Cisco Blogs


Cisco Blog > Data Center and Cloud

New CSA Survey Highlights Opportunities for Data Privacy Harmonization Across Cloud, IoT and Big Data

Responses in a recent Cisco-sponsored Cloud Security Alliance survey (hyperlink) illustrate that many data privacy challenges previously cast in the  “too hard” basket can be more readily navigated though focusing on universal principles across Cloud, IoT and Big Data.  Survey responses showed a surprisingly strong level of interest in a global consumer bill of rights and responses were overwhelming in favor of the OECD data privacy principles facilitating the trends of Cloud, IoT and Big Data.

Following are the most significant findings:

Data Residency and Sovereignty

Data residency and sovereignty challenges continue to emerge.  However, there was a common theme of respondents identifying “personal data” and Personally Identifiable Information (PII) as the data that is required to remain resident in most countries.

User Consent

73 percent of respondents indicated that there should be a call for a global consumer bill of rights and saw the United Nations as fostering that.  This is of great significance with the harmonization efforts taking place in Europe with a single EU data Privacy Directive to represent 28 European member states. As well as with the renewed calls for a U.S. Consumer Bill of Privacy Rights in the United States and cross-border privacy arrangements in Australia and Asia.

Privacy Principles

Finally we explored whether OECD privacy principles that have been very influential in the development of many data privacy regulations also facilitate popular trends in cloud, IoT and big data initiatives or cause room for tension.  The responses were very much in favor of facilitating the various trends.

The survey report includes an executive summary from Dr. Ann Cavoukian, Former Information and Privacy Commissioner of Ontario, Canada and commentary from other industry experts on the positive role that privacy can play in developing new and innovative cloud, IoT and Big Data Solutions. Read the Data Protection Heat Index survey report:

Data Protection Heat Index Survey Report – Sep 2014 from Cisco Data Center

 

Tags: , , , , , ,

The Key to Success in Tracking Mobile Devices: Symbiosis, Not Espionage

As a shopper enters a store, the retailer uses Wi-Fi to track her movements, interests, and shopping habits, providing a treasure trove of insight valuable to merchandising and product development alike.

And as advances in Wi-Fi promise increasing location precision and beacons promise pinpoint location based services, the future appears to be smooth sailing, right?

Well, not exactly.

Tracking the position of mobile devices accurately and correlating to personal data has been one of the most sought after Big Data objectives. And not just for retailers — the potential wealth of business value from data has drawn piqued interest across nearly all industries.

Yet in the real world, issues arise from both technology challenges and privacy concerns alike.

Technology challenges include:

  • Typical Wi-Fi accuracies in the 7-to-10 meter range (though Angle of Arrival and improved location analytics promise dramatic improvements)
  • Infrequent mobile device probing to conserve battery power
  • Interference from metal shelves & fixtures, water in products (and people!)

Privacy qualms speak to the heart of transformation in the Internet of Everything (IoE) age. IoE, after all, is the explosion of network connections among people, process, data, and things — and promises to be one of the most impactful periods of change in our history. And the people element is in some ways the whole point — to make our lives better, healthier, more efficient, and so forth. But the people issues will be just as challenging as those that arise around technology. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

Apple iOS 8 and MAC Randomization: What It means for Cisco’s Connected Mobile Experiences (CMX) Solution

As you may have read, Apple’s iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to provide an additional layer of privacy for consumers and target those companies that offer analytics without providing any value to the end consumer. We’ve been getting some questions about what this means and how it impacts our Connected Mobile Experiences (CMX)  solution, so we wanted to clear this up for our customers.

What does this mean for you? 

First and foremost, Cisco has always been dedicated to privacy for our customers and their end-users. There are four aspects of privacy that are built into our CMX solution:

1. Anonymous Aggregate Information: All analytics are based on aggregate, anonymized location data.

2. Permission-based: Users have to opt-in to join a Wi-Fi network or download an app

3. MAC Address Hash: Users’ MAC addresses can be hashed before exposing to 3rd party apps

4. Opt Out: End-users are always presented with the option to opt out of location-based services

The true value of CMX analytics for organizations is in aggregate location data to be used for business analysis to improve the customer experience for end-users. Providing customers with high performing Wi-Fi not only keeps always-on mobile users happy and opens the doors to delighting customers with more personalized experiences, but also helps provide more granularity to those aggregate trends to feed back into the experience creation machine. Win-win.

What does this mean for our CMX value proposition? Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Forget Looking in the Mirror, It’s Your Digital Image That Truly Matters

It’s great to stay in shape at the gym and pick out stylish clothes. But more and more, the personal image that really counts is digital.

That’s because the Internet of Everything (IoE) era demands new ways of looking at, well, just about everything. And everything includes you. In an expanding universe of new connections, each of us needs to ask, just where do I fit? And how am I being viewed?

In short, what is my digital persona?

The ways in which we are seen online have assumed acute importance in recent years, and that only stands to increase. Therefore, our digital personas have to be cultivated and maintained, just as we care for our images in the physical world.

In career terms, for example, you may be known in your daily work life as a good leader. But the physical world has limited reach.  If there is no evidence of that in the digital world, you will be in trouble, especially if you happen to be looking for a new job. Recruiters, of course, know that they can do an instant search and start compiling your digital profile within seconds. If you say you’re an expert or a good manager, your digital persona had better back it.

According to some recent research, job recruiters are turning more and more to Facebook, which by some measures is becoming even more impactful for employment purposes than LinkedIn. So, if the personal social media site can actually trump the professional social media site, think twice before you post those Spring Break photos.

As the consumerization of IT extends ever further into the workplace — via personal devices, social media, and so forth — the blurring of the personal and the professional will only continue.  As a result, everyone must be aware that personal actions have an impact comparable to professional achievements. And the digital trail that you leave behind every day influences how you are perceived in the marketplace.

Read More »

Tags: , , , , , , , , , ,

Safeguarding Privacy in the Internet of Things

Jason KohnBy Jason Kohn,  Contributing Columnist

You can’t open a web browser these days without coming across a story on the Internet of Things (IoT), and the ways that connected, autonomous devices will revolutionize every industry. There’s a reason for the hype: Cisco forecasts 50 billion connected devices by 2020, with the potential to create more than $14 trillion in value for global businesses over the next decade.

But IoT also heralds another revolution, in the degree to which individual behavior can be tracked and analyzed. While much of IoT focuses on verticals like manufacturing, energy exploration, and industrial applications, where the massive data generated by fine-grained monitoring is almost entirely beneficial, IoT will also touch on a broad range of consumer devices. From transportation to home automation to connected medical devices, machines will be monitoring the behavior of individuals more than at any time in human history. This raises a number of serious questions about consumer privacy and information security.  Read More »

Tags: , , , , , ,