International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 3 | Views: 96 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper | Information Technology | United States of America | Volume 10 Issue 2, February 2021 | Popularity: 4.6 / 10


     

Data Protection in Collaboration: Safeguarding Sensitive Information with Third-Party Stakeholders

Rajendraprasad Chittimalla


Abstract: The evolution of technology carries complex problems and the solutions require extra care to continue providing a better user experience. The sensitive data can be categorized into PII, PHI, and IP where each has its importance and needs to be protected. The protection of sensitive data is also regulated by international laws like HIPAA and GDPR. Thus, organizations are bound to follow these regulations and provide data security to both the internal organizational data and user data. Factors like financial costs, organizational reputation, business disruptions, and legal boundaries, affect the user experience. The suggested best practices can be followed by the organization and the internally assigned staff members to cope with the problem of exposing sensitive information to third-party service providers. The privacy of the user should be kept under consideration while allowing these service providers to access the limited data and therefore it can mitigate the security threats.


Keywords: data breaches, security threats, privacy, secure file transfer, encryption, third-party integration


Edition: Volume 10 Issue 2, February 2021


Pages: 1766 - 1769




Text copied to Clipboard!
Rajendraprasad Chittimalla, "Data Protection in Collaboration: Safeguarding Sensitive Information with Third-Party Stakeholders", International Journal of Science and Research (IJSR), Volume 10 Issue 2, February 2021, pp. 1766-1769, https://www.ijsr.net/getabstract.php?paperid=ES21208181554

Similar Articles

Downloads: 0

Informative Article, Information Technology, India, Volume 11 Issue 3, March 2022

Pages: 1597 - 1600

Real - Time Monitoring and Alerting Systems for Fintech

Ankur Mahida

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, India, Volume 12 Issue 12, December 2023

Pages: 2114 - 2119

Zero Knowledge Proof Techniques in PAM Authentication

Sri Kanth Mandru

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Information Technology, India, Volume 11 Issue 12, December 2022

Pages: 332 - 337

Mitigating the Security Risks of IoT Devices using IPv6

Praveen Misra, Dr. Rajeev Yadav

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Research Paper, Information Technology, India, Volume 12 Issue 2, February 2023

Pages: 1704 - 1712

Explore the Application of Predictive Analytics and Machine Learning Algorithms in Identifying and Preventing Cyber Threats and Vulnerabilities within Computer Systems

Ranadeep Reddy Palle

Share this Article

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 369 - 371

Performing Attacks on Radio Frequency and Embedded based Systems

Preeti Rana

Share this Article
Top