Six Steps to Protect Customer Data

The Facebook - Cambridge Analytica scandal is simply the natural outcome of today's data-driven economy that puts businesses and others first, not users. Mark Zuckerberg's apology is a first step, but it's not enough. 

The seriousness of the revelations calls for more than mere apologies.

Change is Needed

Society needs higher standards for transparency and ethics when it comes to the handling of our information. Anyone who collects data must be accountable to their users and to society.

As we have seen recently, data abuse and mishandling can have grave consequences for both individuals and society.

The Internet Society is deeply committed to an Internet that is trusted by its users. In a connected world, everyone is affected by everybody else's actions. Incidents like this contribute to an overall climate of declining trust in the Internet and threaten its economic value.

We recommend that those who collect, use or share our data:

  1. Make sure policies about data handling reflect our interests first. As their users, we should be their first priority
  2. They must restrict and monitor any access or use of our personal data. Don't collect our data if you can't manage it.
  3. Be transparent about how they share our personal data, with whom and why.
  4. Set clear rules for handling and sharing our personal data and show us how those rules are being enforced.
  5. If our data is going to be collected, make it easy for us to control what will be collected, how it will be used, and who it will be shared with.
  6. Ask us to opt-in. Don't require us to opt-out.

If we are to continue to benefit from the value the Internet can bring, we must trust our services and platforms. Businesses must do better.

Information- Management

You Might Also Read: 

Is Your Data Being Sold On The Dark Web?:

Data Protection Officer's Guide To The GDPR Galaxy:

 

« GDPR Countdown
Fixing Hacks Has A Deadly Impact On Hospitals »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Komodo Consulting (KomodoSec)

Komodo Consulting (KomodoSec)

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Inogesis

Inogesis

Inogesis helps blue-chip organisations harness disruptive technologies and thinking to drive new revenues or overcome challenges by connecting them with dynamic small companies.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

VikingCloud

VikingCloud

VikingCloud (formerly Sysnet Global Solutions) offers organizations an integrated cybersecurity and compliance solution to make informed, predictive, and cost-effective risk mitigation and prevention

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

AI EdgeLabs

AI EdgeLabs

AI EdgeLabs is a powerful and autonomous cybersecurity AI platform that helps security teams respond immediately to ongoing attacks and protect Edge/IoT infrastructures.