Intertwining Data Governance and Information Security

By on

Weave-2by Angela Guess

A new article out of the UK discusses how information security and data governance are necessarily becoming more intertwined. The article states,  “Information security is no longer a siloed function – in today’s technology-led business environment, it touches every aspect of business. Data quality and governance is one such area. Increasingly, infosecurity professionals are working closely with senior leads responsible for information systems management to mitigate data loss and leakage.”

It goes on, “As part of the Data Protection Act, Enterprises are under pressure from the Information Commissioner’s Office (ICO) to ensure that employees’ personal data is separately identified from business data. Typically, this falls under the remit of data management and data quality professionals, who are required to ensure confidentiality and integrity of data and ensure that the data is only accessible to authorised personnel.”

“However,” the article continues, “in the recent past, we have seen instances where insider security has been breached – just in June two former T-Mobile employees who illegally stole and sold select customer data from the company in 2008 have been ordered to pay a total of £73,700 in fines and confiscation costs by the ICO. With data being organisations’ intellectual property, information security professionals must become more closely involved in data management in their organisations. They can prevent such breaches from happening by instituting processes and models that ensure that the security gates to data aren’t violated. One such approach is to apply integrity checks using SHA-2 (Secure Hash Algorithm) cryptographic hash functions, helping check when data has been modified illegally.”

Read more here.

Creative Commons License photo credit: Spider.Dog

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept