SlideShare a Scribd company logo
International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue III, March 2017 | ISSN 2321–2705
www.rsisinternational.org Page 36
Privacy Management System: Protect Data or Perish
Dr. Shankar Chaudhary
Associate Professor, PAHER University Udaipur, Rajasthan
Abstract: - The uncontrollable flow of change in technology these
days and use of data, information and knowledge is creating a
huge challenges in the front of application User and developer
both. Data breaches are happening in every sector and every
level of all sectors. These challenges are countless starting from
operational to strategic and becoming more challengeable day by
day as the penetration of Information technology application
among the common man is increasing. Therefore the threat is
become real. Everybody customers or companies, retailer or
stakeholders , distributor or dealer need assurance; from the
provider. corporate face up reputational risks among the user at
every step. So there is a need to understand the information
technology, a frame work or body which can manage , risks and
controls. A body or a system of Privacy management system is
which can build a frame work for protection of the data and at
the same time can maintain , privacy and agreement issues. This
can be done by adoption of a scalable risk-based method which
can determine what to be secured and how by performing the
certain action.
I. INTRODUCTION
he origin of this word Data is from “Didomi” which
means to “ to Give‟ and also from Latin word “Datum”
refers to “Given”. It is the entry point or the lowest level of
abstraction of numbers, images, physical quantities,
measurements, characters, raw facts and figures , from which
the information as well as knowledge can be derived ,
sometimes data itself contains the information as well as
knowledge.
The later stage of data so called information is born from
Latin ,which specifies a concept or idea. The Greek says that
it means the shape of Gods, it simply a presentation of
information in a proper way to the desired person .The
business terminology says when the data is properly arrange
in a systematic way which can give a meaningful information
or when a set of rule is applied to data the resultant gives the
information.
The processing of the information with various parameters
like , values , Description, skills obtained through the Proper
study, training , investigation, experience, experimental
learning, education is applied in a medium for the processing
it‟s become the Knowledge.
The knowledge gain through the investigation had a lot of
meaning in the competition world since the strategic
importance of the data have a high value .so keeping this data
protected from all means is very important.
II. WHAT IS PROTECTION OF DATA?
Protection of data in the simplest form Is the process to
safeguard the critical information from corruption or loss or
from any other means. This is a fundamental right to privacy
to preserve data all across at state , national and international
laws ,codes and reunions. Which is being created through the
automation process: collection, processing and then stored in
electronic form.
In a common way it a law to protect the personal data
generated by any source.
III. TERMINOLOGY IN DATA PROTECTION
Data breach: Destruction of data by accidental, amendment,
confession, admittance, broadcast or accumulate willingly or
non-willingly by individual.
As per the leading website ( www.searchsecurity.com)”A data
breach is an activity where the crucial, reserved or off the
record data has potentially been out looked , stolen or worn by
an individual unauthorized to do so. Data breaches may
involve personal health information , personally known
information , business secrets or intellectual property”. in
other words it can be defined like “ an confrontation where
apart of information is stolen or taken from an existing
system without the preceding information, acquaintance or
authorization of the system‟s proprietor
Victims of such incident are typically big corporate dealing in
wide areas of network, and the information stolen may usually
be responsive, proprietary or secret in nature (such as credit
card numbers, customer data, trade secrets , market expansion
strategies, new product innovation, research and development
or matters of national security). Damage caused by such
attacks or incidents generally presents itself as hammering to
the target company‟s reputation with their client, due to a
alleged „betrayal of trust‟. The damage may also involve the
company‟s finances as well as that of their customers‟ should
financial records be part of the information stolen.”
“Webster‟s defines “to breach” as literally “the act of
breaking”, as in the infraction or violation of a law,
obligation, tie or standard.
As per the technical definition: A data breach is an incident
during which an encrypted database is broken or hacked, and
the valuable information stored within is compromised. The
term “data” in this case most often describes sensitive,
protected or confidential data such as customer records that
are protected by law or required by Federal regulation to be
protected. Data breaches may involve personal health
T
International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue III, March 2017 | ISSN 2321–2705
www.rsisinternational.org Page 37
information, personally identifiable information, trade secrets
or intellectual property”.
Individual data Breach
This type of violation is concerned with the alteration of
personnel data transmission , disclosure of information to
others without the prior permission, destruction in data.
Therefore sometimes it may be intentional or non internal to
spread of information in unsecured environment . This
phenomena is increasing day by day as the online services and
systems , these can create a serious threats starting from
humiliation, discrimination, physical damage , financial loss.
These all can lead to threats to life.
Approval
Approval is an guess of consent to do incredible that is
contingent from an persons measures rather than
unambiguously supplied. In case where the individual
personal data is supplied , the level of permission must be
precise in nature , there should not be any ambiguity in this
one .The purpose must be stated and understood for the
processing of data. The judgment provides a thorough
examination of the perception of approval the current data is
used in the protection of Data.
In simple word the data consent is “Consent” is one of the
basis of grounds on which data can lawfully processed.
Third Party
The meaning of third Party stand as a legal body or public
agency involves in the processing of individual or group data
for the public purpose have a high meaning as per the
political, economical and strategic . which can have a long
