Editing Toward regulation for security and privacy

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 3: Line 3:
A massive amount of data is being collected every day. The exploitation of these data is a central question of the digital strategy in any major company. The effects of these strategies can already be seen: big data is one of the key factors that enabled the rise of machine learning over the last fifteen years. This is one of the reasons why, over the same period, the value of data has been soaring.
A massive amount of data is being collected every day. The exploitation of these data is a central question of the digital strategy in any major company. The effects of these strategies can already be seen: big data is one of the key factors that enabled the rise of machine learning over the last fifteen years. This is one of the reasons why, over the same period, the value of data has been soaring.


Collecting data also implies responsibilities. Companies in areas such as banking or payments are collecting and storing a lot of personal data. They are thus responsible for putting sufficient measures to ensure their security. To some extent, the trust relationship established between these industries and their clients also stands on their responsibility on the data they collect.
Collecting data also implies responsibilities. Companies in areas such as banking or payments are collecting and storing a lot of personal data. They are thus responsible for putting sufficient security measures to ensure their security. To some extent, the trust relationship established between these industries and their clients also stands on their responsibility on the data they collect.


==Security regulation and data value==
==Security regulation and data value==
Please note that all contributions to Quantum Protocol Zoo may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Quantum Protocol Zoo:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)