Mobile mashing means more headaches
Jinfo Blog
15th September 2007
Item
Data mashing offers enormous opportunities for corporate information managers. So recent guidance from the Information Commissionerâs Office, called Determining What Is Personal Data http://digbig.com/4tpns should give food for thought. âMeans of identifying individuals that are feasible and cost-effective, and are therefore likely to be used, will change over time,â the guidance says. âIf you decide that the data you hold does not allow the identification of individuals, you should review that decision regularly in light of new technology or security developments or changes to the public availability of certain records.â So cleverer ways of adding value to data could turn what was previously anonymised material into means of identifying individuals â and that would bring it into the scope of data protection law. Itâs a point coincidentally reinforced in an article in Science magazine http://www.cmu.edu/news/archive/2007/August/aug30_duncan.shtml by George Duncan, a professor of statistics at Carnegie Mellon University in Pittsburgh. Traditional methods of âde-identifyingâ US Census records, for example â such as stripping away Social Security numbers or birthdates â are inadequate to safeguard privacy because a person who knows enough about the data pool could use other characteristics to identify individuals, Professor Duncan maintains. For example, he is the only person who holds a PhD in statistics and teaches in Carnegie Mellon's H John Heinz III School of Public Policy and Management, so any dataset that included that information, even with his name removed, could be used to determine his identity. Although you do admittedly need to know quite a lot about Professor Duncan to crack this particular piece of anonymisation, the scenario translates very easily to, say, a company that holds lots of information on customers and their purchasing habits which it exploits for business development purposes. At which point a further ingredient to bring to the mix is mobile computing. According to research commissioned by networking company Cisco and the National Cyber Security Alliance http://newsroom.cisco.com/dlls/2007/prod_082107b.html employees can be extraordinarily lax about data security when using wireless networks. Nearly three quarters of those surveyed said that they didnât always consider security threats when working away from the office, and well over a quarter said they âhardly everâ paid attention to proper security behaviour. At least a third of mobile users were prepared to use any available wireless network, in any country, regardless of security considerations, and shrugged off responsibility for their actions as well. âIt's IT's job, not mine,â said one. The buck is unlikely to stop with IT for much longer. With the merging of public domain information, internal resources and personal networking, itâs the corporate information manager whoâs likely to be in the firing line next.About this article
- Blog post title: Mobile mashing means more headaches
- Link to this page
- View printable version
What's new at Jinfo?
Community session
11th December 2024
2025 strategic planning; evaluating research reports; The Financial Times, news and AI
5th November 2024
How are information managers getting involved with AI? Navigating privacy, ethics, and intellectual property
- 2025 strategic planning; evaluating research reports; The Financial Times, news and AI
5th November 2024 - All recent Jinfo Subscription content
31st October 2024 - End-user training best practice research
24th October 2024
- Jinfo Community session (TBC) (Community) 23rd January 2025
- Clinic on contracting for AI (Community) 11th December 2024
- Discussing news and AI strategies with the Financial Times (Community) 21st November 2024
Learn more about the Jinfo Subscription