unstructured sensitive information (PI/PII) has grown since then. It is now clear that investments in data privacy tools. would help beyond meeting the privacy regulations & compliance. Adequate measures would have to be developed. to ensure that any data sharing framework does not dilute the protections afforded by the Personal Data Protection Bill, 2019 (PDP Bill).


With our patented approach towards data, the second step is to have a clear process to discover, separate, store and administer the sensitive, critical and PII data from the business / transaction data. When we take this approach, each dataset from various enterprise applications can be subjected to the most appropriate policies, access controls. When we embed this patented approach towards data and the process of separating sensitive data into enterprise applications and SaaS applications. we can make each of these applications pre-built with security & governance.

Why Choose eSource Software?

eSource Software is among the leading software outsourcing companies in Malaysia. Providing quality software outsourcing services, catering to clients across the globe. for projects of any size and scope. 

 
Get in touch today to learn more about our services!


Contact us:

eSource Software, 17-01, Kapitan Square, Buckingham Street, 10200 George Town, Penang, Malaysia.
Call : (006) 012-4377440

Email : esourcetechnology@gmail.com

Website : www.esource-malaysia.com


Malaysia Cities: Alor Setar, Semporna, Putrajaya, Sandakan, Kuantan, Johor Bahru, kedah, Alor Setar, Perlis, Kuala Terengganu, Kota Bharu, Miri, Kuching, Kota Kinabalu, Ipoh, Perak, Malacca, Negeri Sembilan, Langkawi, George Town, Penang, Pahang, Selangor, Terengganu, Kuala Lumpur, Sabah, Sarawak, Labuan.
Mobile App Penang Mobile App Kuala Lumpur Mobile App Selangor Mobile App Johor Bahru Mobile App Singapore | Software Pahang Software Sabah Software Sarawak |  Software Malaysia | Software Kuala Lumpur | Software Singapore | Software Brunei | Software Selangor | Software KedahLondon | New York | Hong Kong | Singapore | Toronto | Frankfurt | Dubai | Taipei | Brussels | Tokyo | Chicago | New DelhiBeijing | Sydney | LosAngeles | Vancouver | Paris | Copenhagen | Berlin | Miami | Rome | Boston | Seoul | ViennaMumbai | Warsaw | Shanghai | San Francisco | Dublin | Philadelphia | Las Vegas | Budapest | Montreal | Barcelona | Abu Dhabi | MunichDallas | Manchester | Bangalore | Amsterdam | Lisbon | Madrid | Prague | Geneva | Milan | San Diego | Auckland | HamburgRiyadh | Saint Petersburg | Rio de Janeiro | Melbourne | Manila | Moscow | Sao Paulo | Zurich | Chengdu | Stockholm | Hyderabad | OsloDenver | Buenos Aires | Helsinki | Luxembourg | Orlando | Washington, D.C. | Atlanta | Johannesburg | Bangkok | Birmingham | Brisbane | CalgaryTianjin | Sofia | Athens | Kyoto | Wenzhou | Guadalajara | Phoenix, Arizona | Bucharest | Houston | Nanjing | Chennai | KyivNairobi | Jeddah | Shenzhen | Busan | Cape Town | Ho Chi Minh City | Mexico City | Jakarta | Cairo | Guangzhou | Dhaka | LagosOsaka | Istanbul | Kuala Lumpur | Zagreb

Leave a Reply