Toward regulation for security and privacy: Difference between revisions

Jump to navigation Jump to search
 
Line 3: Line 3:
A massive amount of data is being collected every day. The exploitation of these data is a central question of the digital strategy in any major company. The effects of these strategies can already be seen: big data is one of the key factors that enabled the rise of machine learning over the last fifteen years. This is one of the reasons why, over the same period, the value of data has been soaring.
A massive amount of data is being collected every day. The exploitation of these data is a central question of the digital strategy in any major company. The effects of these strategies can already be seen: big data is one of the key factors that enabled the rise of machine learning over the last fifteen years. This is one of the reasons why, over the same period, the value of data has been soaring.


Collecting data also implies responsibilities. Companies in areas such as banking or payments are collecting and storing a lot of personal data. They are thus responsible for putting sufficient security measures to ensure their security. To some extent, the trust relationship established between these industries and their clients also stands on their responsibility on the data they collect.
Collecting data also implies responsibilities. Companies in areas such as banking or payments are collecting and storing a lot of personal data. They are thus responsible for putting sufficient measures to ensure their security. To some extent, the trust relationship established between these industries and their clients also stands on their responsibility on the data they collect.


==Security regulation and data value==
==Security regulation and data value==
Write, autoreview, editor, reviewer
3,129

edits

Navigation menu