“Data is the pollution problem of the information age, and protecting privacy is the environmental challenge”
Bruce Schneier
As technology progresses, more and more of our information has been moving to the digital world. As a result, cyber attacks have become increasingly common and costly. A data breach is a security incident in which information is accessed without authorization.
Some of the biggest data breaches of the 21st century:
Adobe: As reported in early October of 2013 by security blogger Brian Krebs the breach impacted 153 million user records.
Sina Weibo: With over 500 million users, Sina Weibo is China’s answer to Twitter. However, in March 2020 it was reported that the real names, site usernames, gender, location, and phone numbers for 172 million users had been posted for sale on dark web markets.
Marriott International: Marriott International announced in November 2018 that attackers had stolen data on approximately 500 million customers. The breach initially occurred on systems supporting Starwood hotel brands starting in 2014. The attackers remained in the system after Marriott acquired Starwood in 2016 and were not discovered until September 2018.
LinkedIn: A major social network for professionals, announced in 2012 that attackers were found offering the email addresses and passwords of around 165 million LinkedIn users for just 5 bitcoins.
State Bank of India (SBI): In January 2019, the nation’s largest bank, State Bank of India, left a server unprotected by failing to secure it with a password. Originating from ‘SBI Quick’, a service that provided customers with their transaction and account details, putting about three million text messages in jeopardy.
Kudankulam nuclear power plant (KKNPP) & ISRO: Malware was installed on the computers of India’s biggest nuclear power plant and the county’s apex space agency in September 2019.
Reviewing the hot topic, the data scraping by China, ThePrint’s Editor-in-Chief Shekhar Gupta decoded that a Chinese law was passed in 2017 known as the Inaugural National Intelligence Law, which compels citizens and organizations of People’s Republic of China to assist the country’s intelligence activities. He described the fifth generation warfare as a warfare of ‘perceptions and information’, which is still in ‘unfolding’. He said, “It is also a warfare of cultural and moral perceptions. This is carried out without using any troops on the ground. Fifth generation warfare has to be fought outside, essentially behind keyboards.” Since, Galwan Valley clashes, cyber-attacks by Chinese hackers have seen a massive surge in India. In the backdrop of tensions on the Line of Actual Control the Indian government banned 118 applications. However, threats to privacy continue to linger on.
The bloatware problem, bloatware may be defined as a set of pre-defined applications that cannot be uninstalled or even disabled from the mobile phone. Several mobile manufacturers keep the price of their device low because they compensate for reduced profits on the sale of devices by making additional profits through these third-party apps. The problem is particularly acute with some of the Chinese mobile manufacturers. Xiaomi, for example, by some estimates, earned 9.1% of its revenue in 2018 through these pre-loaded apps and services. Apart from consuming unnecessary space on the phone and draining the battery, these apps pose serious security threats because they collect user data in surreptitious ways that can easily be misused.
What data is being collected?
A paper titled ‘An analysis of Pre-installed Android Software’ by researchers at the IMDEA Networks Institute brings forth a lot of information on these pre-installed applications. They have custom permissions which allows them privileged access to system resources. They also include third party libraries embedded in them. There are great challenges to safeguard the privacy of the user specially in the absence of robust data protection law.
What to do?
The most effective way could be to make it obligatory on the device manufacturers to also provide the users with sufficient information on such apps, including full disclosure on the type of data being collected, the purpose for which data will be used and the entities with which such data will be shared, if any. Also, all this information should be communicated in a language that the user can understand easily. This approach will allow consumers to make an informed choice about the apps they want to use on their phones and risks associated with the same. A comprehensive data protection and privacy law with real enforcement mechanisms would benefit Indians in more ways than one.
Data Privacy
“Data theft and tampering are emerging vices in storage and backup industry and our system would checkmate it.”
Soumitra Agarwal
Privacy in a broader sense, is the right of individuals, groups, or organizations to control who can access their information. The several universal processes that can help develop a data privacy framework are:
Discovering and classifying personal data: Determining types of data, collection of data, storage, and accessibility of data.
Conducting a Privacy Impact Assessment (PIA): Determining data storage, location, data security measures that are currently implemented, and where systems may be vulnerable to a data privacy breach. Data security measure such as change management, data loss prevention, data masking, protection of data, ethical walls, privileged user monitoring, secure audit trail archiving, sensitive data access auditing, user rights management, user tracking, and VIP data privacy.
Understanding cross border marketing and third-party marketing issues.
Analyzing compliance requirements such as legislative regulations, industry specific regulations, third party obligations. Developing privacy policies and internal controls related to data governance, data privacy, and security breaches, and data privacy training.
