当前位置:网站首页>Gartner announces five privacy trends from today to 2024
Gartner announces five privacy trends from today to 2024
2022-06-28 16:34:00 【CSDN cloud computing】
To 2024 year , The global 75% The personal data of the population will be protected by privacy laws .
Contribution | Gartner
Produce | CSDN Cloud computing
according to Gartner The study of , With the increasing number of privacy regulations worldwide , There are five major privacy trends that organizations should focus on , To meet the challenges of protecting personal data and complying with regulatory requirements .
Gartner Vice president of research Nader Henein Express :“ according to Gartner The forecast , To 2024 end of the year , The global 75% The personal data of the population will be protected by modern privacy laws . This regulatory progress has become the main driving force for enterprises to strengthen privacy protection . As most enterprises have not yet formed a special privacy protection practice , The responsibility for privacy protection falls to the technicians , To be more exact , To the security team led by the chief information security officer .”
Next two years , Dozens of jurisdictions will be implementing privacy laws , Therefore, many enterprises and institutions believe that it is necessary to start the privacy work plan immediately . according to Gartner The forecast , To 2024 year , The average annual privacy budget of large business organizations will exceed 250 Thousands of dollars .
Gartner Released the current to 2024 Five privacy trends in , It can promote the formation of enterprise organizations and improve privacy protection practices . Within the organization , Leaders in all business areas should actively disseminate these trends , It is easier to reach a consensus 、 Create greater value and significantly reduce the time to value .
Data localization
In a borderless digital society , It seems against common sense to try to control the country where the data are located , However, many new privacy regulations directly or indirectly put forward such requirements .
Safety and risk management leaders face a regulatory environment with different scales , Different localization strategies need to be adopted in different regions , This makes enterprises adopt a new cloud service design and acquisition method suitable for all service modes to deal with the strategic risks of transnational business . thus , Data localization planning will become the primary task in cloud service design and acquisition .
Privacy enhanced computing technology
Conduct data processing in untrusted environments such as the public cloud, and share and analyze data with multiple parties , It has become the foundation for the success of enterprises . With the increasing complexity of the analysis engine and Architecture , The manufacturer must add privacy protection function to the design in advance , Instead of adding this feature after the product is finished . The enterprise has AI The model is applied to many fields , At the same time, we must be right AI Model training , This brings new hidden dangers to privacy protection .
Different from the common static data security control , Privacy enhanced Computing (PEC) Data in use can be protected . therefore , Organizations can perform data processing and analysis activities that previously could not be achieved due to privacy or security concerns .Gartner forecast , To 2025 year 60% Will use at least one PEC Technology to support analysis 、 Business intelligence and / Or cloud computing applications .
AI government
Gartner A survey of ,40% There are many enterprises and institutions AI Invasion of privacy , Only a quarter of them are malicious acts . When a business organization processes personal data , Whether with the help of pre integrated in the manufacturer's products AI modular , Or an independent platform managed by the internal data science team , There are obvious risks of privacy disclosure and personal data abuse .
Henein Express :“ Currently operating in the enterprise AI Model , Mostly integrated into larger solutions , There is hardly any monitoring means to evaluate the relevant privacy impact . These embedded AI Competencies are used to track employee behavior 、 Assess consumer sentiment and build a “ intelligence ” product . Besides , The data currently input into these learning models will also have an impact on decision-making years later . future , When AI When regulatory regulations are more mature , It is almost impossible for enterprises to clear up in AI Collected when the governance plan is absent ‘ Toxic ’ data .IT Leaders will have to abandon the entire system , This will cause great losses to the enterprise and its own status .”
Centralized privacy user experience
Consumers are increasingly demanding the rights of data subjects , Expectations of transparency are also rising , Make enterprises pay more attention to creating a centralized private user experience (UX). Far sighted enterprises are well aware that they will inform 、cookie、 Consent management 、 Subject claims (SRR) The advantage of integrating all the components of the privacy user experience, such as processing, into a self-service portal . This approach is not only for key user groups 、 Convenience for customers and employees , It also saves a lot of time and cost .Gartner forecast , To 2023 year ,30% Consumer oriented organizations will launch self-service transparent portals that support preference and consent management .
The remote mode evolved into “ Everything is mixed ”
As individuals adopt more mixed interaction modes in their work and life , track 、 Monitoring and other personal data processing activities will become more frequent , And the privacy risk has become extremely serious .
The completely mixed way of interaction has a lot of impact on privacy . meanwhile , In various industries and fields , Employees' productivity and satisfaction with work life balance have also improved . Enterprises should adopt a people-oriented approach when dealing with privacy issues , Minimize the use of monitoring data , It should be used with a clear purpose , For example, improve the employee experience by eliminating unnecessary friction , Or reduce the risk of burnout by sending health risk signals to employees .
边栏推荐
- [redis] a brief summary of redis on January 31, 2021 No.01
- 10 years of testing experience, worthless in the face of the physiological age of 35
- [high concurrency foundation] hidden dangers and solutions of MySQL concurrency under different transaction isolation levels
- 【力扣】35. 搜索插入位置
- 机器学习之卷积神经网络Lenet5训练模型
- Why MySQL table connection is faster than subquery
- Slim GAIN(SGAIN)介绍及代码实现——基于生成对抗网络的缺失数据填补
- [laravel] about the composer installation of laravel8
- C#/VB.NET 将PDF转为Excel
- 【Hot100】2.两数相加
猜你喜欢

逆向调试入门-PE结构详解02/07

Design details of the full stack CRM development tool webclient UI workbench

The future of platform as code is kubernetes extension

Azure Kinect微软摄像头Unity开发小结

5 minutes to make a bouncing ball game

Slim gain (sgain) introduction and code implementation -- missing data filling based on generated countermeasure network

On the design principle of price discount in SAP software

云上竞技,360°见证速度与激情

3. caller service call - dapr
![[golang] how to install iris](/img/c6/842c4e920a74f9a07c2f6a82bb0cc1.png)
[golang] how to install iris
随机推荐
Open source technology exchange - Introduction to Chengying, a one-stop fully automated operation and maintenance manager
【208】基于AccessToken方式实现API设计
CODING DevOps 助力中化信息打造新一代研效平台,驱动“线上中化”新未来
[redis] a brief summary of redis on January 31, 2021 No.01
AI落地的新范式,就“藏”在下一场软件基础设施的重大升级里
请问下大家有遇到过这种设置的主健和数据库一致的错误吗?
【初学者必看】vlc实现的rtsp服务器及转储H264文件
Knowing these commands allows you to master shell's own tools
[proteus simulation] L297 driving stepping motor
Mysql自连接查询「建议收藏」
ID card copy tutorial (use t5577 card to copy 4100 card)
[force button] 977 Square of ordered array
The first place on the list - brake by wire "new cycle", the market competitiveness of local suppliers is TOP10
【力扣】977. 有序数组的平方
Design details of the full stack CRM development tool webclient UI workbench
The future of platform as code is kubernetes extension
Azure Kinect微软摄像头Unity开发小结
Visual Studio 2019软件安装包和安装教程
Big God explains open source buff gain strategy live lecture
防火墙基础之流量管理与控制