By Patrick McGrath
There’s been a lot of talk in the office about the use of social data – with the illusion of privacy – being used downstream for questionable purposes. While much of the public outrage is fresh, it has been widely known for years that marketers, including those supporting political campaigns, have been consuming personal data at scale to align demographics and behaviors to their objectives.
While users clearly gave Facebook consent to store and manage their personal data, it is clear that many did not realize the implications. Few have actually read the Facebook privacy terms. Yet they’re still happy to hop on to a third-party frivolous quiz to answer what baked-good their personality most resembles, opening up themselves and their friends to additional data collection and analysis.
This situation highlights two of the basics of electronically stored information (ESI):
- Data is easily and frequently copied
- Controlling its distribution and downstream consumption is extremely difficult
Data has a life of its own
In the 2000s I managed the response to several data loss incidents for a large university. The first of these involved the theft of a laptop from a “secure” location that contained a spreadsheet laden with personally identifiable information of many, many thousands of individuals.
This file was initially created from a system report from a student data warehouse. The personal data in question was deposited several sheets into an excel workbook, without any conscious knowledge of the laptop user. Now think about how many times that spreadsheet might have been emailed, stored on departmental file servers or attached to transactions in distributed applications. At the same organization, we conducted a study that showed how a single document was duplicated and stored in more than a hundred separate locations across departments.
Have you really deleted unnecessary personal data?
We’ve been talking a lot with customers recently about data privacy and the General Data Protection Regulation (GDPR) with the release of our new product, Commvault Sensitive Data Governance. With only a couple of months before GDPR becomes effective, customers report an increased level of anxiety about the presence of personal data as they realize that compliance is more complicated than they expected. We often tell them two things:
- If you don’t need to store personal or sensitive data, then get rid of it if you can legally do so before it creates a problem
- If you must respond to a data breach or data subject requests, you need to be able to find that information quickly
But that’s easier said than done. Especially considering the viral nature of data and any unintended consequences of its use. Data can be anywhere, and there could be a lot of it.
How do you deal with this in your organization? Know, manage and protect your sensitive data with Commvault.