impact on individual as group. there should be a written code
of conduct as far a confidentiality is concern. It happens in
mailing ,messaging is used in bulk. Disclosure of personal
data should not take place to third parties without the
reasonable justification.
Sensitive Data
This can be divided into three categories. personal, business
and classified . The data captured through the biometric
devices , medical data of patients, financial information of
groups, passport or social security numbers like AADHAR ,
Pan card ,credit card consumer numbers , Driving licenses
numbers. It can be traced very easily by anyone with mollified
intention. These inform should be in the encrypted form both
during transmission and reception. Data collected through e
kiosk, pos machines have a trade secret like product launching
strategy, financial planning, customer information and many
more. To protect such things Meta data management
technique should be used and document sanitization can be
placed in work place. Classified information mainly deals
with government bodies as per the level s of security like poll
opinion criminal offenses , gender and caste data .
Processor cum controller
A legal person who operates and process the , or jointly
responsible for the processing as well as controlling the data
processing , aware of use of applied data at any mean. It
performs the task on others behalf without involvement of
individuals intentions.
IV. DATA PROTECTION TOOLS
Data Encryption
Data encryption is a process to safeguard or protect vital
information from the un authenticated view. where the
information or data is being converted into other format so
that certified or permissible users can only see the actual data
after decryption process.
These days the all the software packages available in the work
place have this facility to perform this process to safe guard
the critical data . whenever the data is being transmitted to any
other mean , external devices, internet, backing up the server
this should be the routine matter to perform the is task so that
the other parties cannot go through.
Data Backup through Cloud
This is the rented service or free service started by some of the
IT vendor to safeguard the data in the form of backup, when
the system is crashed due to malfunctioning of any application
or mishandling by human being. Whether you are working
one stand alone pc, laptop or on a network but this is the most
safest way to secure your data using cloud services. The cloud
services are available for single as well as multiple users, once
it is started it work silently in background and keep taking the
data backup at short intervals and whenever it is required data
can be recovered by few clicks
Antivirus
Deployment of antivirus software application is the most
common tools used since from the inception of PC
applications come use in industries, these protects system
application from worms, spyware, malwares. This also
destroys application s which slow down the PC
Besides these common ways to protect data several others
means are also available in IT world like Proxyfier, the
application which supports net work application and flash
players which operates through HTTP and SOCKS. The
similar application like ProxyCap which reroute the traffic of
various applications like flash player, Java applets, RMI,
servelets to others sites like JOnDonym to help out.
Management of all the cookies (flash,, browser, session , third
party, persistent, tracking) is a tough task with IT
professionals in the internet era . Even it contain a small text
but this small text become the entry point for hackers to stolen
the data. Cookie manager application should be installed at
User end to increase productivity and keep Privacy of user.
Key Exchanger is also use to protect the data over the
unsecure connections like messaging, where the key is shared
International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue III, March 2017 | ISSN 2321–2705
www.rsisinternational.org Page 38
in symmetric encryption. In big data organization uses the
identifier tools to recognize the sensitivity of data, so that the
loss or theft of data can be avoided.
Therefore To protect the data from a system should be likes
that it covers all the above issues so that a proper system
should be implemented with organization first of all the data
storage system security then to Back up and recovery tools
should be applied, once they come in the picture the
movement of Remote data should be taken care.
Once data is safe and its volume increases data life cycle
management(DLCM) comes in the picture once this cycle is
complete the information generated should be the part of
Information Life cycle management(ILCM)
For an successful and effective plan in data protection in
world of cyber security , always think different, act different
and implement different to maintain the management
practices of privacy Information management. To do this first
Understand the purpose of Information management system,
the objective should be clearly defined and stated to all the
users so that data should not be system dependence, the
processing of data should be taken with sincerely, so that it
should not cross the organizational boundaries. Privacy
practice s should be implemented in organization.
Involvement of all the processors , controllers during any
service transmission or reception during sharing of personal
information for transparency with data
V. CONCLUSION
The way occurrence and volume of data breaches are
growing day by day the persons involved or dealing with o IT
departments should be more are more focused on
management of data security and shielding of IT software
and systems on regular basis and data also than ever before
to protect the reputation of company, policies and measures.
An approach to be adopted which t focuses on basic concepts
of protection as well as best practices of privacy solution to be
adopted like : identification of company‟s most valuable
assets, regular monitoring, and a structured, fast response
from data breaching so that a secure environment can be
created. - provide the clarity to move forward confidently.
REFERENCES
[1]. http://searchsecurity.techtarget.com/definition/data-breach
[2]. http://www.trendmicro.com/vinfo/us/security/definition/data-
breach
[3]. http://www.trendmicro.com/vinfo/us/security/definition/data-
breach
[4]. https://www.veracode.com/security/data-breach
[5]. http://www.staffs.ac.uk/legal/privacy/
[6]. https://blogs.cisco.com/security/how-to-improve-privacy-as-a-
component-of-your-cyber-governance-program
[7]. http://encryption.uconn.edu/new
[8]. http://identityfinder.uconn.edu/
[9]. http://antivirus.uconn.edu/
[10]. http://searchitchannel.techtarget.com/feature/Five-components-of-
a-data-protection-strategy
[11]. https://technet.microsoft.com/en-
us/library/dn521015(v=sc.12).aspx

