Connect with us

Hi, what are you looking for?

Business

Why privacy (CCPA) measures require more than just encryption (Includes interview)

From July 1, 2020 the California Consumer Privacy Act (CCPA) went live. This is the U.S.’s attempt to develop a consumer-protecting privacy framework along the lines of the European Union General Data Protection Regulation (GDPR), albeit in a slightly less stringent form. While the CCPA is a California specific area of legislation it not only extends to companies working in California but also firms that undertake business within California. Given the size of the Californian economy, where the economy is greater than many nation states, the new measures have a truly global impact.

READ MORE: Are you ready for (CCPA) privacy rights and consumer protection?

Looking into the security issues is Cindy Provin of Entrust Datacard. Provin assess the necessity of establishing roots of trust throughout the enterprise during the initial months of the CCPA kicking in.

Provin sees security as essential, stating: “Encryption protects sensitive information including financial data, government identifications and Social Security numbers by making it unreadable.” Yet there is an important point to take note of, says Provin. This is “if you fail to protect the encryption keys it’s like locking your front door and leaving the keys under the mat.” This means the necessity of developing robust encryption keys and security credentials.

According to Provin, business investment in encryption goes beyond simply ticking a box marked ‘compliance requirements’. A good security measure can also help to increase customers and enhance the reputation of a firm. With this point she states: “When businesses employ encryption and key management, they are better positioned to win and keep customers everywhere.”

As to what this entails, Provin says: “A root of trust must be established to ensure that the keys and credentials that underpin the security of the encryption solutions deployed are always protected. Hardware security modules can enable that, acting as the root of trust to store and manage encryption keys and credentials.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

World

US President Joe Biden delivers remarks after signing legislation authorizing aid for Ukraine, Israel and Taiwan at the White House on April 24, 2024...

Business

Meta's growth is due in particular to its sophisticated advertising tools and the success of "Reels" - Copyright AFP SEBASTIEN BOZONJulie JAMMOTFacebook-owner Meta on...

World

AfD leaders Alice Weidel and Tino Chrupalla face damaging allegations about an EU parliamentarian's aide accused of spying for China - Copyright AFP Odd...

World

Iran's supreme leader Ayatollah Ali Khamenei leads prayers by the coffins of seven Revolutionary Guards killed in an April 1 air strike on the...