Downloads: 3 | Views: 96 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper | Information Technology | United States of America | Volume 10 Issue 2, February 2021 | Popularity: 4.6 / 10
Data Protection in Collaboration: Safeguarding Sensitive Information with Third-Party Stakeholders
Rajendraprasad Chittimalla
Abstract: The evolution of technology carries complex problems and the solutions require extra care to continue providing a better user experience. The sensitive data can be categorized into PII, PHI, and IP where each has its importance and needs to be protected. The protection of sensitive data is also regulated by international laws like HIPAA and GDPR. Thus, organizations are bound to follow these regulations and provide data security to both the internal organizational data and user data. Factors like financial costs, organizational reputation, business disruptions, and legal boundaries, affect the user experience. The suggested best practices can be followed by the organization and the internally assigned staff members to cope with the problem of exposing sensitive information to third-party service providers. The privacy of the user should be kept under consideration while allowing these service providers to access the limited data and therefore it can mitigate the security threats.
Keywords: data breaches, security threats, privacy, secure file transfer, encryption, third-party integration
Edition: Volume 10 Issue 2, February 2021
Pages: 1766 - 1769
Similar Articles
Downloads: 0
Informative Article, Information Technology, India, Volume 11 Issue 3, March 2022
Pages: 1597 - 1600Real - Time Monitoring and Alerting Systems for Fintech
Ankur Mahida
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, India, Volume 12 Issue 12, December 2023
Pages: 2114 - 2119Zero Knowledge Proof Techniques in PAM Authentication
Sri Kanth Mandru
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Information Technology, India, Volume 11 Issue 12, December 2022
Pages: 332 - 337Mitigating the Security Risks of IoT Devices using IPv6
Praveen Misra, Dr. Rajeev Yadav
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3
Research Paper, Information Technology, India, Volume 12 Issue 2, February 2023
Pages: 1704 - 1712Explore the Application of Predictive Analytics and Machine Learning Algorithms in Identifying and Preventing Cyber Threats and Vulnerabilities within Computer Systems
Ranadeep Reddy Palle
Downloads: 7
Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021
Pages: 369 - 371Performing Attacks on Radio Frequency and Embedded based Systems
Preeti Rana