Information Privacy


Projects involving large amounts of sensitive data are being created in large amounts everyday. One issue that remains concerning these data is privacy. And not only does it include risks of data-theft, but also complying with the regulations on protection of personal information.

A study made in France (2014) by the consultancy Accenture, among CEOs, indicated that when it comes to implementing “big data” projects, 60% of respondents mentioned privacy as their main obstacle, before costs and talent shortage (Schwyter, 2015).
To make it worse, new tech tools and software arrive in the workplace everyday increasing constantly the risk of seeing someone penetrate your firm’s information system. Firms are well aware of the risk they are facing but many feel they will never be able to cope with the pace at which security measures have to change in order to adapt to all new software, upgrades and devices (Desjardins, 2013).

In addition to the danger of being hacked, firms in certain industries (banking, insurance) must comply with drastic security policies concerning the personal information of their clients (Schwyter, 2015). In addition to considerable repercussions in term of brand image, if their information system were to be breached, the firm would be facing lawsuits and fines that could have serious cost issues.

To prevent as much as possible all issue related to information privacy, firms should implement strict information privacy policies (Desjardins, 2013).

  • All data stored on the cloud should be hidden using “ad hoc” technologies.
    It is also highly recommended to encrypt all information, if possible.
  • For all sensitive information on employees, it is possible to anonymize them. It will create surrogate information, which are of no interest to hackers
  • Concerning the organization of this information, a classification should be made of all projects in accordance to their associated risk
  • Finally, data security and privacy should be emphasized in trainings and also constantly reminded to all employees, from all hierarchical levels in order to maintain constant awareness and be able to prevent any problem.

In addition to all policies that employees should follow, it is important that all information systems be protected by firewalls. It is sometimes worth investing more than you had planned in information security as it could save you time and money in the future (Herold, 2015).  Lastly, it is key for all firms to always consider privacy issues when discussing new ideas so that all issues can be resolved at the beginning of the process and not impede its development in later stages.


Desjardins, C. (2013). 93 % des entreprises françaises ont subi des pertes de données informatiques. [online] Les Echos Business. Available at: [Accessed 15 Oct. 2015].

Schwyter, A. (2015). Big Data : comment sécuriser ses projets ?. [online] ZDNet France. Available at: [Accessed 15 Oct. 2015].

Herold, R. (2015). 10 Big Data Analytics Privacy Problems | SecureWorld. [online] Available at: [Accessed 15 Oct. 2015].


2 responses to “Information Privacy”

  1. amoghj says :

    It is true how information privacy is probably one of the key concerns in any established firm. The consequences of breach of privacy not only costs money to the firm but also spoils the reputation of the firm and the existing clients start losing trust. Good read!

  2. 439212fb says :

    Cyber security is certainly a central topic for many companies, especially for those that store client sensible data like credit card information. We all remember what happened to Sony. The potential losses from a breach in the company’s databases could be disastrous. Fortunately the firms are not left alone anymore in managing this kind of risks internally. Risk Management companies and consulting firms have already classified cyber security as one of the most relevant risk that affect a wide range of industries. Advanced models and systems are already being implemented to reduce as much as possible the occurrence of negative events related to information systems breach.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: