Elevator Pitch: Automatic Data-centric Lifecycle Protection Solution

Presentation Summary

It is evident that an automatic data-centric protection solution for the entire data lifecycle is needed to effectively track, safeguard, and control its contents, whether stored or transported, to maintain security, privacy, and data sovereignty. Figure 1 contains an embedded thirty-second video generated through the Animoto website, a cloud-based video creation SaaS that produces customized web-based video presentations from photos, video clips, and music (Animoto, n.d.). It provides a quick rundown on these controls and the most significant social and political challenge this solution faces.

Figure 1:
Automatic Data-centric Lifecycle Protection Solution

Elevator pitch for an automatic data-centric lifecycle protection solution utilizing classification, EDRM, and encryption techniques to address security, privacy, and sovereignty requirements (Animoto, n.d.; Eck, 2022; Firican, 2021; Lamprecht, 2022; Microsoft, 2018; UNCTAD, n.d.). 


Supervised artificial intelligence (AI) and machine learning (ML) will enhance data categorization and classification to trigger protection and monitoring techniques. Such protection techniques include encryption and ABAC-driven digital rights management solutions (Martin, 2019). ABAC takes a data-centric approach to reducing human error by ensuring privacy and security through a central policy management engine, granting or revoking role access to encrypted content based on labels, and ensuring the right users access the correct data in approved locations (Lamprecht, 2022).

Supported and summarized through five use cases, we quickly cover the known, technological, social, and political aspects that challenge the ability to ensure people, processes, and technology carry out their intended functions focused on the importance of privacy and data protection on a global scale with the agility and resilience to handle the various nations' ever-growing or changing laws (UNCTAD, n.d.). 

The five worldwide legislation use cases:

  1. Summary of Adoption of E-Commerce Legislation Worldwide
  2. E-transactions Legislation Worldwide
  3. Data Protection and Privacy Legislation Worldwide
  4. Cybercrime Legislation Worldwide
  5. Online Consumer Protection Legislation Worldwide

Adopting this type of solution still presents a challenge on a per point of view basis for each country of origin. Even with threat feeds, or OFAC sanctions lists, etc., from the perspective of the United States of America, do not guarantee the same intelligence is available within the other current 136 out of 193 nations with digital data capabilities (UNCTAD, n.d.; U.S. DEPARTMENT OF THE TREASURY, 2022). Therefore, outside the realm of computer-based intelligence, it will be mandatory for the foreseeable future to monitor and add these additional feeds in each instance of the solution and its representative central policy management backend to maintain business agility and facilitate collaboration while reducing risk and adhering to governance and compliance (Lamprecht, 2022; U.S. DEPARTMENT OF THE TREASURY, 2022).


References

Animoto. (n.d.). [Home page]. https://animoto.com/
Eck, T. (2022, January 20). 7 steps to effective data classification. Sirius Edge. https://edge.siriuscom.com/security/7-steps-to-effective-data-classification 
Firican, G. (2021, August 3). What is the difference between data classification and data categorization? LightsOnData. https://www.lightsondata.com/what-is-the-difference-between-data-classification-and-data-categorization 
Lamprecht, Z. (2022, April 8). What is enterprise digital rights management (EDRM). NextLabs. https://www.nextlabs.com/products/edrm/ 
Martin, J. A. (2019, August 21). What is access control? A key component of data security. CSO Online. https://www.csoonline.com/article/3251714/what-is-access-control-a-key-component-of-data-security.html 
Microsoft. (2018, June 21). Data classification - the first step to protecting your companies sensitive data. Microsoft Pulse. https://pulse.microsoft.com/en-ie/technology-lifestyle-en-ie/na/fa3-data-classification-the-first-step-to-protecting-your-companies-sensitive-data/ 
UNCTAD. (n.d.). Data protection and privacy legislation worldwide | UNCTAD. United Nations Conference on Trade and Development. https://unctad.org/page/data-protection-and-privacy-legislation-worldwide 

Comments

Popular Posts