• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • The Flasher™ 2.0 by Nood, IPL Laser Hair Removal Handset (Refurbished) for $119

    The Flasher™ 2.0 by Nood, IPL Laser Hair Removal Handset (Refurbished) for $119
  • The 2023 Travel Hacker Bundle ft. Rosetta Stone Lifetime Subscription for $199

    The 2023 Travel Hacker Bundle ft. Rosetta Stone Lifetime Subscription for $199
  • Apple iPad Air 2, 16GB – Silver (Refurbished: Wi-Fi Only) for $106

    Apple iPad Air 2, 16GB – Silver (Refurbished: Wi-Fi Only) for $106
  • S300 eufyCam (eufyCam 3C) 3-Cam Kit for $579

    S300 eufyCam (eufyCam 3C) 3-Cam Kit for $579
  • eufy Baby Monitor 2 (2K, Smart, Wi-Fi) for $119

    eufy Baby Monitor 2 (2K, Smart, Wi-Fi) for $119
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

What is “Hyper Data Collection” and Why is More Sophisticated Data Protection Required as a Result of This?

Jan 9, 2023 by iHash Leave a Comment

In the digital age, it is believed that every company is now a data company. One of the most important resources that businesses need for operations and the ability to service customers is data. New data types and new data dangers for enterprises have been produced through digital transformation and the adoption of emerging technologies. Organizations want to take advantage of the insights they may gain from this new data, but they must also take data risks into account and manage them.

Hyper data collection is the ability organizations have to access many different data types from individuals due to their ability to leverage wide-ranging access to an individual’s data through offering multiple products, services, and experiences that can be combined to create more robust profiles of individuals. “Hyper-collector” is a term coined by Brendan Walker, Senior Research Fellow at the University of Queensland, in an article from “The Conversation” called “What do TikTok, Bunnings, eBay, and Netflix have in common? They’re all hyper-collectors.”

Companies should take precautions to protect data that could contain personally identifiable information (PII) to avoid legal Data Privacy Risks and reduce the possibility of data breaches. Organizations must not only be enthusiastic about the benefits of hyper-data gathering when necessary but also put themselves in a position to lower their data risk.

The presence of technology in our households

At this point in time, a vast majority of us have technology in our homes that collect, sort, and analyze data acquired from our private lives. For example, your smart thermostat, smart vacuum cleaner, or refrigerator. These smart IoT devices generate and collect data about you and your family, providing companies with a picture of consumers that were never available. Companies that have these different services may or may not be asking for your consent, or they may be bundling your consent with different services.

A lack of transparency regarding data collection

Large corporations are making use of more information than is necessary, typically in methods that are covert or passive. In many instances, there is not a truly legitimate commercial or legal purpose that supports the practice of hyper-collection, and we often enable these devices with vague consent given to get access to the services these companies provide. Some of these bundled services don’t allow people the granularity to consent to some things and not others.

The FTC has just now signaled that they may consider the ambiguity of consent for individuals and how it is not as clear as it should be and is deceptive. There will be more and more on this topic as the FTC starts to put out memos and blog posts about the issue with hyper data collection. 

Data Security Techniques 

Businesses are ready for a new strategy that will help safeguard data. Encryption-in-use provides a solution that is both straightforward and ground-breaking, where data is encrypted at all times. Customer-controlled keys are the sole means to decode files that have been encrypted using data that is currently being used. Implementing the data-encryption technology within a business can assist in maintaining a new level of security. This technology incorporates various data security strategies, each of which can be applied to valuable data before its storage and remains active during the process.

Companies shouldn’t be forced to choose between providing personalized services and safeguarding their customers and business partners. Using encryption-in-use technology, businesses are given the freedom to innovate with their data while still maintaining the confidentiality and safety of their customer’s data.

The future of hyper data collection

There are two sides to hyper data collection. One side is that it provides us with the ability to analyze data that has never been accessible before, but on the flip side, there is a lack of transparency, which can put individuals’ personally identifiable information (PII) at risk. As computing gets more and more complex in terms of the types of data that are being collected and retained, it is vital that individuals have transparency in what they are consenting to to lower their data risk. Organizations need to know what tools are available to them for better risk management that will allow for more sophisticated data protection.

About the Authors

Arti Raman is the Founder & CEO of Titaniam. She specializes in advanced data protection techniques including high-performance encryption-in-use.

