Story image

Google's €50m fine a wake up call for big data analytics

23 Jan 2019

You only have to look as far as Google’s €50 million slap on the wrist from France to know that GDPR is here and the first wave has begun.

Now that there’s another high-profile case that demonstrates the consequences, companies must now focus on more than just consent to show that they are legally allowed to process analytics and AI, says security firm Anonos.

Data analytics are essential to company growth, competitive differentiation, and innovation. But there’s now a huge challenge.

“When analytics and AI cannot be described with specificity at the time of data collection - which is mostly the case with secondary processing - corporations can no longer rely on consent as they did before the GDPR. New technical and organisational safeguards are required under the GDPR to support analytics and AI processing,” says Anonos CEO Gary LaFever.

Now to remain legal under GDPR, organisations must have GDPR-compliant technical and organisational safeguards in place for secondary processing like iterative analytics and artificial intelligence (big data).

Those safeguards must do the following, according to Anonos:

1.    Satisfy a "balancing of interest" test that requires "functional separation" (the ability to separate the information value of data from the identity of data subjects) to reduce the negative impact on data subjects so that the data controller's legitimate interests are not overridden. Recent high-profile lawsuits against Oracle and Acxiom make it clear that simply claiming a "legitimate interest" in commercialising personal data is not enough;

2.    Ensure compliance with requirements that the secondary processing is compatible with the original purpose for which the data was collected; and

3.    Restrict access by default to the minimum data necessary for each purpose for which it is processed - known as Data Minimisation, a level of granular control not supported by traditional technologies like encryption.

“Technical and organisational safeguards satisfying these GDPR requirements were not previously required for lawful secondary processing using consent. As a result, most organisations do not have required new technology in place. What was ‘good enough’ prior to the GDPR is no longer legal.”

Advocacy groups that champion privacy are proactive – (Max Schrems' None Of Your Business (nyob) organisation in Austria and France's Quadrature du Net in the case of Google and UK-based Privacy International in the case of Oracle and Acxiom), LaFever notes.

Organisations need to assess and implement appropriate technical and organisational safeguards that enforce functional separation in a timely manner to ensure uninterrupted access to data, analytics and AI to fuel growth, competitive differentiation and innovation,” concludes LaFever.

Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.