Data Privacy and
Security
BY S A RT H A K K E D I A
• Data Privacy is
Data Privacy concerned with the
proper handling,
processing, storage and
usage of sensitive data.
• This includes personal
data and other
confidential data, such
as certain financial data
and intellectual property
data.
• It is essential to meet
regulatory requirements
as well as protecting the
confidentiality and
immutability of the data.
• Data Privacy is essential
Importance of Data
because:
Privacy
1. Breaching of government data
can put top secret information in
hands of the enemies.
2. Personal health information may
be misused of patients in case of
data breach at hospitals
3. Data breach at a corporation can
put proprietary data in the hands
of a competitor
4. Student’s data breaches may
cause inconvenience to both the
parent and child as it can become
a source for humiliation as well as
constant pestering by coaching
institutes
To ensure data privacy
• Understanding what data you
have collected, how is it
handled, processed, used and
where it is stored.
• Only necessary data required
for a project should be
collected.
• User consent while data
collection must be of utmost
importance
Data Security
• Data security involves safeguarding
digital information from unauthorised
access, corruption, or theft throughout
its entire lifecycle.
• It is related to securing sensitive data,
to prevent unauthorized access, theft,
corruption of data regardless the data is
personal or not.
• Under data security, malicious activities
which harm, destroy, misuse or steal
digital data should be prevented.
Importance of data • Cyberattacks effect all
people.
security • The fast technological
changes will boom
cyberattacks.
• Data cybersecurity is also
crucial to preventing the
reputational risk that
accompanies a data breach.
• A high-profile hack or loss of
data can result in customers
losing trust in an organization
and taking their business to a
competitor.
• This also runs the risk of
serious financial losses, along
with fines, legal payments,
and damage repair in case
sensitive data is lost.
Types of data security
controls
• The different types of data security controls are:
1. Strong passwords- A strong password
makes it difficult for unauthorised individuals
and automated programmes to crack. It
should include at least 8 characters(upper and
lower case), numbers and special characters.
2. Authentication- It is an additional security
slayer in online data systems. It requires
additional forms of authentication to verify the
identity.
3. Data Backup- Data backup refers to the
process of creating copies of data to ensure
that it can be restored in the event of data
loss due to unexpected events.
4. Encryption- Encryption is a security
technique that transforms readable data(plain
text) into an unreadable format(ciphertext)
using an algorithm and an encryption key.
Types of data security
controls
• The further data security controls:
1. Data Disposal- Data disposal refers to the process of
securely destroying or deleting data that is no longer
needed to prevent unauthorised access, recovery and
misuse.
2. Firewall and antivirus software- Using firewall and
antivirus software can stop and alert users of any
suspicious activity happening on their devices.
3. Data masking- It obscures data so that, even if
criminals exfiltrate it, they can’t make sense of what
they stole. It involves replacing legitimate data with
similar but fake data.
4. Training- Corporates must take up regular data
security sessions of their staff to sensitise them about
following the data protection processes being
implemented and the importance of doing so.
5. Audits and testing security systems- Regular
audits and testing security systems(hardware and
software), policies also play a crucial role.
6. Other basic preventions- Being aware of
surroundings and threats and following the
regulations.
Difference between data privacy and security
Data Privacy Data Security
Data privacy ensures the ethical Data security ensures the
and lawful use of data protection of data from
unauthorized access and
breaches
It focuses on how data is It focuses on safeguarding
collected, used, shared and personal data, business data,
stored so that the rights of intellectual property and other
individuals over their data is various threats
protected
Data Privacy and Data • Data Security in AI
Security in AI AI systems rely on vast
amounts of data for training
and operation.
Unauthorised access and
tampering could lead to
inaccurate AI models and
compromised outcomes.
• Data Privacy in AI
Data privacy brings the
ethical use of AI. This
ensures that AI systems
comply with data privacy
laws and regulations to help
protect individuals’ rights
and maintain public trust.
• Cybercrime is one of the
Conclusion fastest growing crimes
and it crucial to remain
protected from cyber-
attacks by being aware
of the most up to date
cyber security tips and
best practices.
• The best practices for
cybersecurity continue
to evolve as it becomes
a complex problem
which includes
protecting computers,
servers, mobiles,
networks from harmful
attacks