Debbie Reynolds is the Founder & CEO of Debbie Reynolds Consulting, LLC. Debbie Reynolds, “The Data Diva” is a world-renowned technologist, thought-leader, and advisor handling global Data Privacy, Cyber Data Risk, and complex cross-functional data-driven projects. Ms. Reynolds is an internationally published author, highly sought speaker, and top media presence about global Data Privacy, Data Protection, and Emerging Technology issues.

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: https://twitter.com/InsideBigData1

Join us on LinkedIn: https://www.linkedin.com/company/insidebigdata/

Join us on Facebook: https://www.facebook.com/insideBIGDATANOW

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: BigData

Special Offers

  • The Flasher™ 2.0 by Nood, IPL Laser Hair Removal Handset (Refurbished) for $119

    The Flasher™ 2.0 by Nood, IPL Laser Hair Removal Handset (Refurbished) for $119
  • The 2023 Travel Hacker Bundle ft. Rosetta Stone Lifetime Subscription for $199

    The 2023 Travel Hacker Bundle ft. Rosetta Stone Lifetime Subscription for $199
  • Apple iPad Air 2, 16GB – Silver (Refurbished: Wi-Fi Only) for $106

    Apple iPad Air 2, 16GB – Silver (Refurbished: Wi-Fi Only) for $106
  • S300 eufyCam (eufyCam 3C) 3-Cam Kit for $579

    S300 eufyCam (eufyCam 3C) 3-Cam Kit for $579
  • eufy Baby Monitor 2 (2K, Smart, Wi-Fi) for $119

    eufy Baby Monitor 2 (2K, Smart, Wi-Fi) for $119

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

The Flasher™ 2.0 by Nood, IPL Laser Hair Removal Handset (Refurbished) for $119

Jan 31, 2023 By iHash

DoD + DevSecOps: A path toward speed and agility

DoD + DevSecOps: A path toward speed and agility

Jan 30, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates

Jan 31, 2023Ravie LakshmananData Security / Vulnerability Taiwanese company QNAP has released updates to remediate a critical security flaw affecting its network-attached storage (NAS) devices that could lead to arbitrary code injection. Tracked as CVE-2022-27596, the vulnerability is rated 9.8 out of a maximum of 10 on the CVSS scoring scale. It affects QTS 5.0.1 […]

Why AutoML Isn’t Enough to Democratize Data Science 

You can cook food in a microwave in minutes. But we don’t say that microwaves “democratized” cooking. Preparing a meal requires much more: selecting and preparing ingredients, optimizing the cooking method, and creating the right ambiance. The microwave just accelerates one part of the process. Just as microwaves don’t handle the entire meal, automated machine […]

The 2023 Travel Hacker Bundle ft. Rosetta Stone Lifetime Subscription for $199

Expires January 30, 2024 23:59 PST Buy now and get 94% off Rosetta Stone: Lifetime Subscription (All Languages) KEY FEATURES The benefits of learning to speak a second language (or third) are immeasurable! With its intuitive, immersive training method, Rosetta Stone will have you reading, writing, and speaking new languages like a natural in no […]

S300 eufyCam (eufyCam 3C) 3-Cam Kit for $579

Expires January 03, 2123 19:28 PST Buy now and get 0% off KEY FEATURES See 4K Detail Day and Night 180-Day Battery Life Up to 16 TB Expandable Local Storage (Additional Storage Drive Not Included) BionicMind AI Differentiates Family and Strangers HomeBase 3 Centralize Security Management PRODUCT SPECS Resolution 4K (3840×2160)° Night Vision Infrared & […]

eufy Baby Monitor 2 (2K, Smart, Wi-Fi) for $119

Expires January 04, 2123 21:35 PST Buy now and get 0% off KEY FEATURES It’s in the 2K Details: The 2K high-resolution camera with 330 pan, 110 tilt, and 4x zoom features lets you watch over your baby in stunning detail. Night Vision: The non-invasive infrared night vision lets you check on your baby at […]

Charlie Klein

Reduce MTTR with Logz.io’s Single-Pane-of-Glass Observability Data Analytics

Observability data provides the insights engineers need to make sense of increasingly complex cloud environments so they can improve the health, performance, and user experience of their systems. These insights can quickly answer business-critical questions like, “what is causing this latency in my front end?” Or, “why is my checkout service returning errors?” Observability is […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT