Page 15 - NOVEMBER MAGAZINE 2022
P. 15

What Makes Data Protection &           Analyze  the  attack  by  pre-
                                             Privacy Important?
                                                                                    contemplation,  contemplation,
                                             The growth of the complete eco-        and  preparation  methods  and

                                             system of connected technology,        then  plan  the  action  and

                                             t e c h n i c a l   a d v a n c e m e n t ,   maintenance steps.
                                             a f f o r d a b i l i t y ,   e d u c a t i o n ,   Prevention is better than Cure
         With high-speed                     adoption,  and  seamless  data       It  is  better  to  be  ready  with  a

          5G connectivity                    sharing has led to the increased     backup  mechanism  and  use
                                             importance of data protection &      proper  tools  and  techniques  to
          and affordable,                    privacy. It is extremely important   safeguard  the  data.  A  fall  back

           fast hardware,                    to  safeguard  information  from     plan  with  a  faster  response  to

           we will witness                   compromise, corruption, or loss.     attacks may minimize the extent
                                                                                  of the loss.
          the adoption of                    Minimizing the Protection Gaps       Take on the Future Data

           protection and                    To minimize the gap, we need to      Protection Law
                                             work on the following areas:         I  am  excepting  a  more  mature
          privacy tools in
                                              Purpose: Of usage, transfer,        data protection law in India with
       households as well.                    and storage.                        c l e a r l y         d e fi n e d

                                              Non-disclosure  agreement           controls/rules/penalties  for  the
                                              and audit: On personalized and      citizens  as  well  as  everyone
       An  IIM  C  alumnus,  Arun  Kumar
                                              specific datasets                    across the globe. The new bill will
       holds  a  Master's  in  Computer
                                              Security  Level  definition:         h a v e   p r o v i s i o n s   f o r   h e f t y
       Application  and  Master  of           Defining  the  life  of  storage,    p e n a l t i e s ,   w h i c h   m e a n s

       Business  Management  (IT  &           setting  disposal  mechanism        enterprises  need  to  be  very
       M a r k e t i n g ) ,   B a c h e l o r   o f   authority,  authentication,  and   f o c u s e d   o n   t h e   a d o p t i o n ,
       Information  Technology,  with         n o t i fi c a t i o n   t o   d e fi n e d   implementation,  and  audit  of
                                              beneficiaries  on  access  to
       15+ yrs. of experience in the IT, e-                                       data protection and privacy rules.
                                              breaches.
       commerce,  Retail,  Mobility,                                              Trends to Watch Out For in 2023
                                             Recovery Post an Attack
       Education,  NGO,  Health  &                                                  2 0 2 3   w i l l   b e   t h e   y e a r   o f
                                              Isolation of affected devices and
       Manufacturing, Services, Travel,       applications  helps  control          protection  and  privacy  tools
       and Telecom domains.                   further loss.                         development,  training,  and
                                                                                    implementation,  especially  In
       Below,  he  sheds  more  light  on     Depending  upon  the  type  of        India.

       the  need  to  minimize  the  data     data and usage, you may take a        W i t h   h i g h - s p e e d   5 G
       protection  gaps  to  safeguard        call to fix the patch to stop the      connectivity and affordable, fast

       i n f o r m a t i o n   f r o m   l o s s ,                                  hardware,  we  will  witness  the
                                              attack so that the application or
       corruption, and compromise.                                                  adoption  of  protection  and
                                              device  begins  to  handle  the
                                                                                    privacy tools in households too.
                                              attack themselves.

                                                                                                               Nov. 2022
   10   11   12   13   14   15   16   17   18   19   20