Confused about data governance, privacy & security?

Michael Queenan, co-founder and CEO of Nephos Technologies, explains the difference between these three business critical data strategy principles. 
Michael Queenan, co-founder and CEO of Nephos Technologies, explains the difference between these three business critical data strategy principles. 

Data governance, data privacy and data security. Core to every organisation’s data strategy and a boardroom responsibility, their natural overlap often causes confusion for non-specialists. Let’s simplify what each of these three terms mean for your business. 

1. What is data governance? 

This is the starting point and bedrock for a strong data strategy. The lynchpin to everything. Fail to establish solid data governance and you’re unlikely to achieve adequate levels of data privacy or data security. 

Technology analysts Gartner define data governance as “the specification of decision rights and an accountability framework to ensure the appropriate behaviour in the valuation, creation, consumption and control of data and analytics.” 

In plain English, data governance is establishing formal rules within your organisation for 1) who has authority over 2) which data assets and 3) how those assets can be used.  

Although selective areas of your business may do this to some degree, data governance is all about treating data holistically across the organisation. So, as a business, you need to determine the methods, responsibilities and processes so that data can be formally standardised, integrated, protected and stored. 

Business benefits of good data governance

This systematic, cross-business approach will minimise risks and keep you in control. It will also:

  • establish clear internal policies, metrics and processes for better compliance 
  • increase the value of your data 
  • prepare the business to scale up

2. What is data privacy? 

With data governance in place, step two is to apply privacy controls to your business. This means 1) protecting the privacy of any personal data that your organisation stores or processes and 2) being able to prove that you comply with the law in this respect. 

Data privacy generally applies to personally identifiable information (PII) and personal health information (PHI) connected to your customers and prospects but can extend to your partners, staff, suppliers and so on. 

The latest General Data Protection Regulation (GDPR) insists that businesses do this with transparency and simplicity. For example, it needs to be clear to customers or users:

  • what information you are collecting
  • who is collecting it
  • how it is collected
  • why it is being collected
  • how it will be used
  • who it will be shared with
Why data privacy is an important focus for your business 

Data are possibly the biggest assets a business owns, so it’s key that you nail these aspects in terms of business asset management and regulatory compliance. The fallout of a failure to protect customer data privacy can ring the death knell for a business. The trust you worked so hard to build up can be wiped out overnight.  

3. What is data security? 

Data security refers to the processes and tools that protect sensitive information assets so they are secure and available. 

In the real world, it’s about protecting the hardware in your office, at home, at your data storage or backup centre, or the laptop in your staff member’s backpack as they’re cycling to a meeting. 

In the digital world, it’s protecting digital information from corruption, unauthorised access and theft. That’s anything from securing against basic human error to dealing with a cyber security attack and ransomware. 

When protecting personal data, four key security methods include:

  • Encryption so that personal data are difficult to read or alter by unauthorised parties
  • Masking so data appear to have a lower value
  • Deletion from your systems when data are no longer legally active
  • Backup copies of data, so they are recoverable even if the original data are corrupted or stolen. 

The internationally recognised Cyber Security Framework from the US Commerce Department’s National Institute of Standards and Technology (NIST) is the foundation of most standards. It breaks the framework into five actionable areas. Your business needs to be able to: 

  1. IDENTIFY your weak spots. Audit your systems and services – your assets, data, people, data flows etc. This will allow you to identify where you might be vulnerable to hacks or breaches.
  2. PROTECT your systems and services according to how critical and sensitive each one is. 
  3. DETECT security anomalies in real time through monitoring and alerting.
  4. RESPOND to an attack or breach according to an established protocol – be clear on who should do what and when.
  5. RECOVER your systems and services should the worst happen. Plan your recovery, including agreeing the order of recovery of systems and services.  

READ MORE:

American journalist Edward R. Murrow wrote, “Anyone who isn’t confused really doesn’t understand the situation.” However, hopefully, data governance, data privacy and data security will seem less confusing now.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Laying the foundations for global connectivity

Waldemar Sterz • 26th June 2024

With the globalisation of trade, the axis is shifting. The world has witnessed an unprecedented rise in new digital trade routes that are connecting continents and increasing trade volumes between nations. Waldemar Sterz, CEO of Telegraph42 explains the complexities involved in establishing a Global Internet and provides insight into some of the key initiatives Telegraph42...

Laying the foundations for global connectivity

Waldemar Sterz • 26th June 2024

With the globalisation of trade, the axis is shifting. The world has witnessed an unprecedented rise in new digital trade routes that are connecting continents and increasing trade volumes between nations. Waldemar Sterz, CEO of Telegraph42 explains the complexities involved in establishing a Global Internet and provides insight into some of the key initiatives Telegraph42...

IoT Security: Protecting Your Connected Devices from Cyber Attacks

Miro Khach • 19th June 2024

Did you know we’re heading towards having more than 25 billion IoT devices by 2030? This jump means we have to really focus on keeping our smart devices safe. We’re looking at everything from threats to our connected home gadgets to needing strong encryption methods. Ensuring we have secure ways to talk to these devices...

Future Proofing Shipping Against the Next Crisis

Captain Steve Bomgardner • 18th June 2024

Irrespective of whether the next crisis for ship owners is war, weather or another global health event, one fact is ineluctable: recruiting onboard crew is becoming difficult. With limited shore time and contracts that become ever longer, morale is a big issue on board. The job can be both mundane and high risk. Every day...

London Tech Week 2024: A Launched Recap

Dianne Castillo • 17th June 2024

Dominating global tech investment, London Tech Week 2024 was buzzing with innovation. Our team joined the action, interviewing founders and soaking up the latest tech trends. Discover key takeaways and meet some of the exciting startups we met!

The Future of Smart Buildings: Trends in Occupancy Monitoring

Khai Zin Thein • 12th June 2024

Occupancy monitoring technology is revolutionising building management with advancements in AI and IoT. AI algorithms analyse data from IoT sensors, enabling automated adjustments in lighting, HVAC, and security systems based on occupancy levels. Modern systems leverage big data and AI to optimise space usage and resource management, reducing energy consumption and promoting sustainability. Enhanced encryption...