8 Data Protection Tips for Handling Personal Information


The digitization of everything that is personal is truly a phenomenon. Our digital footprints cover the Internet like a trail of breadcrumbs and can reveal every transaction and communication we make.

Personal information is anything that can be traced back to an individual, and personal data covers a spectrum of digital attributes that ultimately creates a “digital me.” This includes name, address, date of birth and so on, but it also includes IP address, online behavior, political preferences, biometrics, and other scraps of information. The GDPR, which is now synonymous with personal data, says this about data and an individual:

“[A]n identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.”

As custodians of personal information that represents an individual, an organization has to accept a level of responsibility towards this data. Here are some suggestions for data handling that will give your organization kudos and show you have respect for your customers, employees and your wider community.

8 Ways to Show Your Respect for Personal Information

Outline Your Principles of Notice and Choice

A standard model of notice and choice needs to become the norm for any organization that processes personal information. It’s all too common for an organization to feel they have a right to an individual’s data by giving them a service. While it’s true that every action should have an equal and opposite reaction — you scratch my back and I’ll scratch yours — the processing of personal data has overstepped the mark.

The interaction between individuals and social media (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Susan Morrow. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/IGzN8Zbp5sk/