Data provenance, just what the doctor ordered

Knowing where your data is has never been more important. A combination of the rising rate of cyber attacks on organisations, the changing political climate and the upcoming introduction of the European General Data Protection Regulation means that cybersecurity is a key focus for organisations. Last year the discovery of data breaches at Yahoo! highlighted the need to properly secure customer data, and made consumers far more aware of the potential for their details to be stolen online.

Organisations have a duty of care to ensure that the details of customers are stored securely. Part of this is also the need for organisations to know exactly what their critical data is and where it is, to ensure it is comprehensively protected from threats. This extends to data provenance and knowing the location of your customer’s data and the laws that must be adhered to. When applying geographical boundaries to digital assets the physical location and the data centre it resides in is of increasing importance.

[easy-tweet tweet=”Being able to tell your customers exactly where their data is stored is hugely important.” hashtags=”Data, Security”]

In November last year, Amazon announced the opening of its data centres in the UK, which for the first time, would allow UK businesses to store data locally on its AWS infrastructure. It was an important announcement, not least because of the popularity of Amazon’s cloud service, but because it would enable AWS customers to inform their clients of the provenance of their data with confidence.

It’s not just about compliance, companies and individuals are increasingly aware of the importance of data provenance.  Where sensitive customer, client or partner data is kept and by whom, is becoming a service differentiator for all verticals. As IoT and digital transformation progress, it will become more so.

It may be that data is perfectly safe held on a server in US, for example, but UK consumers tend to feel safer if their data is kept in the UK. This is especially true of the public sector and the NHS, whose customers are citizens who need to be protected.

A good example of how data security and compliance can drive innovation and new business opportunities is London based start-up Echo, one of the first users of Amazon’s new British data centres. The company has developed a smartphone app that takes much of the chore out of repeat prescriptions.

Users can manage their NHS prescriptions via their iPhone (and soon Android device) and have them delivered directly to their door. According to the company, the app can convert a doctor’s orders into alerts and reminders, helping patients to better manage their medications. It’s especially useful for those on repeat prescriptions, and the elderly and housebound.

It goes without saying that Echo has been given access to some of the most sensitive data in the country, and is NHS approved. Its data assurance will have to be top notch. While being an excellent example of how young digital entrepreneurs can help the overstretched NHS, and improve patient experience at the same time, its future success depends almost entirely on how the highly sensitive medical data it has been entrusted with is handled.

By using Amazon’s UK based AWS servers, the NHS at least knows that patient data remains in the UK and is traceable. Its security is entrusted to Amazon’s own technology. This is a lesson for all of us. In a world of subcontracting and security as a service, the integrity of the cloud or service you use is important. Make sure you ask where your data is being stored, who by and with what.

Being able to tell your customers exactly where their data is stored is hugely important. In the uncertainty of a post-Brexit UK, full data provenance will be demanded by your clients. You need to be in a position to fulfil this with absolute certainty, or risk losing their business. And ahead of the EU’s General Data Protection legislation coming into force in 2018 businesses need to use this year to get their security in order, or risk hefty fines if breaches occur.

 

+ posts

Meet Stella

Newsletter

Related articles

The Metaverse: Virtually a reality?

Metaverses have the potential to enable virtual worlds to expand beyond the gaming genre to encompass all manner of social and commercial activities.

Cybersecurity and Cloud: A Look Back at 2022 and What to Expect in 2023

Businesses are continuously reassessing their resources and options to fill their tech stack. In this competitive digital landscape, the innovative use of technology will be something that would generate a competitive advantage for organisations.

Shopping for Data: Ensuring a seamless user experience 

This combination can drive a business’s data culture and provide a structured approach for businesses to benefit from data intelligence across their operations, with only a few clicks.

Unveiling the Top 10 Cybersecurity Threats to Watch Out for in 2023

As technology advances, so do cybercriminals' methods to gain unauthorised access to sensitive information. With the increasing reliance on technology in both personal and professional settings, it is crucial to stay informed about the top cybersecurity threats to watch out for in 2023.

Is sustainability ‘enough’ from a Cloud perspective?

The idea of uprooting entire sustainability initiatives that took years to formulate and deploy is unsettling for businesses but, in truth, it doesn’t have to be so revolutionary.

Subscribe to our Newsletter