NSA data collection raises corporate privacy, info management concerns

We've searched our sister sites and uncovered great content explaining how NSA data collection efforts are influencing corporate privacy and security.

The controversy surrounding the National Security Agency's (NSA) data collection efforts was one of the biggest

stories of last year, as government officials, industry professionals and consumers battled over where to draw the line between security and privacy. The issue has had a major effect across IT, as businesses were forced to re-examine information management processes in an effort to protect confidential customer information while still achieving maximum business benefit.

Across SearchCompliance's sister sites, we've found some great articles explaining how the spotlight on NSA data collection is influencing corporate privacy, security and overall information management. In these pieces, learn how the NSA controversy has shed new light on personal online information protection and how it's influencing corporate privacy and security policies.

Can CIOs learn and benefit from NSA data collection efforts?
For today's information-centric society, the push-pull between systems' data management capabilities and individual rights is complex. It's easier than ever before to collect, keep and search digitized data -- including Web log traffic and geolocation info. The NSA surveillance activities are a prime example, as the agency asserts that it uses metadata to reveal nefarious behaviors and protect national security. But can businesses benefit from these metadata tracking techniques? In this SearchCIO Data Mill column, Nicole Laskowski discusses the benefits and drawbacks as businesses incorporate traits inherent to the NSA's data collection efforts.

The NSA data monitoring controversy influencing enterprise security strategy
NSA data collection processes have raised privacy concerns among private U.S. citizens, but enterprises have been embroiled in the online monitoring debate as well. Under NSA processes and U.S. surveillance laws, federal authorities can demand customer information from private sector companies. In this SearchSecurity video interview recorded in Boston at Information Security Decisions 2013, Rich Mogull, CEO and analyst for Phoenix-based consultancy Securosis, discusses why enterprises need to be aware of the data they collect from users and why they must remain vigilant as the NSA controversy potentially weakens security products and standards.

Information ethics issues arise as organizations try to balance access, privacy
In the big data era, companies are struggling to achieve information privacy and efficient data access. Data snooping by the NSA and high-profile retail store breaches have only made this struggle more complicated and created more corporate "data ethics" concerns. In this column from SearchDataManagement editor Jack Vaughan, learn why data professionals must find the right balance between accessing data, protecting individuals' privacy and using information to make money.

More on data collection and privacy

Legislators push for consumer protection measures after Target breach

Online privacy controversy forces new look at surveillance laws

Data collection policy considered following NSA surveillance revelations
As NSA data collection activities grabbed headlines last summer, the White House went into damage-control mode: President Barack Obama announced the development of a working group tasked with reviewing how data collection and analysis affect people's privacy and discussed potential reforms to NSA surveillance activities. But would these changes to U.S. data collection policies impede business innovation? Find out in this SearchCIO Searchlight column.

NSA controversy exemplifies global Web privacy issues
The NSA's surveillance activities were only the tip of the iceberg when it came to all the controversial data privacy news that came to light in the past several months. The debate over whether data security takes precedence over privacy (and vice versa) should give CIOs pause, according to SearchCIO writer Karen Goulart. Learn why in this column, as Goulart explains the tightrope CIOs must walk between online security and employee privacy.

This was first published in February 2014

Dig deeper on Information technology governance

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close