Australia’s Digital ID Act 2024 (the Act) commences on 1 December 2024. The Act aims to provide individuals with secure, convenient, voluntary and inclusive ways to verify their identity for use in online transactions with government and businesses. It sets out the principles, governance, and oversight mechanisms for the regulation of […]
Data - Sharing & Identity
Australian Government Data Catalogue now live
The public beta for the Australian Government Data Catalogue went live on 8 July 2024. You can search the Catalogue on Dataplace, a central point for finding and requesting data held by the Australian Government. Once users have discovered the data they wish to access in the Catalogue, they will be […]
Dark Data – the risks, costs and ESG
Dark data poses potentially significant risks and costs for organisations. Additionally, with an increasing focus on ESG reporting, organisations should be considering how they can measure and report on each element of ESG with respect to data being collected, generated, used and stored. This article by Susan Bennett considers the […]
What is ‘dark data’ and how is it raising carbon footprints?
In this article from the World Economic Forum, Tom Jackson and Ian R. Hodgkinson identify that organisations need to think about how to manage their data to minimise their digital carbon footprint.
Storage of ‘dark data’ defined as single-use data in the article, data takes up space on servers and results in increased electricity consumption. The authors point out that digitization generated 4% of global greenhouse gas emissions in 2020.
To read more on how dark data contributes to carbon emissions, and how organisations can lower their carbon footprint, click here.
Five Common Misconceptions about Structured and Unstructured Data
Key Takeaways:
- Structured data is quantitative (anything you can easily store in rows and columns) and relatively easier to keep compliant.
- Unstructured data is qualitative (think your emails and Teams chats) and much harder to manage.
- Nearly all organizations are operating under one or more misconceptions about their data (and compliance or lack thereof with new privacy laws!).
The Two Types of Data Your Organization is Accumulating (and Why You Should Care)
We’ll start with why you should care.
If you’re familiar with the data compliance space, you already know that new laws require your organization to take specific steps to protect the rights of anyone whose data they hold. (If you’re not familiar with data compliance – surprise!)
The first step to maintaining compliance with these laws is understanding what data your organization actually has. Not having this understanding is dangerous for three reasons:
- The less you know about your data holdings, the more likely they are to contain noncompliant data. Which means legal action and large fines if they stay that way.
- In today’s world, it’s not if your data gets breached, it’s when. You want to ensure your data’s in top shape to preserve your organization’s reputation.
- Cost! And not just in fines and breach remediation expenses. Chances are your organization doesn’t need most of the data it’s holding, and therefore could be saving a bundle on data storage.
The first step to understanding your data holdings is to understand the difference between the two main types of data: structured and unstructured.
Structured data is what probably comes to mind when you hear the word “data”: spreadsheets on spreadsheets filled with quantitative information. Essentially, structured data is anything you can store in rows and columns, such as information stored in databases (think SQL), CSV files, and so on. It’s easily understood and analyzed by applications other than the ones that generated it, and it doesn’t scale easily – which is good for privacy purposes. It doesn’t grow out of control on its own, at least not for a long time.
Unstructured data is the qualitative data naturally generated from interactions with people. Think the text stored in your emails, Teams chats, social media, and websites. It can also comprise images, PDFs, Word docs – anything you can’t store in rows and columns. It’s not usually in a format that other applications can easily understand and analyze. And it multiplies like you wouldn’t believe: how many emails have you sent and received just this week?
Both types carry their own risk, but unstructured data is by far the riskier of the two. In today’s world, we generate it so quickly and in such high volume – and with such little organization – that it’s functionally impossible to keep track of without using data discovery software.
On the flip side, once you have the right tool, getting to compliance becomes exponentially easier. When you can visualize all your unstructured data, you can see what’s out of compliance, fix that right quick, and understand where your policies and workflows need to change to keep everything above board.
Some Common Misconceptions Your Organization Might Have
We all know an ounce of prevention is worth a pound of cure. And yet: most of us don’t go to the doctor until we get sick.
The compliance world is no different. With regulations still relatively new, most organizations don’t fully appreciate the urgency surrounding the issue – and won’t until they themselves get breached.
If your organization is anything like most, you’re probably operating under one of the following misconceptions.
Misconception #1: We Already Know What Data We Have
Name the last time you checked your Teams log. Or your Downloads folder. Your email archives? You get the idea.
People – and companies – don’t typically monitor or clean these types of things without a push. Without the proper privacy functions in place, we’re liable to think the trash in the ocean isn’t a problem. Until, of course, there’s an island of it.
Misconception #2: We Won’t Get Breached
There is a roughly 30% chance your organization will get breached this year. This stat increases every year.
It’s also possible you’ve already been breached. According to IBM’s annual Cost of a Data Breach report, the average time to identify and contain a breach in 2021 was 287 days.
When you get breached, you can cut the time and expense involved significantly – nearly entirely – by already being in compliance. Compliant data equals a quick, cheap(er) remediation with no additional reputational damage on top of the fact that the breach occurred.
Misconception #3: It’s Too Expensive to Figure Out What We Have
According to that same IBM report, the average cost of a breach in a hybrid cloud environment was $3.61 million. On top of that, compliance failure was the top factor found to amplify data breach costs. And remember, it’s not just the cost of remediating compliance flaws you have to worry about. Regulatory fines are getting steeper every year.
