{"id":32112,"date":"2016-03-21T06:00:10","date_gmt":"2016-03-21T13:00:10","guid":{"rendered":"http:\/\/blogs.microsoft.com\/cybertrust\/?p=32112"},"modified":"2023-05-15T23:11:04","modified_gmt":"2023-05-16T06:11:04","slug":"the-trusted-cloud-what-do-privacy-and-control-really-mean","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/03\/21\/the-trusted-cloud-what-do-privacy-and-control-really-mean\/","title":{"rendered":"The Trusted Cloud: what do privacy and control really mean?"},"content":{"rendered":"
Data is today\u2019s currency. Cloud computing and the Internet of Things are driving a business transformation that measures value in billions of petabytes. The cloud is a powerful game-changer for businesses all over the world, but with that power comes great responsibility. Managing the volume, variety, and disparate sources of data generated through mobile devices and other activities is a global challenge for enterprise.<\/p>\n
Unsurprisingly, businesses have many questions about how customer and enterprise data is managed, used, and protected in the cloud. According to a recent Intralinks survey<\/a> of over 300 IT decision makers, less than half of companies surveyed “monitor user activities and provide alerts to data policy violations,” while only 53 percent “classify information to align with access controls.” And here’s the kicker: a little under half of the surveyed companies have no policies or controls in place to govern access.<\/p>\n Data privacy and access control must be taken together because it’s impossible to meaningfully achieve the one without robustly addressing the other. An organization may set up its cloud with the world’s best security to keep data private, but then fail to use access control policies effectively to prevent data leaks or unauthorized access. From both a technological and a privacy perspective, CIOs and IT leaders must pay attention to how, when, where, and by whom their company\u2019s petabytes may be legitimately accessed. Moreover, they need to manage access control to ensure compliance from legal, risk management, and regulatory standpoints.<\/p>\n