How security and privacy should merge

Ann Cavoukain, Ontario’s privacy commissioner, is known for her long campaign urging the public and private sectors to build privacy into IT and business processes – the privacy-by-design approach.

With today marking the annual International Privacy Day, she and Oracle Corp.’s director Marc Chanliau have released a paper arguing that security by design

“Privacy must be incorporated into networked data systems and technologies, not as an afterthought, but rather, by default,” the paper says.

“The same is true of security. Both concepts must become integral to organizational priorities, project objectives, design processes, and planning operations. Privacy and security must be embedded into every standard, protocol and process that touches our lives.”

Rather than being separate principles, the paper says, they work together.

Data Privacy Day has been marked since 2008, which commemorates the 1981 signing of Convention 108, the first international treaty dealing with privacy and data protection.

The concept of security by design emphasizes the necessity of designing software systems that are secure from the ground up, says the paper, minimizing the impact of a system breach when security vulnerability is discovered.

That preserving privacy and ensures identity propagation across heterogeneous vendors.

By viewing the two concepts as complementary, the paper argues, organizations will recognize that both privacy and security need to be embedded by default into the architecture, design and construction of information processes and technologies.

To download the paper click here. 

 
RELATED CONTENT

Another data loss at Human Resources Canada

 

Security and privacy aren’t just matters for organizations. As part of Data Privacy Day the U.S. National Crime Prevention Council reminds individuals to keep security software on their PCs and mobile devices current and to scan any external device – such as a USB memory stick – plugged into any device.

The council also suggests the following to individuals:

Secure your accounts:  Ask for protection beyond passwords. Many account providers now offer additional ways for you to verify who you are before you conduct business on that site.

Make passwords long and strong:  Combine capital and lowercase letters with numbers and symbols to create a more secure password.

Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.

Write it down and keep it safe: Everyone can forget a password. Keep a list that’s stored in a safe, secure place away from your computer.

Own your online presence: When available, set the privacy and security settings on Web sites to your comfort level for information sharing. It’s OK to limit how and with whom you share information.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now