Page 15 - NOVEMBER MAGAZINE 2022
P. 15
What Makes Data Protection & Analyze the attack by pre-
Privacy Important?
contemplation, contemplation,
The growth of the complete eco- and preparation methods and
system of connected technology, then plan the action and
t e c h n i c a l a d v a n c e m e n t , maintenance steps.
a f f o r d a b i l i t y , e d u c a t i o n , Prevention is better than Cure
With high-speed adoption, and seamless data It is better to be ready with a
5G connectivity sharing has led to the increased backup mechanism and use
importance of data protection & proper tools and techniques to
and affordable, privacy. It is extremely important safeguard the data. A fall back
fast hardware, to safeguard information from plan with a faster response to
we will witness compromise, corruption, or loss. attacks may minimize the extent
of the loss.
the adoption of Minimizing the Protection Gaps Take on the Future Data
protection and To minimize the gap, we need to Protection Law
work on the following areas: I am excepting a more mature
privacy tools in
Purpose: Of usage, transfer, data protection law in India with
households as well. and storage. c l e a r l y d e fi n e d
Non-disclosure agreement controls/rules/penalties for the
and audit: On personalized and citizens as well as everyone
An IIM C alumnus, Arun Kumar
specific datasets across the globe. The new bill will
holds a Master's in Computer
Security Level definition: h a v e p r o v i s i o n s f o r h e f t y
Application and Master of Defining the life of storage, p e n a l t i e s , w h i c h m e a n s
Business Management (IT & setting disposal mechanism enterprises need to be very
M a r k e t i n g ) , B a c h e l o r o f authority, authentication, and f o c u s e d o n t h e a d o p t i o n ,
Information Technology, with n o t i fi c a t i o n t o d e fi n e d implementation, and audit of
beneficiaries on access to
15+ yrs. of experience in the IT, e- data protection and privacy rules.
breaches.
commerce, Retail, Mobility, Trends to Watch Out For in 2023
Recovery Post an Attack
Education, NGO, Health & 2 0 2 3 w i l l b e t h e y e a r o f
Isolation of affected devices and
Manufacturing, Services, Travel, applications helps control protection and privacy tools
and Telecom domains. further loss. development, training, and
implementation, especially In
Below, he sheds more light on Depending upon the type of India.
the need to minimize the data data and usage, you may take a W i t h h i g h - s p e e d 5 G
protection gaps to safeguard call to fix the patch to stop the connectivity and affordable, fast
i n f o r m a t i o n f r o m l o s s , hardware, we will witness the
attack so that the application or
corruption, and compromise. adoption of protection and
device begins to handle the
privacy tools in households too.
attack themselves.
Nov. 2022