Data masking (or suppression) for GDPR
To best understand data masking, you'll want to first have a quick overview of pseudonymisation, since data masking represents the "de fact standard" of pseudonymisation. Pseudonymisation is a technique used to swap some sensitive areas of a data record with pseudonyms, which is aimed at reducing the risk of a data subject (person) being identified.
Data masking is popular for many applications, especially in non-production environments, like those used to develop and test software, train staff/systems or analyze information. Data masking solutions work similarly to pseudonymisation. They replace the sensitive data in a record with fictitious yet realistic data, which neutralizes the data and minimizes the risk of the original subject being identified. However, at the same time, this method is able to preserve the data's value for non-production use.
Data masking is often used when alternative techniques, like encryption, simply would not be successful. With encryption, for instance, anyone with the right keys will be able to gain access to sensitive data. With data masking, the data is irreversibly transformed into non-sensitive data.
This method, like pseudonymisation, requires a "data first" approach in order to produce good results. Organizations are facing more and more challenges as they begin trying to become compliant with the GDPR. With a data first approach, they'll be able to develop a greater awareness of how their data is changing and moving with time, and how they can better control it.
With the GDPR, many organizations are also gaining new insight into just how much information they have at their disposal and how they can be utilizing it to improve their business. However, they must also be protecting that data. When it comes to achieving pseudonymisation with data masking, organizations will be most effective if they address key questions, like the what, where, and why.
Figuring out what data your organization has and where it is stored is important for data masking. Most organizations create multiple copies of production environments to develop, test, backup, and report various tasks. In fact, such environments can account for up to 90% of an organization's stored data and it can be spread across many different sites. Locating your data and identifying what needs to be kept and protected, and what can be disposed of, is the first step.
The next step is figuring out how your organization delivers data. This is importance since many existing approaches are resource-intensive and involve slow coordination amongst multiple staff members. Adding pseudonymisation into the mix will only make cumbersome data delivery even more of a burden. This is what leads most organizations to abandoning the work it takes to implement data masking. You'll want to streamline your data delivery if you are planning on using data masking.
For most organizations, the GDPR has created an imperative for them to evaluate and update their data storage and management methods. More critically, it is also ushering a wave of IT innovation so that organizations can ensure compliance, data privacy, and reduce the risk of data leaks at the same time--all while accelerating their business' critical initiatives.
Data masking technology has been around for a very long time, which begs the question: Why are so many companies failing to use it or choosing not to? The reasoning is actually very simple. Traditionally, these methods have been highly manual and complex to deal with. However, with the GDPR on the horizon, it is encouraging new approaches that will make data masking and similar methods easier to implement.
Many platforms have already launched that aim to make data management and storage a more secure and streamlined process. In the coming years, these platforms are expected to flourish as more organizations begin switching to them for reasons that go far beyond lawful GDPR compliance.
Most Recent Articles
- TeskaLabs helps LINET with cyber security compliance for medical devices
- TeskaLabs and University hospital in Pilsen launches a pilot of zScanner - open source mobile app for medical photo documentation
- EV Charging Station security demonstrator
- Five Ways AI And Machine Learning Can Enhance Cybersecurity Strategy
- C-ITS ITS-S Security microservice
You Might Be Interested in Reading These Articles
Technological advances are being made on a daily basis with one goal in mind - simplifying our daily lives. Everyone now owns a computer and smartphone and thanks to the Internet, everyone has access to lots of different types of information. The medical field has benefitted greatly from this advancement in technology. Not only does it help simplify many processes which would otherwise be long and tedious to complete, it also gives doctors and the medical personnel a powerful tool which allows them to do their jobs with more security.
Published on December 13, 2018
MediCat is one of TeskaLabs newest innovations and it centers around data protection and cybersecurity for the healthcare industry. In this article, we’ll explore the many use cases of MediCat.
Published on October 15, 2018
Creative Dock, TeskaLabs, Indermedica, Czech Ministry of Industry and Trade and Line 1212 launch the indicative test for new COVID-19 coronavirus
🇨🇿 Uchránit přetížené zdravotníky před zbytečným náporem lidí i pomoci lidem, kteří mají obavy z nového typu koronaviru, ve správném vyhodnocení symptomů a dalším postupu má nový online Indikativní test Covid-19, který vyvinuly české technologické firmy spolu s ministerstvem průmyslu a obchodu a linkou 1212.
Published on March 29, 2020