0% found this document useful (0 votes)
40 views

Data Privacy and Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Data Privacy and Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

DATA PRIVACY AND

SECURITY
Pawan Singh Bhadouriya
Eno. :231B216
Batch : B-6
Introduction to Data Privacy and Security
Data privacy : refers to the practice of handling
personal information in a way that ensures it is kept
secure and used appropriately. This involves
protecting data from unauthorized access and
ensuring that individuals have control over how their
personal information
Importance is collected,
of Data Privacy: used, and shared.
• Protection of Personal
information
• Trust and Confidence I
• Prevention of Identity
Theft D Salomon, Data privacy and security. New Yor
• Ethical Responsibility
Springer, 2018.
Common Threats to Data Privacy
• Phishing Attacks
Phishing involves tricking individuals into revealing personal information,
such as passwords or credit card numbers, by pretending to be a
trustworthy entity
• Malware
Malware, or malicious software, includes viruses, worms, and trojans
designed to damage or disrupt systems, steal data, or gain unauthorized
access to networks.
• Insider Threats
Insider threats come from within the organization, such as employees or
contractors who misuse their access to sensitive data for personal gain or to
harm the organization.
• Ransomware
Ransomware is a type of malware that encrypts a victim’s files and demands
a ransom to restore access. This can lead to significant data loss and
financial damages .
• Social Engineering
Social engineering attacks manipulate individuals into divulging confidential
information. This can be done through various means, including phone calls,
emails, or in-person interactions Martina Ziefle. Data privacy and security.
• Data Breaches Springer Science & Business Media,
2012.
Practices for Data Security
• Data Minimization
Collect only necessary data gather only the data you need for a specific purpose,
limit data retention keep data only as long as necessary and securely dispose of
it when no longer needed.

• Strong Access Controls


role-based access implement role-based access controls to ensure that only
authorized personnel can access sensitive data multi-factor authentication
(MFA)use MFA to add an extra layer of security.

• Encryption
data encryption encrypt data both in transit and at rest to protect it from
unauthorized access.
secure communication channels use secure communication protocols like HTTPS.

• Use of Privacy-Enhancing Technologies


privacy by design integrate privacy considerations into the design and
developmentVenkataramanan, Nataraj, and Ashwin Shriram. Data privacy: principles
of products and services.
and practice. Chapman and Hall/CRC, 2016.
Legal and Regulatory Frameworks
• Digital Personal Data Protection Act, 2023 (DPDP Act)
Enacted in August 2023, the DPDP Act is India’s first comprehensive data
protection law. It regulates the processing of digital personal data and
includes provisions for data subject rights, data fiduciary obligations, and
penalties for non-compliance.

• Information Technology Act, 2000 (IT Act)


The IT Act, along with the Information Technology (Reasonable Security
Practices and Procedures and Sensitive Personal Data or Information)
Rules, 2011 (SPDI Rules), provides a framework for data protection and
cybersecurity.

• General Data Protection Regulation (GDPR)


GDPR is one of the most comprehensive data protection regulations. It
mandates strict data handling practices, including obtaining explicit
consent from individuals, ensuring data portability, and implementing
robust security measures.

• Children’s Online Privacy Protection Act (COPPA)


Protects the privacy of children under 13 by requiring parental consent
Future trends in Data Privacy and Security
• Increased Regulation and Enforcement
Global Expansion of Privacy Laws: By 2024, it’s predicted that 75% of the global population will
be covered under modern privacy regulations1. This includes new laws in regions like Brazil,
Canada, and India . Stricter enforcement companies can expect heightened scrutiny and
significant fines for non-compliance, encouraging them to enhance their data protection
measures.
• Zero Trust Architecture
Continuous Authentication: Emphasizing continuous verification of user identity and access
rights, rather than assuming trust based on a single authentication . Micro segmentation
dividing networks into smaller segments to limit the spread of potential breaches
• Consumer Awareness and Control
Empowered Consumers: Growing awareness among consumers about their privacy rights will
drive demand for greater transparency and control over personal data , user-centric privacy
tools development of tools that allow users to manage their data privacy settings more easily
and effectively.
• Privacy-Enhancing Computation
advanced techniques Techniques like homomorphic encryption, secure multi-
party computation, and differential privacy will become more prevalent.
These methods allow data to be processed and analyzed without exposing it
to unauthorized parties.

Miryala, N.K. and Gupta, D., 2022. Data Security Challenges and Industry Trends.
IJARCCE, pp.300-309
REFERENCES
• D Salomon, Data privacy and security. New York: Springer, 2018

• Venkataramanan, Nataraj, and Ashwin Shriram.


Data privacy: principles and practice. Chapman and Hall/CRC, 2016

• R. Velumadhava Rao a, K. Selvamani b "Data Security Challenges and


Its Solutions in Cloud Computing".

• Sukhpal Singh Gill "Quantum and blockchain based Serverless edge computing:
A vision, model, new trends and future directions.

• Miryala NK, Gupta D. Data Security Challenges and Industry Trends.


IJARCCE International Journal of Advanced Research in Computer and
Communication Engineering. 2022;11(11):300-9.
Than
k
You

You might also like