Privacy vs. Security - Why Can’t We All Just Get Along? Top 5 Approaches to Yin/Yang Privacy & Security
Aaron Pritz
Cybersecurity Executive | CEO of Reveal Risk | Author & Speaker | Board Advisor
The average employee not working in an IS/Privacy role may hear the terms “Privacy” and “Security” and may think they are two similar capabilities with shared benefits.
Those that have worked in both function within an organization may also believe that they should have an 80% mutual goal: to protect information. However, many organizations find that these are both two fields with moving target expectations and much uncertainty. The practitioner will often find that there is misalignment in goals that can cause dangerous and sometimes passionate conflict.
You can find numerous definitions of privacy and security in many reputable resources. In my own simple terms, I would define the two as:
Privacy: Making sure personally identifiable information is collected, used, and shared with necessity and purpose and only accessible via the appropriate people.
Security: Ensuring information is secure only to those that need access, available at the times it is needed, and free of any unauthorized manipulation.
So inevitably, the common thread of aligned goals is ensuring the right people have access; a term known in the industry as “least privilege" - which simply should mean that the least number of people have access which require it to do their jobs.
So - if protecting information is theoretically a united common goal, why are information security and privacy leaders and professionals not always holding hand singing kumbya? In some extreme cases, they aren't communicating openly and even oppose each others' agenda. The partnership (or lack thereof) can start to erode as information security groups start to pursue monitoring of potential human driven activity involving theft of data (and usually not communicating it well).
If privacy and security both align around preventing data/information loss, why is detecting data/information loss using certain techniques so controversial?
Detecting bad things sounds great and necessary to people who know that bad things are bad and should be punished. However, the feeling of being watched can be scary: even sometimes to those that believe they have nothing to hide. Fears can be stoked by fiction, fact, current or historic events.
Fiction: George Orwell’s 1984 where “Big Brother” created an invasive police state where human behavior was monitored and individuals had no since of individual privacy and were forced to live in fear.
Fact in Historic Events: Many privacy professionals and historians draw correlations between European countries with the strictest privacy laws to be those that were most oppressed in World War II and resulting subsequent governmental/state fall-outs.
Current State Events: Governmental driven intelligence programs and classified information revealed by individuals who are revered as both traitors and heroes (depending on your perspective and country of origin) can be interpreted as surveillance or "overreach" as more and more evidence unveils that this may be true (for countries like US, China, and Russia to start)
The “fear of fear” and sense of personal intrusion is not irrational. Hearing legitimate stories of government over-reach and corporate data mishandling should not be taken lightly. However, this has permeated into businesses and information security capabilities with the same send of paranoia and assumed malevolence.
HOWEVER: this explainable conflict of interest ends up causing a stalemate of action towards the united goal of protecting information. This stalemate can simply be summed up as a fear of overreaching bad guy catching vs the need to catch the bad guy.
So if one can understand the fear of a police/Orwellian state, but also relate to the fact that 90%+ of reported breaches deal with the loss of disclosure of personal information, why can’t the forces that be align to drive appropriate controls to protect, detect and respond to information theft?
领英推荐
Ultimately, it is due to a lack of stakeholders (and lawyers) uniting to prioritize key principles necessary to work though all of the rhetoric that has led to some detection capabilities being viewed as an infringement of privacy.
This concern gets exacerbated when terms like SSL interception ("breaking encryption") and full packet capture ("recording everything") get tossed around without detail or scope, become misunderstood, and result in a unproductive spin towards inaction.
What do these two terms really mean:
So - going back to the unified goal that all companies need to do a better job protecting data/information, it begins to become a bit silly to expect to protect information without being able to capture it, see it, and analyze it. A good analogy would be a gas station with a security camera system that is not allowed to attach a lens to the camera or record any of the footage after the gas station had had numerous robberies and active threats of more robberies.
Ultimately, information security and privacy professionals need to hone in on the core goal of protecting from unauthorized disclosure/compromise of information and figure out the most effective ways to accomplish this across all control perspectives (preventative, detective, or responsive.). With the world we live in and the near-weekly corporate breach news article, we need to bond together to focus on any and all measures to prevent incidents from occurring.
Obviously, companies need to prevent information theft detection from overreach or misuse of power, but if we don’t work towards a mutually benefiting solution of preventing, detecting, and responding to breaches, we will be in a progressive state or inaction and corporate incompetence.
I encourage all security and privacy professionals to band together and get back to basics of protecting information entrusted to the company and achieve mutually beneficial results of a prevent, detect and respond mission.
Here are some take-away tips to attain a Yin/Yang privacy/security organization
These 5 tips may seem like basic fundamentals, but many IS teams and leaders get so engrossed in implementing technology and self-importance in their own missions. These leaders fail to execute on the critical relationships, understanding, and alignment required to move a company's ability to catch bad guys/girls forward.
Feel free to COMMENT, REPOST, or LIKE to encourage keeping these free articles coming.
It has been suggested that Block Chain can improve security by making all transactions verifiable and unalterable. Unfortunately, this also makes it public. So you must then choose between privacy and security.