More Related Content

What's hot

It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
IJERA Editor
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Eryk Budi Pratama
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
Ravinder (Ravi) Singh
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
Dinesh O Bareja
 
Data Security
Data SecurityData Security
Data Security
ankita_kashyap
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
Dunton Environmental
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
ShubhraGoyal4
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
Lifeline Data Centers
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
Eryk Budi Pratama
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
Network Intelligence India
 
Business Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information TechnologyBusiness Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information Technology
International Journal of Modern Research in Engineering and Technology
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talk
ritupande
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Don Grauel
 
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
Secure Islands - Data Security Policy
 

What's hot (20)

It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Advisory April Showers 02.19.2009
Advisory April Showers 02.19.2009Advisory April Showers 02.19.2009
Advisory April Showers 02.19.2009
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Data Security
Data SecurityData Security
Data Security
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Business Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information TechnologyBusiness Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information Technology
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talk
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
 

Similar to Privacy Management System: Protect Data or Perish

An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
Alexander Decker
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
V2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
V2Infotech1
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
Arti Parab Academics
 
Information security
Information securityInformation security
Information security
Onkar Sule
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
IlonaThornburg83
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloJohn Intindolo
 
Data Anonymization Process Challenges and Context Missions
Data Anonymization Process Challenges and Context MissionsData Anonymization Process Challenges and Context Missions
Data Anonymization Process Challenges and Context Missions
ijdms
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
IJERA Editor
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
Sirius
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
zainsmith017
 
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATADATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
Uncodemy
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Jasleen Khalsa
 

Similar to Privacy Management System: Protect Data or Perish (20)

An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Information security
Information securityInformation security
Information security
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_Intindolo
 
Data Anonymization Process Challenges and Context Missions
Data Anonymization Process Challenges and Context MissionsData Anonymization Process Challenges and Context Missions
Data Anonymization Process Challenges and Context Missions
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
DG for Fed
DG for FedDG for Fed
DG for Fed
 
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
 
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATADATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
 
Data Protection In Ghana
Data Protection In GhanaData Protection In Ghana
Data Protection In Ghana
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

More from RSIS International

Teacher’s Accomplishment Level of The Components of an E-Learning Module: A B...
Teacher’s Accomplishment Level of The Components of an E-Learning Module: A B...Teacher’s Accomplishment Level of The Components of an E-Learning Module: A B...
Teacher’s Accomplishment Level of The Components of an E-Learning Module: A B...
RSIS International
 
