Connect with us

Hi, what are you looking for?

Business

Why privacy (CCPA) measures require more than just encryption (Includes interview)

From July 1, 2020 the California Consumer Privacy Act (CCPA) went live. This is the U.S.’s attempt to develop a consumer-protecting privacy framework along the lines of the European Union General Data Protection Regulation (GDPR), albeit in a slightly less stringent form. While the CCPA is a California specific area of legislation it not only extends to companies working in California but also firms that undertake business within California. Given the size of the Californian economy, where the economy is greater than many nation states, the new measures have a truly global impact.

READ MORE: Are you ready for (CCPA) privacy rights and consumer protection?

Looking into the security issues is Cindy Provin of Entrust Datacard. Provin assess the necessity of establishing roots of trust throughout the enterprise during the initial months of the CCPA kicking in.

Provin sees security as essential, stating: “Encryption protects sensitive information including financial data, government identifications and Social Security numbers by making it unreadable.” Yet there is an important point to take note of, says Provin. This is “if you fail to protect the encryption keys it’s like locking your front door and leaving the keys under the mat.” This means the necessity of developing robust encryption keys and security credentials.

According to Provin, business investment in encryption goes beyond simply ticking a box marked ‘compliance requirements’. A good security measure can also help to increase customers and enhance the reputation of a firm. With this point she states: “When businesses employ encryption and key management, they are better positioned to win and keep customers everywhere.”

As to what this entails, Provin says: “A root of trust must be established to ensure that the keys and credentials that underpin the security of the encryption solutions deployed are always protected. Hardware security modules can enable that, acting as the root of trust to store and manage encryption keys and credentials.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

New funding aims to close the AI infrastructure gap for Canadian businesses.

Social Media

Meta wants to derail a freshly released memoir by a former employee whose scandalous allegations the tech giant argues are untrue.

Tech & Science

Most companies don’t have a data problem. They have a data chaos problem.

Life

Simply looking at nature -- or even just digital pictures of it -- can relieve pain.