International Data Privacy Day: Top Five Privacy Predictions

Monday, January 24, 2011

Rebecca Herold


International Data Privacy Day is January 28 - Rebecca Herold, The Privacy Professor, Uncovers 2011's Top Five Privacy Predictions

As electronic privacy becomes increasingly complex, it’s more crucial than ever that consumers and businesses understand their exposure and take steps to ensure their information is not compromised. January 28 is Data Privacy Day, as recognized by governments and technology leaders around the world.

To honor Data Privacy Day, kick off the year and the new website, Rebecca Herold, the Privacy Professor, reveals the top five privacy predictions for 2011:

1. All types of organizations must consider the risks involved with using cloud computing.

More organizations will use outsourced cloud (remote computing and storage) services. Particularly small and medium-sized companies will move their information security and IT functions to outsourced clouds because they simply do not have the expertise internally to effectively manage security and privacy, and cannot afford to hire traditional hourly consultants to help them.

This will also be the case for education institutions currently struggling with budget cuts. Cloud services can be quite secure, but some simply aren’t. Organizations must know the right questions to ask, and get satisfactory answers, prior to using one.

2. Every organization is affected by social media sites.

Companies will use social media sites even more to communicate about their services and practices, and as a result of human error, malicious intent or even lack of knowledge, there will be significant privacy breaches (unauthorized use or release of personal information) through these sites.

Companies must ensure they have policies and supporting procedures in place for their personnel to follow with regard to posting (and actually not posting) information about the business, coworkers, customers and clients, even when employees are away from work, using their own computers.

3. Healthcare privacy issues will become more problematic and come under heavier scrutiny.

Healthcare providers that qualify are clamoring to get their $44,000 in “meaningful use” stimulus funds to convert to electronic health records. As part of the requirements for the funds, providers must perform an information security risk assessment and fix any problems discovered.

Plus, providers and their business associates (accounting firms, ad agencies, financial institutions, etc.) will be held to stricter compliance regulations due to changes in HIPAA and the HITECH Act. This will ultimately be good for consumers, but the transition, even with these additional requirements in place, will result in more breaches if providers and associates don’t implement safeguards in a comprehensive manner.

4. All organizations that collect, store or handle personal information will increasingly perform privacy impact assessments to determine how to best address their individual circumstances.

These assessments will emerge as a corporate necessity, with utilities companies leading the way. For example, as utilities start converting customers to smart meters and connecting to the Smart Grid, and as manufacturers create new types of smart appliances, they will face significant hurdles to prove their offerings protect consumer privacy.

5. All organizations must address the risks inherent with mobile computing.

It would be hard to find a company today where personnel are not using mobile computers, smart phones or electronic storage devices. This use, and working away from the office, will continue to increase dramatically in 2011. Large amounts of sensitive and confidential information is often stored on such devices.

Mobile computers and storage devices are very easy to misplace, to lose or forget, and are a favorite target of thieves. Appropriate security must be in place to protect them, and the information stored within them.

The weakest link in information security and privacy is people. Studies show that most incidents and breaches occur because people simply didn’t know what they were doing, they made a silly mistake, or they had ill intent because they knew that they would likely not get caught.

Many laws and regulations explicitly require formal, ongoing training and awareness – not only HIPAA, HITECH, and GLBA, but also many other federal, state and local level laws, regulations and industry standards. Penalties will become increasingly heavier for organizations that lack effective training and awareness activities.

To learn more, please visit There, organizations can find tips and educational vehicles and programs, such as Security Search, a fun, interactive and ongoing training activity based on one of CSI’s Information Security Programs of the Year, which Herold designed for a Fortune 500 company.

Rebecca Herold, The Privacy Professor, is an information privacy, security and compliance consultant, instructor and author who has published 14 books and over 200 articles in her field. Rebecca is a world-renowned industry spokesperson whose accomplishments include:

- Leader of the federal government’s NIST Smart Grid Cyber Security Privacy Subgroup
- Created the first cloud computing HIPAA/HITECH compliance platform for small businesses
- Named to “Best Privacy Advisers in the World” by Computerworld
- Recognized among "Top 59 Influencers in IT Security” by IT Security
- Named as one of “Eight Privacy Firms to Watch” by Computerworld
- Winner of The CSI Information Security Program of the Year
- Adjunct professor, NSA-certified Norwich University Master of Science in Information Assurance
- Certifications: CIPP, CISSP, CISA, CISM, FLMI


Possibly Related Articles:
Security Awareness
HIPAA Privacy Cloud Security Social Media Mobile Devices International Data Privacy Day
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.

Most Liked