meta data for this page
  •  

Strong data security is not optional

Lax security can lead to lawsuits, penalties and higher costs:

Data security breach is not only the loss for the user, individual or organization of information, but also it causes millions of dollar of costing. Average consolidated total cost of data breach is $6.53 million for US only. which was also increase in recent years. its not enough only companies tighten the security, but also regularities changes have increase the financial risk with Lax Data Security. Federal Trade commission's Bureau will now launch investigation if it detect any risky behavior, or any sub standard data securities, will face penalties. one organization also paid penalty before data breach of 100000 customers data. FTC has the right to make sure how “terms of use” are how actually data stored and shared. TO limit breach of data and financial penalties, key element to consider. -A chief information security officer (CISO) -Board-level involvement -Employee training -A computer security incident response plan (CSIRP) and team -Extensive use of encryption -Business continuity management (BCM).

Refernce: http://www.computerworld.com/article/3004007/data-security/strong-data-security-is-not-optional.html

5 facets of data security

When securing data is not only a firewall and password issue

When confronted with the potential of data breaches, owners of this data and system administrators often consider first the most obvious angle of security: preventing individuals with malicious intentions to gain access to data. But there are several facets that need to be accounted for to ensure that confidential data is not found in places where it shouldn't be. -Securing data from malicious attacks -Securing data from unauthorized access -Securing data from unusual extraction -Securing data from unintended use -Securing data from unexpected dissemination

Rerence: http://www.infoworld.com/article/2980728/big-data/5-facets-of-data-security.html

————-Data Privacy————–

*Connect via Facebook, information sharing When you grant a company access to your Facebook FB +% profile, do you think about how it’ll use the info you’ll be handing over on an ongoing basis? Probably not. When you click that Facebook Connect button, you’re probably just thinking, “Awesome, that makes it easier to sign onto that website.” What you should actually be thinking is, “This company may now be mining everything I say and do from here on out to figure out what to sell to me.” At a conference organized by data warehouse company Teradata TDC +1.51% this week, one Japanese company laid out exactly how it’s leveraging insights from Facebook to better market to its customers and increase sales. Nissen Co., LTD is a catalog company that sends out over 200 million food, clothing, and consumer good catalogs in Japan each year. “We customize the page content for each customer,” said Shigeru Kakimaru of Nissen’s marketing team. The catalogs people now get in the mail reflect products chosen for them based on their Facebook chatter, though the customers probably don’t realize it. http://www.forbes.com/sites/kashmirhill/2012/10/25/how-a-company-takes-full-advantage-of-your-facebook-information/#5d16460c1380 . Sound Cloud Use of Information**

To operate and maintain your SoundCloud® account, and to provide you with access to the Website and use of the Apps and any Services that you may request from time to time. Your email address and password are used to identify you when you sign into the Platform. Your device-IDs are used to ensure that you are in control of the devices that have access to your Subscription.

To identify you as the creator of the sounds that you upload, the comments that you post and/or the other contributions that you make to the Platform.

To seek your participation in surveys, and to conduct and analyze the results of those surveys if you choose to participate.

To provide you with technical support.

To respond to you about any comment or enquiry you have submitted.

To provide other users with data regarding people's listening behavior of their sounds, i.e. streaming and downloading their sounds or playlists or following their profiles.

To prevent or take action against activities that are, or may be, in breach of our Terms of Use, Community Guidelines or applicable law.

We use your month and year of birth to enable age restriction.

To show you interesting SoundCloud ads, when you visit third party websites. When you see our ads on a third party website or apps, we or third party services we engage for this purpose, may collect information your browser or mobile app makes available when seeing the ad (e.g. ip-addresses, referral URL, browser details, timestamp of request). Third party websites or apps may also allow us to measure the success of our ads on their websites. This may include e.g. whether a click converted to an actual purchase of a Subscription. Please see the privacy policy of such third party websites to understand what data may be collected and how to opt-out.

——https://soundcloud.com/pages/privacy#our-principles——

–EXAM QUESTIONS:–

Q1. What do you think about compromising on privacy over security? To what extent you are willing to compromise your privacy? Give arguments with reasons?

Why it is good: The question is important because, it has big discussion and every individual has their own point of view its good to have various views.

Q2. Does fourth amendment control information collected? Does it guarantee any kind of privacy of information gathered? Explain?

Why it is good: The question gives idea how fourth amendment is important? And what measures have taken to make it secure.

Q3. How search warrants are important for security and privacy?

Why it is good: it can increase understanding about search warrants and show how security and privacy are important.

Q4. How Personal interest can cause breach of data privacy policy? How can we secure it?

Why it is good: The question can be answered with real life experience of every individual and shows how we breach others privacy, does our own privacy is secure?

–CERTIFICATE FOR ONLINE COURSE–