Elevator Pitch: Automatic Data-centric Lifecycle Protection Solution
Presentation Summary
It is evident that an automatic data-centric protection solution for the entire data lifecycle is needed to effectively track, safeguard, and control its contents, whether stored or transported, to maintain security, privacy, and data sovereignty. Figure 1 contains an embedded thirty-second video generated through the Animoto website, a cloud-based video creation SaaS that produces customized web-based video presentations from photos, video clips, and music (Animoto, n.d.). It provides a quick rundown on these controls and the most significant social and political challenge this solution faces.
Automatic Data-centric Lifecycle Protection Solution
Supervised artificial intelligence (AI) and machine learning (ML) will enhance data categorization and classification to trigger protection and monitoring techniques. Such protection techniques include encryption and ABAC-driven digital rights management solutions (Martin, 2019). ABAC takes a data-centric approach to reducing human error by ensuring privacy and security through a central policy management engine, granting or revoking role access to encrypted content based on labels, and ensuring the right users access the correct data in approved locations (Lamprecht, 2022).
Supported and summarized through five use cases, we quickly cover the known, technological, social, and political aspects that challenge the ability to ensure people, processes, and technology carry out their intended functions focused on the importance of privacy and data protection on a global scale with the agility and resilience to handle the various nations' ever-growing or changing laws (UNCTAD, n.d.).
The five worldwide legislation use cases:
- Summary of Adoption of E-Commerce Legislation Worldwide
- E-transactions Legislation Worldwide
- Data Protection and Privacy Legislation Worldwide
- Cybercrime Legislation Worldwide
- Online Consumer Protection Legislation Worldwide
Adopting this type of solution still presents a challenge on a per point of view basis for each country of origin. Even with threat feeds, or OFAC sanctions lists, etc., from the perspective of the United States of America, do not guarantee the same intelligence is available within the other current 136 out of 193 nations with digital data capabilities (UNCTAD, n.d.; U.S. DEPARTMENT OF THE TREASURY, 2022). Therefore, outside the realm of computer-based intelligence, it will be mandatory for the foreseeable future to monitor and add these additional feeds in each instance of the solution and its representative central policy management backend to maintain business agility and facilitate collaboration while reducing risk and adhering to governance and compliance (Lamprecht, 2022; U.S. DEPARTMENT OF THE TREASURY, 2022).
Comments
Post a Comment