Forget About Privacy – Where Are the Robotics Specifications?

News Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog
Data Privacy - Concept Searching

Forget About Privacy – Where Are the Robotics Specifications?

Since the approach of the General Data Protection Regulation (GDPR), protecting privacy data has been a popular topic. Not that anything too significant has since been done about it, such as all companies complying, governments cracking the whip at poor managers, or even outrage from hapless victims.

So why do we make such a fuss about data breaches? We pay the costs and move on until we are compromised again. Even at the most basic level, when a salesperson leaves an organization, you can almost guarantee that the company’s customer list has been sitting on that former employee’s kitchen table for weeks. The only deprovisioning that does occur is walking the renegade to the door with pomp and circumstance.

Now, there is privacy data and there is sensitive data. If you asked executives which type of data should be allocated the greatest security level, I anticipate they would say sensitive data. The intrigue and motive surrounding the hijacking of sensitive data can have onerous consequences for organizations. It’s not just a case of selling my personal information on the black market for $.50 – $1.00 – that’s chump change, and it’s probably already out there.

I won’t retell the entire story, but Level One Robotics and Controls, which does business with the automotive industry, had stored 47,000 sensitive documents – accumulated from the likes of Tesla, Ford, General Motors, Toyota, and Volkswagen – on an unsecured backup server. A third-party security researcher from UpGuard happened to find them. The documents contained an assortment of content, including robotics specifications, contracts, invoices, detailed factory blueprints, nondisclosure agreements, drivers’ licenses, and passports. That’s a treasure trove of sensitive information.

Concept Searching handles all the most-used privacy data expressions, as do most vendors. We supply 80 rules out of the box, and new rules can be created on the fly. But what you might not know is that we also accommodate any organizationally-defined sensitive or confidential data, and optionally apply redaction or real-time remediation. Since our insight engine generates multi-word metadata, the constraints of keywords, proximity, and density are eliminated.

I bet you are now thinking about the sensitive information that your own executives wouldn’t want to have to barter for, with competitors or partners that could have access to your data. It’s not just about privacy. Understand how our unique technology successfully identifies, classifies, and secures your sensitive data. We would be glad to give you a customized demo.

Concept Searching