Confused about data governance, privacy & security?

Michael Queenan, co-founder and CEO of Nephos Technologies, explains the difference between these three business critical data strategy principles. 
Michael Queenan, co-founder and CEO of Nephos Technologies, explains the difference between these three business critical data strategy principles. 

Data governance, data privacy and data security. Core to every organisation’s data strategy and a boardroom responsibility, their natural overlap often causes confusion for non-specialists. Let’s simplify what each of these three terms mean for your business. 

1. What is data governance? 

This is the starting point and bedrock for a strong data strategy. The lynchpin to everything. Fail to establish solid data governance and you’re unlikely to achieve adequate levels of data privacy or data security. 

Technology analysts Gartner define data governance as “the specification of decision rights and an accountability framework to ensure the appropriate behaviour in the valuation, creation, consumption and control of data and analytics.” 

In plain English, data governance is establishing formal rules within your organisation for 1) who has authority over 2) which data assets and 3) how those assets can be used.  

Although selective areas of your business may do this to some degree, data governance is all about treating data holistically across the organisation. So, as a business, you need to determine the methods, responsibilities and processes so that data can be formally standardised, integrated, protected and stored. 

Business benefits of good data governance

This systematic, cross-business approach will minimise risks and keep you in control. It will also:

  • establish clear internal policies, metrics and processes for better compliance 
  • increase the value of your data 
  • prepare the business to scale up

2. What is data privacy? 

With data governance in place, step two is to apply privacy controls to your business. This means 1) protecting the privacy of any personal data that your organisation stores or processes and 2) being able to prove that you comply with the law in this respect. 

Data privacy generally applies to personally identifiable information (PII) and personal health information (PHI) connected to your customers and prospects but can extend to your partners, staff, suppliers and so on. 

The latest General Data Protection Regulation (GDPR) insists that businesses do this with transparency and simplicity. For example, it needs to be clear to customers or users:

  • what information you are collecting
  • who is collecting it
  • how it is collected
  • why it is being collected
  • how it will be used
  • who it will be shared with
Why data privacy is an important focus for your business 

Data are possibly the biggest assets a business owns, so it’s key that you nail these aspects in terms of business asset management and regulatory compliance. The fallout of a failure to protect customer data privacy can ring the death knell for a business. The trust you worked so hard to build up can be wiped out overnight.  

3. What is data security? 

Data security refers to the processes and tools that protect sensitive information assets so they are secure and available. 

In the real world, it’s about protecting the hardware in your office, at home, at your data storage or backup centre, or the laptop in your staff member’s backpack as they’re cycling to a meeting. 

In the digital world, it’s protecting digital information from corruption, unauthorised access and theft. That’s anything from securing against basic human error to dealing with a cyber security attack and ransomware. 

When protecting personal data, four key security methods include:

  • Encryption so that personal data are difficult to read or alter by unauthorised parties
  • Masking so data appear to have a lower value
  • Deletion from your systems when data are no longer legally active
  • Backup copies of data, so they are recoverable even if the original data are corrupted or stolen. 

The internationally recognised Cyber Security Framework from the US Commerce Department’s National Institute of Standards and Technology (NIST) is the foundation of most standards. It breaks the framework into five actionable areas. Your business needs to be able to: 

  1. IDENTIFY your weak spots. Audit your systems and services – your assets, data, people, data flows etc. This will allow you to identify where you might be vulnerable to hacks or breaches.
  2. PROTECT your systems and services according to how critical and sensitive each one is. 
  3. DETECT security anomalies in real time through monitoring and alerting.
  4. RESPOND to an attack or breach according to an established protocol – be clear on who should do what and when.
  5. RECOVER your systems and services should the worst happen. Plan your recovery, including agreeing the order of recovery of systems and services.  

READ MORE:

American journalist Edward R. Murrow wrote, “Anyone who isn’t confused really doesn’t understand the situation.” However, hopefully, data governance, data privacy and data security will seem less confusing now.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Why ABM is Key to Strengthening your Marketing Strategy

Erin Lanahan • 16th May 2024

Account-Based Marketing (ABM) is revolutionizing B2B marketing by targeting high-value accounts with personalized strategies. Unlike traditional methods, ABM focuses on specific companies, delivering tailored content that meets their unique needs. This approach not only boosts ROI but also strengthens customer relationships and drives long-term growth. By aligning marketing and sales efforts, ABM ensures a unified...

Overcoming the Obstacles to AI Adoption

Kit Cox • 02nd May 2024

The power of AI combined with suitable use cases and a robust implementation plan can help businesses to radically reduce the time spent on manual, repetitive tasks, and allow teams to prioritise value-added work. But in all the excitement, it’s evident that many businesses are held back by inertia, and a lack of understanding about...

Overcoming the Obstacles to AI Adoption

Kit Cox • 02nd May 2024

The power of AI combined with suitable use cases and a robust implementation plan can help businesses to radically reduce the time spent on manual, repetitive tasks, and allow teams to prioritise value-added work. But in all the excitement, it’s evident that many businesses are held back by inertia, and a lack of understanding about...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...