Development Administration and the Challenges of Neo-liberal Reforms in the E...
Development Administration and the Challenges of Neo-liberal Reforms in the E...Development Administration and the Challenges of Neo-liberal Reforms in the E...
Development Administration and the Challenges of Neo-liberal Reforms in the E...
RSIS International
 
The Nexus of Street Trading and Juvenile Delinquency: A Study of Chanchaga Lo...
The Nexus of Street Trading and Juvenile Delinquency: A Study of Chanchaga Lo...The Nexus of Street Trading and Juvenile Delinquency: A Study of Chanchaga Lo...
The Nexus of Street Trading and Juvenile Delinquency: A Study of Chanchaga Lo...
RSIS International
 
Determination of Bacteriological and Physiochemical Properties of Som-Breiro ...
Determination of Bacteriological and Physiochemical Properties of Som-Breiro ...Determination of Bacteriological and Physiochemical Properties of Som-Breiro ...
Determination of Bacteriological and Physiochemical Properties of Som-Breiro ...
RSIS International
 
Power and Delay Analysis of Logic Circuits Using Reversible Gates
Power and Delay Analysis of Logic Circuits Using Reversible GatesPower and Delay Analysis of Logic Circuits Using Reversible Gates
Power and Delay Analysis of Logic Circuits Using Reversible Gates
RSIS International
 
Innovative ICT Solutions and Entrepreneurship Development in Rural Area Such ...
Innovative ICT Solutions and Entrepreneurship Development in Rural Area Such ...Innovative ICT Solutions and Entrepreneurship Development in Rural Area Such ...
Innovative ICT Solutions and Entrepreneurship Development in Rural Area Such ...
RSIS International
 
Indigenous Agricultural Knowledge and the Sustenance of Local Livelihood Stra...
Indigenous Agricultural Knowledge and the Sustenance of Local Livelihood Stra...Indigenous Agricultural Knowledge and the Sustenance of Local Livelihood Stra...
Indigenous Agricultural Knowledge and the Sustenance of Local Livelihood Stra...
RSIS International
 
Wireless radio signal drop due to foliage in illuba bore zone ethiopia
Wireless radio signal drop due to foliage in illuba bore zone ethiopiaWireless radio signal drop due to foliage in illuba bore zone ethiopia
Wireless radio signal drop due to foliage in illuba bore zone ethiopia
RSIS International
 
The Bridging Process: Filipino Teachers’ View on Mother Tongue
The Bridging Process: Filipino Teachers’ View on Mother TongueThe Bridging Process: Filipino Teachers’ View on Mother Tongue
The Bridging Process: Filipino Teachers’ View on Mother Tongue
RSIS International
 
Optimization of tungsten inert gas welding on 6063 aluminum alloy on taguchi ...
Optimization of tungsten inert gas welding on 6063 aluminum alloy on taguchi ...Optimization of tungsten inert gas welding on 6063 aluminum alloy on taguchi ...
Optimization of tungsten inert gas welding on 6063 aluminum alloy on taguchi ...
RSIS International
 
Investigation of mechanical properties of carbidic ductile cast iron
Investigation of mechanical properties of carbidic ductile cast ironInvestigation of mechanical properties of carbidic ductile cast iron
Investigation of mechanical properties of carbidic ductile cast iron
RSIS International
 
4th international conference on multidisciplinary research & practice (4ICMRP...
4th international conference on multidisciplinary research & practice (4ICMRP...4th international conference on multidisciplinary research & practice (4ICMRP...
4th international conference on multidisciplinary research & practice (4ICMRP...
RSIS International
 
Six Sigma Methods and Formulas for Successful Quality Management
Six Sigma Methods and Formulas for Successful Quality ManagementSix Sigma Methods and Formulas for Successful Quality Management
Six Sigma Methods and Formulas for Successful Quality Management
RSIS International
 
Task Performance Analysis in Virtual Cloud Environment
Task Performance Analysis in Virtual Cloud EnvironmentTask Performance Analysis in Virtual Cloud Environment
Task Performance Analysis in Virtual Cloud Environment
RSIS International
 
Design and Fabrication of Manually Operated Wood Sawing Machine: Save Electri...
Design and Fabrication of Manually Operated Wood Sawing Machine: Save Electri...Design and Fabrication of Manually Operated Wood Sawing Machine: Save Electri...
Design and Fabrication of Manually Operated Wood Sawing Machine: Save Electri...
RSIS International
 
