David Hill

Network Computing Blogger


Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

See more from this blogger

Openness vs. Privacy: The Important Role Data Redaction Plays In Data Privacy

Most people know that data privacy is a hot topic for all enterprises, both private and public, and data redaction often has an important role in these efforts. That said, redaction is a term that some IT organizations have never heard of. Even if they have, they would probably be hard pressed to define it or explain its importance to their organizations. But that situation is changing quickly as organizations realize that redaction offers a solution that balances the need for data openness with the need for data privacy.

First, a disclosure: This article is a modified version of an introduction commissioned for a vendor white paper. However, I feel that redaction is important for a larger audience, this piece is a general piece, and vendors are touched upon only in the "Competitive Landscape" section.

Understand first that the complexities in the "data explosion era" are not only about storing more data, but also about managing its use. Critical to proper information management is not only ensuring that only the right people have access to that information, but that they are able to use it for legitimate purposes. Potential conflicts exist because ensuring the availability and openness of information to which some are entitled necessitates restrictions preventing access others who are not entitled because of privacy and confidentiality requirements.

Take two illustrations from the U.S. Government: The intent of the Freedom of Information Act (FOIA) is to make government organizations more accountable for their actions by making information about those actions more available on demand. On the other hand, the U.S. government's Health Insurance Portability and Accountability Act (HIPAA) is designed to prevent the unauthorized disclosure of individuals' personal healthcare information.  However, though FOIA is about openness, individuals are not entitled to access sensitive personal information or national security information embedded in documents that could otherwise be made publicly available. On the HIPAA side, physicians or other healthcare professionals with a legitimate need to know should not be prevented from accessing electronic health records for valid and beneficial purposes, but do not need to see billing information that is unrelated to providing care for patients.

So what can technology do to enable or enhance the complex balancing act between openness and privacy? The first line of defense consists of access controls that manage who is entitled to see what information. One possible solution is in the use of data loss prevention (DLP) software, which can restrict the transmission (such as through e-mail) of sensitive information from one authorized user to another unauthorized user. Encryption is also an important means for ensuring data confidentiality. But these approaches, with some exceptions, tend to be blunt instruments which too often restrict access more than is really necessary. For example, DLP solutions can reject the transmission of an email if a document attached to it contains a name associated with a social security number. That may sound sensible, but what if the intended recipient needs other information contained in that document for legitimate purposes and has no interest in or need for just the name and social security number content.


Page:  1 | 23  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers