Sponsored By

Getting Responsible with Big DataGetting Responsible with Big Data

No organization is immune from distrust when big data is involved.

Gary Audin

May 15, 2015

3 Min Read
No Jitter logo in a gray background | No Jitter

No organization is immune from distrust when big data is involved.

Data collection has been a long-time practice. The more data collected, the more conclusions can be drawn. While this is advantageous to the ones doing the collecting, it can put those the data covers at a disadvantage.

Big data is both a collection and processing effort, and it's important to note that big data does not automatically produce useful and accurate results. Analysis can still lead to erroneous conclusions.

As an example, take my youngest son, who once came to me with a question: "When did the world become color? Did it become color before or after I was born?" I asked how he came to ask such a question. He said that:

His information was correct, but his conclusion was not. In the same way, big data will only be as good as the information collected, the conclusions that are produced, and how it is used responsibly. (See my previous blogs on the topic, Big Data: A Tool, Not an Answer, and Big Data at Odds with Privacy?)

In January, 2014, President Obama spoke at the Department of Justice, calling on the administration to conduct a broad review of big data and privacy, looking to determine how they impact the way we work and live as well as how big data was being used by universities, the government and the private sector. As part of the administration's review , public input on big data issues was surveyed on WhiteHouse.gov. Respondents were asked to comment on how concerned they were with data practices. They were also asked about how much they trust institutions to keep their data safe and handle it responsibly.

A total of 24,092 individuals responded to the survey. The two graphics below summarize some of the survey results showing where the concerns are and who are the most mistrusted entities collecting big data:

No organization is immune from distrust when big data is involved.

Big data holds the potential to impinge on both individuals and businesses. There are responsibilities for both the data collector and the processor. The recommendations proposed by the report are primarily focused on protecting the use of, and avoiding the abuse of personal big data:

There will be many who say that new big data rules place a burden on the organizations collecting and processing big data. But most of these organizations use the big data to generate revenue. I think this is just a cost of doing business and should not be used as an argument against the protection of big data. I think that burden is necessary to protect the individual.

I expect that Europe will enact big data legislation that will precede the efforts in the U.S. International organizations will have to conform to the European rules, and those organizations should not be allowed to avoid such rules for U.S. citizens and non-citizens residing in the U.S. It will be difficult for the international organization to comply with European rules while not applying them in the U.S.

Further, any organization collecting and/or processing big data should monitor possible legislation. Companies' legal departments or legal advisors should be anticipating the actions that will be required. The organization should implement the most likely rules, standards, and legislation as it is written. Unless there is a grandfather clause or a waiting period, the organization should be ahead in protecting big data, not a follower that could end up in court.

A final issue is who should be in charge of the big data security and protection. The CSO seems to be a good candidate but that person's job is protecting the organization. The techniques and technologies used by the CSO overlap with those of protecting big data, however, when there is a problem and the organization is at fault, will the CSO act as an independent agent or be influenced by the other responsibilities of protecting the organization? Because of this potential conflict of interests, I think that larger organizations should leverage an independent big data individual or staff with internal enforcement powers.

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.