Effect of Surface Treatment on Settlement of Coir Mat Reinforced Sand
Effect of Surface Treatment on Settlement of Coir Mat Reinforced SandEffect of Surface Treatment on Settlement of Coir Mat Reinforced Sand
Effect of Surface Treatment on Settlement of Coir Mat Reinforced Sand
RSIS International
 
Augmentation of Customer’s Profile Dataset Using Genetic Algorithm
Augmentation of Customer’s Profile Dataset Using Genetic AlgorithmAugmentation of Customer’s Profile Dataset Using Genetic Algorithm
Augmentation of Customer’s Profile Dataset Using Genetic Algorithm
RSIS International
 
System Development for Verification of General Purpose Input Output
System Development for Verification of General Purpose Input OutputSystem Development for Verification of General Purpose Input Output
System Development for Verification of General Purpose Input Output
RSIS International
 
De-noising of Fetal ECG for Fetal Heart Rate Calculation and Variability Anal...
De-noising of Fetal ECG for Fetal Heart Rate Calculation and Variability Anal...De-noising of Fetal ECG for Fetal Heart Rate Calculation and Variability Anal...
De-noising of Fetal ECG for Fetal Heart Rate Calculation and Variability Anal...
RSIS International
 
Active Vibration Control of Composite Plate
Active Vibration Control of Composite PlateActive Vibration Control of Composite Plate
Active Vibration Control of Composite Plate
RSIS International
 

More from RSIS International (20)

Teacher’s Accomplishment Level of The Components of an E-Learning Module: A B...
Teacher’s Accomplishment Level of The Components of an E-Learning Module: A B...Teacher’s Accomplishment Level of The Components of an E-Learning Module: A B...
Teacher’s Accomplishment Level of The Components of an E-Learning Module: A B...
 
Development Administration and the Challenges of Neo-liberal Reforms in the E...
Development Administration and the Challenges of Neo-liberal Reforms in the E...Development Administration and the Challenges of Neo-liberal Reforms in the E...
Development Administration and the Challenges of Neo-liberal Reforms in the E...
 
The Nexus of Street Trading and Juvenile Delinquency: A Study of Chanchaga Lo...
The Nexus of Street Trading and Juvenile Delinquency: A Study of Chanchaga Lo...The Nexus of Street Trading and Juvenile Delinquency: A Study of Chanchaga Lo...
The Nexus of Street Trading and Juvenile Delinquency: A Study of Chanchaga Lo...
 
Determination of Bacteriological and Physiochemical Properties of Som-Breiro ...
Determination of Bacteriological and Physiochemical Properties of Som-Breiro ...Determination of Bacteriological and Physiochemical Properties of Som-Breiro ...
Determination of Bacteriological and Physiochemical Properties of Som-Breiro ...
 
Power and Delay Analysis of Logic Circuits Using Reversible Gates
Power and Delay Analysis of Logic Circuits Using Reversible GatesPower and Delay Analysis of Logic Circuits Using Reversible Gates
Power and Delay Analysis of Logic Circuits Using Reversible Gates
 
Innovative ICT Solutions and Entrepreneurship Development in Rural Area Such ...
Innovative ICT Solutions and Entrepreneurship Development in Rural Area Such ...Innovative ICT Solutions and Entrepreneurship Development in Rural Area Such ...
Innovative ICT Solutions and Entrepreneurship Development in Rural Area Such ...
 
Indigenous Agricultural Knowledge and the Sustenance of Local Livelihood Stra...
Indigenous Agricultural Knowledge and the Sustenance of Local Livelihood Stra...Indigenous Agricultural Knowledge and the Sustenance of Local Livelihood Stra...
Indigenous Agricultural Knowledge and the Sustenance of Local Livelihood Stra...
 
Wireless radio signal drop due to foliage in illuba bore zone ethiopia
Wireless radio signal drop due to foliage in illuba bore zone ethiopiaWireless radio signal drop due to foliage in illuba bore zone ethiopia
Wireless radio signal drop due to foliage in illuba bore zone ethiopia
 
The Bridging Process: Filipino Teachers’ View on Mother Tongue
The Bridging Process: Filipino Teachers’ View on Mother TongueThe Bridging Process: Filipino Teachers’ View on Mother Tongue
The Bridging Process: Filipino Teachers’ View on Mother Tongue
 
Optimization of tungsten inert gas welding on 6063 aluminum alloy on taguchi ...
Optimization of tungsten inert gas welding on 6063 aluminum alloy on taguchi ...Optimization of tungsten inert gas welding on 6063 aluminum alloy on taguchi ...
Optimization of tungsten inert gas welding on 6063 aluminum alloy on taguchi ...
 
