APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    right

    Data Request - The Burden with Benefits

    Rhys Macfarlane, Chief Security Officer at Luxury Escapes.

    Tweet
    content-image

    Rhys Macfarlane, Chief Security Officer at Luxury Escapes.

    We live in an age where the value and importance of personally identifiable information, or PII data, cannot be understated. Our digital lives are built upon these pieces of information, and, in some cases, they are the keys to verifying our identity. And yet, these pieces of information must be used; they must be given to companies, or else we cannot use their services and properly engage in our digital world. We cannot just lock them away, safe and secure, and go about life as normal. For this very reason, the raft of data protection regulations, the most prominent of which would be the General Data Protection Regulation, or GDPR, was brought into effect. While these regulations are a great development and one, I believe we needed to have; the burden upon companies has been significant and appears to be increasing over time.

    The foundations of many of these regulations are basic security fundamentals, and they have done an excellent job at bringing information security considerations closer to the centre of most businesses. Companies are now rightly considering information security and data protection as a fundamental aspect of their business and one that must be considered at every possible juncture. It probably won't surprise anyone when I say I believe this was not always the case at every company and that not so long ago, we information security specialists were viewed as a somewhat annoying voice which nobody really wanted at the party. In this way, the regulations have brought in a very important shift in the mindset of modern corporate thinking. In some cases, this required some businesses to spend time and money improving their standards, as they should do perpetually; this is not the specific area I wanted to dive into. Rather, I want to talk about the burdens brought about by data access requests, removal requests and alterations.

    Now do not get me wrong, while I refer to these requirements as burdens, I think they are the correct move for businesses and the correct move morally. We, as companies, do not own this data; it belongs to the individual. When the individual sends us their data, we should view this as a temporary trust in us. This trust is something that the individual can, as the owner, revoke at any time. I am confident we will see this happening more and more as the population continues to understand the value of their data. When they want to engage with a company, they will entrust their data to it; when they decide to move on, they will take their data with them. But what does this mean for the company? This means we must become very efficient at responding to these requests and scrubbing our databases when required. New developments, such as in-app data removal request requirements, have seen the level of these requests rise, and I believe such developments will continue.

    As a collective, we have been forced to bring in entirely new functionality to our businesses, which, if done incorrectly, could have significant implications for the data owners and our companies. Get it wrong and you're going against the data owners' wishes, and these regulatory bodies will let you know about it. I am sure I do not even need to specifically reference the kinds of monetary fines a company is looking at nowadays, as we've all seen and read the stories of when other companies have paid these prices.

    The ability to go in and remove or de-identify data in every database or section of a company is not always easy. Doing so when companies receive hundreds or thousands per month will be a significant uphill battle. As with all areas of tech, products are popping up to help in this new area; one I have found particularly useful has been Snippii.com, an automated customer response, internal checklist and tracking tool. After using this product for a while, something occurred to me: these requests are not only good for the individual but also useful for companies. Not only do removal requests clean up our lists and lower our exposure to potential breaches, but they are also an amazing indicator of how your customers are responding to your business behaviour. Being able to see on a macro scale how many requests you receive over time can be a piece of the puzzle when deciding what your customers liked and didn't like. Did you bring in a new marketing style in April and noticed a spike in removal requests in April and May? Did you bring in a different product offering and noticed your removal requests dropped right off in the following months? As with all things, people vote with their feet, to use an old idiom, and these data requests are people voting with their cyber feet. We would all be wise to pay attention to these movements and tailor our businesses around what we can see.

    Yes, these requests are a burden on companies, and yes they will most likely increase over time, but that doesn't mean they are bad for business. Looking at it in a glass half full way, these requests are an amazing insight into our customer’s way of thinking and responding to our brands. But all those points aside, it is our duty as responsible companies to protect a customer's data when they trust us with it and respect their wishes when they would like it returned to them.

    tag

    Information Security

    Weekly Brief

    loading
    Top 10 Cyber Security Companies in APAC - 2024
    ON THE DECK

    Cyber Security 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Why Compliance Needs a Seat at the Strategy Table

    Why Compliance Needs a Seat at the Strategy Table

    David Koh, Head, Legal & Compliance (Singapore) and Operational Risk Management Country Lead, Perpetual Limited
    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/cxoinsights/data-request-the-burden-with-benefits-nwid-9184.html