Misconception #4: It’s Too Labor Intensive – We’d Need a Team of Experts
Since data privacy regulations are so new and the solution market is still growing, it’s easy to believe you’d need in-house specialists to operate whichever data discovery solution you ended up going with.
Not if you choose the right one! Specifically, you want to make sure you select a solution that’s purpose-built for ease of use. From deployment to monitoring and at every stage in between, no expert knowledge should be required. Don’t go with a solution that’s been repurposed from another area of the market, such as data loss prevention or data access management.
Misconception #5: Traditional Data Inventory Methods Still Cut It
Back in the day, and still sometimes today, organizations would build data inventories through manual assessments and questionnaires: they’d basically ask their staff what data they thought the organization had.
In today’s world, with data accumulating and multiplying by the second, a manual static inventory won’t do the trick. It’s obsolete as soon as you create it.
To ensure continuous compliance, you need real-time visibility into your data.
Learn more
To learn more about data protection, security and compliance, listen to this podcast published on the Society of Corporate Compliance’s blog.
For more information on how to achieve cost effective and lightning speed visibility into your unstructured data so you can mitigate risk, check out ActiveNav Cloud.
Author
Simon Costello, VP – APAC, ActiveNav
New Data Availability and Transparency Act 2022 in force
The Data Availability and Transparency Act 2022 commenced in April. The Act establishes a new, best practice DATA scheme for sharing Australian Government data, underpinned by strong safeguards and simplified, efficient. For an introduction to how the Scheme works, read more at A Scheme for sharing Australian Government data. Commonwealth, state and territory […]
Preventing Digital Harm
The World Economic Forum published Pathways to Digital Justice report to address systemic legal and judicial gaps, and help guide law and policy efforts towards combating data-driven harms. This is particularly important with the increase in online activities and digitization of services, which – when misused – can present new […]
Protecting Privacy by Minimizing Data
Posted with permission from Active Navigation, originally published on June 1. Ten years ago, there was no such thing as too much data. Notions about data being the “new oil” prompted organizations to horde every byte they could, hoping that they might be able to harness it down the road. […]
Is Your Data Estate an Unstructured Mess? How a Spring-Cleaning Project Can Reduce Your Organization’s Risk
Posted with permission from Active Navigation, originally published on June 10. In this special guest feature, Dean Gonsowski, Chief Revenue Officer at Active Navigation, InfoGovANZ’s Foundation Sponsor, focuses on what steps a company needs to follow to review, understand and clean-up their data to eliminate security risks. As a former […]
What is Good Government Data Sharing?
The Australian Federal Government has been conducting an extended consultation as to how data linkage and data sharing between government agencies might be accommodated through a special purpose statute that walks the fine line of maintaining digital trust and meeting data privacy concerns of citizens and civil society organisations, while […]
Privacy-Preserving Data Sharing Frameworks
This is the third in a series of papers and develops a practical solution providing a framework for privacy preserving data sharing, addressing technical challenges as well as data sharing issues more broadly. It builds on the 2018 ACS Report, Privacy in Data Sharing: A Guide for Business and Government, […]
Infonomics – valuing information assets
Infonomics is the discipline of valuing Information Assets and it is based on the idea that information is an enterprise asset that should be counted and managed. This article explains why Infonomics is becoming increasingly important. Information Assets (data, information, published content and knowledge) are arguably an organisation’s most […]
Identity as taonga: now and in the future
He taonga te tuakiri: āianei, haere ake nei New Zealand’s Identity Conference 2019 was the fourth in a series of conferences that began in 2008. The conference was held at the Museum of New Zealand Te Papa Tongarewa, Wellington, on 26 and 27 August 2019. The conference purpose or ‘big idea is to […]
Data as a Strategic National Resource: The Importance of Governance and Data Protection
As we rapidly move toward a technology-driven, globally interconnected world, the exponential growth in data collected by business and government enables significant value to be derived from this resource. In December 2015, the Australian Government released its Australian Government Public Data Policy Statementas part of the National Innovation and Science […]
Putting People and their Data at the Centre – investing in the social wellbeing of Aotearoa
Jacinda Ardern’s announcement of her intention to deliver New Zealand’s first ‘Wellbeing Budget’ at the World Economic Forum in Davos in January caused headlines as the world’s youngest female head of state outlined an approach to economic measurement that put people’s needs at the centre of the government investment agenda. […]
Privacy in Data Sharing: A Guide for Business and Government
This paper describes a framework for privacy-preserving data sharing, addressing technical challenges as well as some data sharing issues more broadly. The paper builds on the 2017 ACS paper, Data Sharing Frameworks 1, expanding the concept of a Personal Information Factor and introducing a Data Safety Factor with recommendations for threshold […]
Data Sharing Frameworks
This paper describes a framework for privacy-preserving data sharing, addressing technical challenges as well as some data sharing issues more broadly. The paper builds on the 2017 ACS paper, Data Sharing Frameworks 1, expanding the concept of a Personal Information Factor and introducing a Data Safety Factor with recommendations for […]