Investigation of mechanical properties of carbidic ductile cast iron
Investigation of mechanical properties of carbidic ductile cast ironInvestigation of mechanical properties of carbidic ductile cast iron
Investigation of mechanical properties of carbidic ductile cast iron
 
4th international conference on multidisciplinary research & practice (4ICMRP...
4th international conference on multidisciplinary research & practice (4ICMRP...4th international conference on multidisciplinary research & practice (4ICMRP...
4th international conference on multidisciplinary research & practice (4ICMRP...
 
Six Sigma Methods and Formulas for Successful Quality Management
Six Sigma Methods and Formulas for Successful Quality ManagementSix Sigma Methods and Formulas for Successful Quality Management
Six Sigma Methods and Formulas for Successful Quality Management
 
Task Performance Analysis in Virtual Cloud Environment
Task Performance Analysis in Virtual Cloud EnvironmentTask Performance Analysis in Virtual Cloud Environment
Task Performance Analysis in Virtual Cloud Environment
 
Design and Fabrication of Manually Operated Wood Sawing Machine: Save Electri...
Design and Fabrication of Manually Operated Wood Sawing Machine: Save Electri...Design and Fabrication of Manually Operated Wood Sawing Machine: Save Electri...
Design and Fabrication of Manually Operated Wood Sawing Machine: Save Electri...
 
Effect of Surface Treatment on Settlement of Coir Mat Reinforced Sand
Effect of Surface Treatment on Settlement of Coir Mat Reinforced SandEffect of Surface Treatment on Settlement of Coir Mat Reinforced Sand
Effect of Surface Treatment on Settlement of Coir Mat Reinforced Sand
 
Augmentation of Customer’s Profile Dataset Using Genetic Algorithm
Augmentation of Customer’s Profile Dataset Using Genetic AlgorithmAugmentation of Customer’s Profile Dataset Using Genetic Algorithm
Augmentation of Customer’s Profile Dataset Using Genetic Algorithm
 
System Development for Verification of General Purpose Input Output
System Development for Verification of General Purpose Input OutputSystem Development for Verification of General Purpose Input Output
System Development for Verification of General Purpose Input Output
 
De-noising of Fetal ECG for Fetal Heart Rate Calculation and Variability Anal...
De-noising of Fetal ECG for Fetal Heart Rate Calculation and Variability Anal...De-noising of Fetal ECG for Fetal Heart Rate Calculation and Variability Anal...
De-noising of Fetal ECG for Fetal Heart Rate Calculation and Variability Anal...
 
Active Vibration Control of Composite Plate
Active Vibration Control of Composite PlateActive Vibration Control of Composite Plate
Active Vibration Control of Composite Plate
 

Recently uploaded

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 

Recently uploaded (20)

