Implementation of Privacy by Design and Technical and Organizational Security Measures: The Data Masking Solution

The European Union is working on a revised set of rules for its data protection framework. The concept and principles of “privacy by design” has been incorporated in this draft. We will assess how data masking can be considered an effective data security measure and whether data masking fulfills privacy by design principles. Data masking is not encryption. It is a technique that provides for the replacement of real data with fictitious but realistic data in test environments.

Rate this:

Advertisements

«Les droits de l’individu dans la révolution numérique» : l’Assemblée nationale française publie son rapport (1re partie)

"Untitled" (photo by Thomas Grospiron; shot on Oct. 9, 2008). Available at http://www.flickr.com/photos/tominou/2935634476/ (Creative Commons "Attribution-NonCommercial-ShareAlike 2.0 Generic (CC BY-NC-SA 2.0)" license.)

L’Assemblée nationale française a adopté en juin dernier un rapport sur “Les droits de l’individu dans la révolution numérique”. Il traite, entre autres, de la sécurité des échanges de données sur les réseaux, en particulier des failles de sécurité et du ‘nuage’ informatique, le ‘cloud’. La première partie de ce billet traite du droit des États-Unis en matière de failles de sécurité. Nous commenterons les autres aspects de ce rapport la semaine prochaine.

Rate this:

The Safe Harbor Framework: not a “safe harbor” anymore for US companies? German expert body insists on stronger compliance stance

On April 29, 2010, the Düsseldorfer Kreis, an informal group of German data protection authorities, published a decision that could have significant repercussions on U.S. companies importing personal data from organizations operating in the European Union. One of these repercussions is that German organizations exporting personal data to the United States should check if the U.S. data importer does indeed comply with the Safe Harbor Framework. Security plan recommendations will provide for a useful guideline to E.U. data exporters to help them comply with the Safe Harbor’s Security Principle.

Rate this:

  • Blog authors

  • Copyright notice

    © Copyright 2010-2014 "Information Security Breaches & The Law".
    All rights reserved, unless noted otherwise under each author's post, page or other material.
    If you would like to discuss licensing terms, contact us at: info [at] security-breaches [dot] com.

  • Enter your e-mail address here to follow this blog and receive notifications of new posts by e-mail.

  • The “Global Information Security Breach Professionals” Group on Linkedin

  • Wordpress Blog Stats

    • 43,336 hits