Connect with us

Hi, what are you looking for?

Business

Why privacy (CCPA) measures require more than just encryption (Includes interview)

From July 1, 2020 the California Consumer Privacy Act (CCPA) went live. This is the U.S.’s attempt to develop a consumer-protecting privacy framework along the lines of the European Union General Data Protection Regulation (GDPR), albeit in a slightly less stringent form. While the CCPA is a California specific area of legislation it not only extends to companies working in California but also firms that undertake business within California. Given the size of the Californian economy, where the economy is greater than many nation states, the new measures have a truly global impact.

READ MORE: Are you ready for (CCPA) privacy rights and consumer protection?

Looking into the security issues is Cindy Provin of Entrust Datacard. Provin assess the necessity of establishing roots of trust throughout the enterprise during the initial months of the CCPA kicking in.

Provin sees security as essential, stating: “Encryption protects sensitive information including financial data, government identifications and Social Security numbers by making it unreadable.” Yet there is an important point to take note of, says Provin. This is “if you fail to protect the encryption keys it’s like locking your front door and leaving the keys under the mat.” This means the necessity of developing robust encryption keys and security credentials.

According to Provin, business investment in encryption goes beyond simply ticking a box marked ‘compliance requirements’. A good security measure can also help to increase customers and enhance the reputation of a firm. With this point she states: “When businesses employ encryption and key management, they are better positioned to win and keep customers everywhere.”

As to what this entails, Provin says: “A root of trust must be established to ensure that the keys and credentials that underpin the security of the encryption solutions deployed are always protected. Hardware security modules can enable that, acting as the root of trust to store and manage encryption keys and credentials.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

The Nobel Prize in Medicine was awarded on Monday to two US scientists for discovering microRNA.

World

A resident boards up his windows in Palm Harbor, Florida, ahead of Hurricane Milton's expected mid-week landfall - Copyright AFP Bryan R. SMITHGerard Martinez,...

Entertainment

On Sunday, October 6th, an all-star play reading took place at The Gerald W. Lynch Theater in New York, which benefits The Acting Company.

Business

China has unveiled a string of measures aimed at boosting the world's number two economy, particularly the property sector - Copyright AFP Hector RETAMALMatthew...