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 

Privacy Management System: Protect Data or Perish

  • 1. International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue III, March 2017 | ISSN 2321–2705 www.rsisinternational.org Page 36 Privacy Management System: Protect Data or Perish Dr. Shankar Chaudhary Associate Professor, PAHER University Udaipur, Rajasthan Abstract: - The uncontrollable flow of change in technology these days and use of data, information and knowledge is creating a huge challenges in the front of application User and developer both. Data breaches are happening in every sector and every level of all sectors. These challenges are countless starting from operational to strategic and becoming more challengeable day by day as the penetration of Information technology application among the common man is increasing. Therefore the threat is become real. Everybody customers or companies, retailer or stakeholders , distributor or dealer need assurance; from the provider. corporate face up reputational risks among the user at every step. So there is a need to understand the information technology, a frame work or body which can manage , risks and controls. A body or a system of Privacy management system is which can build a frame work for protection of the data and at the same time can maintain , privacy and agreement issues. This can be done by adoption of a scalable risk-based method which can determine what to be secured and how by performing the certain action. I. INTRODUCTION he origin of this word Data is from “Didomi” which means to “ to Give‟ and also from Latin word “Datum” refers to “Given”. It is the entry point or the lowest level of abstraction of numbers, images, physical quantities, measurements, characters, raw facts and figures , from which the information as well as knowledge can be derived , sometimes data itself contains the information as well as knowledge. The later stage of data so called information is born from Latin ,which specifies a concept or idea. The Greek says that it means the shape of Gods, it simply a presentation of information in a proper way to the desired person .The business terminology says when the data is properly arrange in a systematic way which can give a meaningful information or when a set of rule is applied to data the resultant gives the information. The processing of the information with various parameters like , values , Description, skills obtained through the Proper study, training , investigation, experience, experimental learning, education is applied in a medium for the processing it‟s become the Knowledge. The knowledge gain through the investigation had a lot of meaning in the competition world since the strategic importance of the data have a high value .so keeping this data protected from all means is very important. II. WHAT IS PROTECTION OF DATA? Protection of data in the simplest form Is the process to safeguard the critical information from corruption or loss or from any other means. This is a fundamental right to privacy to preserve data all across at state , national and international laws ,codes and reunions. Which is being created through the automation process: collection, processing and then stored in electronic form. In a common way it a law to protect the personal data generated by any source. III. TERMINOLOGY IN DATA PROTECTION Data breach: Destruction of data by accidental, amendment, confession, admittance, broadcast or accumulate willingly or non-willingly by individual. As per the leading website ( www.searchsecurity.com)”A data breach is an activity where the crucial, reserved or off the record data has potentially been out looked , stolen or worn by an individual unauthorized to do so. Data breaches may involve personal health information , personally known information , business secrets or intellectual property”. in other words it can be defined like “ an confrontation where apart of information is stolen or taken from an existing system without the preceding information, acquaintance or authorization of the system‟s proprietor Victims of such incident are typically big corporate dealing in wide areas of network, and the information stolen may usually be responsive, proprietary or secret in nature (such as credit card numbers, customer data, trade secrets , market expansion strategies, new product innovation, research and development or matters of national security). Damage caused by such attacks or incidents generally presents itself as hammering to the target company‟s reputation with their client, due to a alleged „betrayal of trust‟. The damage may also involve the company‟s finances as well as that of their customers‟ should financial records be part of the information stolen.” “Webster‟s defines “to breach” as literally “the act of breaking”, as in the infraction or violation of a law, obligation, tie or standard. As per the technical definition: A data breach is an incident during which an encrypted database is broken or hacked, and the valuable information stored within is compromised. The term “data” in this case most often describes sensitive, protected or confidential data such as customer records that are protected by law or required by Federal regulation to be protected. Data breaches may involve personal health T
  • 2. International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue III, March 2017 | ISSN 2321–2705 www.rsisinternational.org Page 37 information, personally identifiable information, trade secrets or intellectual property”. Individual data Breach This type of violation is concerned with the alteration of personnel data transmission , disclosure of information to others without the prior permission, destruction in data. Therefore sometimes it may be intentional or non internal to spread of information in unsecured environment . This phenomena is increasing day by day as the online services and systems , these can create a serious threats starting from humiliation, discrimination, physical damage , financial loss. These all can lead to threats to life. Approval Approval is an guess of consent to do incredible that is contingent from an persons measures rather than unambiguously supplied. In case where the individual personal data is supplied , the level of permission must be precise in nature , there should not be any ambiguity in this one .The purpose must be stated and understood for the processing of data. The judgment provides a thorough examination of the perception of approval the current data is used in the protection of Data. In simple word the data consent is “Consent” is one of the basis of grounds on which data can lawfully processed. Third Party The meaning of third Party stand as a legal body or public agency involves in the processing of individual or group data for the public purpose have a high meaning as per the political, economical and strategic . which can have a long impact on individual as group. there should be a written code of conduct as far a confidentiality is concern. It happens in mailing ,messaging is used in bulk. Disclosure of personal data should not take place to third parties without the reasonable justification. Sensitive Data This can be divided into three categories. personal, business and classified . The data captured through the biometric devices , medical data of patients, financial information of groups, passport or social security numbers like AADHAR , Pan card ,credit card consumer numbers , Driving licenses numbers. It can be traced very easily by anyone with mollified intention. These inform should be in the encrypted form both during transmission and reception. Data collected through e kiosk, pos machines have a trade secret like product launching strategy, financial planning, customer information and many more. To protect such things Meta data management technique should be used and document sanitization can be placed in work place. Classified information mainly deals with government bodies as per the level s of security like poll opinion criminal offenses , gender and caste data . Processor cum controller A legal person who operates and process the , or jointly responsible for the processing as well as controlling the data processing , aware of use of applied data at any mean. It performs the task on others behalf without involvement of individuals intentions. IV. DATA PROTECTION TOOLS Data Encryption Data encryption is a process to safeguard or protect vital information from the un authenticated view. where the information or data is being converted into other format so that certified or permissible users can only see the actual data after decryption process. These days the all the software packages available in the work place have this facility to perform this process to safe guard the critical data . whenever the data is being transmitted to any other mean , external devices, internet, backing up the server this should be the routine matter to perform the is task so that the other parties cannot go through. Data Backup through Cloud This is the rented service or free service started by some of the IT vendor to safeguard the data in the form of backup, when the system is crashed due to malfunctioning of any application or mishandling by human being. Whether you are working one stand alone pc, laptop or on a network but this is the most safest way to secure your data using cloud services. The cloud services are available for single as well as multiple users, once it is started it work silently in background and keep taking the data backup at short intervals and whenever it is required data can be recovered by few clicks Antivirus Deployment of antivirus software application is the most common tools used since from the inception of PC applications come use in industries, these protects system application from worms, spyware, malwares. This also destroys application s which slow down the PC Besides these common ways to protect data several others means are also available in IT world like Proxyfier, the application which supports net work application and flash players which operates through HTTP and SOCKS. The similar application like ProxyCap which reroute the traffic of various applications like flash player, Java applets, RMI, servelets to others sites like JOnDonym to help out. Management of all the cookies (flash,, browser, session , third party, persistent, tracking) is a tough task with IT professionals in the internet era . Even it contain a small text but this small text become the entry point for hackers to stolen the data. Cookie manager application should be installed at User end to increase productivity and keep Privacy of user. Key Exchanger is also use to protect the data over the unsecure connections like messaging, where the key is shared
  • 3. International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue III, March 2017 | ISSN 2321–2705 www.rsisinternational.org Page 38 in symmetric encryption. In big data organization uses the identifier tools to recognize the sensitivity of data, so that the loss or theft of data can be avoided. Therefore To protect the data from a system should be likes that it covers all the above issues so that a proper system should be implemented with organization first of all the data storage system security then to Back up and recovery tools should be applied, once they come in the picture the movement of Remote data should be taken care. Once data is safe and its volume increases data life cycle management(DLCM) comes in the picture once this cycle is complete the information generated should be the part of Information Life cycle management(ILCM) For an successful and effective plan in data protection in world of cyber security , always think different, act different and implement different to maintain the management practices of privacy Information management. To do this first Understand the purpose of Information management system, the objective should be clearly defined and stated to all the users so that data should not be system dependence, the processing of data should be taken with sincerely, so that it should not cross the organizational boundaries. Privacy practice s should be implemented in organization. Involvement of all the processors , controllers during any service transmission or reception during sharing of personal information for transparency with data V. CONCLUSION The way occurrence and volume of data breaches are growing day by day the persons involved or dealing with o IT departments should be more are more focused on management of data security and shielding of IT software and systems on regular basis and data also than ever before to protect the reputation of company, policies and measures. An approach to be adopted which t focuses on basic concepts of protection as well as best practices of privacy solution to be adopted like : identification of company‟s most valuable assets, regular monitoring, and a structured, fast response from data breaching so that a secure environment can be created. - provide the clarity to move forward confidently. REFERENCES [1]. http://searchsecurity.techtarget.com/definition/data-breach [2]. http://www.trendmicro.com/vinfo/us/security/definition/data- breach [3]. http://www.trendmicro.com/vinfo/us/security/definition/data- breach [4]. https://www.veracode.com/security/data-breach [5]. http://www.staffs.ac.uk/legal/privacy/ [6]. https://blogs.cisco.com/security/how-to-improve-privacy-as-a- component-of-your-cyber-governance-program [7]. http://encryption.uconn.edu/new [8]. http://identityfinder.uconn.edu/ [9]. http://antivirus.uconn.edu/ [10]. http://searchitchannel.techtarget.com/feature/Five-components-of- a-data-protection-strategy [11]. https://technet.microsoft.com/en- us/library/dn521015(v=sc.12).aspx