Data Security and Confidentiality Practices

Expert-defined terms from the Professional Certificate in Data Ethics for Business Intelligence course at London School of Business and Administration. Free to read, free to share, paired with a globally recognised certification pathway.

Data Security and Confidentiality Practices

Data Security and Confidentiality Practices #

Data Security and Confidentiality Practices

Data security and confidentiality practices refer to the measures and protocols… #

In the context of business intelligence, data security and confidentiality are crucial to maintain the privacy and integrity of data used for analytics and decision-making purposes. These practices help businesses comply with regulatory requirements, build trust with customers, and mitigate the risks associated with data breaches.

Encryption #

Encryption

Encryption is the process of encoding data to make it unreadable to anyone witho… #

It is a common practice used to protect sensitive information from unauthorized access. In the context of data security and confidentiality, encryption is often applied to data at rest (stored data) and data in transit (data being transmitted over networks) to ensure that even if the data is intercepted, it cannot be understood without the decryption key.

Access Control #

Access Control

Access control refers to the mechanisms and policies put in place to regulate wh… #

This practice involves assigning user permissions, roles, and privileges based on the principle of least privilege, which means giving users only the access they need to perform their job functions. Access control helps prevent unauthorized access to sensitive data and minimizes the risk of data breaches.

Authentication #

Authentication

Authentication is the process of verifying the identity of a user or system atte… #

This practice typically involves the use of passwords, biometric identification, two-factor authentication, or other authentication methods to ensure that only authorized individuals can access sensitive data. Strong authentication is essential for maintaining data security and confidentiality.

Authorization #

Authorization

Authorization is the process of determining what actions a user is allowed to pe… #

This practice involves setting permissions and rules to control the level of access that each user has to specific data or resources. By implementing proper authorization mechanisms, organizations can prevent unauthorized users from viewing, modifying, or deleting sensitive information.

Data Masking #

Data Masking

Data masking is a technique used to obfuscate or anonymize sensitive data by rep… #

This practice helps protect sensitive information from unauthorized access while still allowing users to work with realistic datasets for testing, development, or analytics purposes. Data masking techniques include techniques such as tokenization, hashing, and randomization.

Data Classification #

Data Classification

Data classification is the process of categorizing data based on its sensitivity… #

This practice involves labeling data with appropriate tags or metadata to indicate how it should be handled, stored, and shared. By classifying data, organizations can apply different levels of security controls and access restrictions to ensure that sensitive information is adequately protected.

Data Retention Policies #

Data Retention Policies

Data retention policies are guidelines that specify how long data should be stor… #

This practice helps organizations manage their data assets effectively while ensuring compliance with legal and industry standards. By implementing data retention policies, businesses can avoid storing unnecessary data and reduce the risk of data breaches.

Data Loss Prevention (DLP) #

Data Loss Prevention (DLP)

Data loss prevention (DLP) is a set of tools, technologies, and policies designe… #

This practice helps organizations monitor, control, and secure data as it moves within and outside the organization's network. DLP solutions can identify and block attempts to transfer sensitive data through email, web applications, or other channels to minimize the risk of data loss.

Vulnerability Assessment #

Vulnerability Assessment

Vulnerability assessment is the process of identifying, analyzing, and prioritiz… #

This practice involves scanning for weaknesses, misconfigurations, or known security flaws that could be exploited by attackers to gain unauthorized access to sensitive data. By conducting regular vulnerability assessments, organizations can proactively address security gaps and reduce the risk of data breaches.

Penetration Testing #

Penetration Testing

Penetration testing, also known as pen testing, is a simulated cyberattack condu… #

This practice involves attempting to exploit vulnerabilities to gain unauthorized access to sensitive data and assess the effectiveness of security controls. Penetration testing helps organizations identify weaknesses in their defenses and implement corrective measures to enhance data security.

Incident Response Plan #

Incident Response Plan

An incident response plan is a documented set of procedures and protocols that o… #

This practice includes predefined steps for detecting, containing, investigating, and mitigating security breaches to minimize the impact on the organization's operations and reputation. Having an incident response plan in place is essential for effectively handling data security incidents and ensuring business continuity.

Data Governance #

Data Governance

Data governance is a set of practices, policies, and procedures that define how… #

This practice encompasses data quality, data integrity, data privacy, and data security to ensure that data assets are used effectively and responsibly. Data governance helps organizations establish accountability, transparency, and compliance with regulatory requirements related to data security and confidentiality.

Role #

Based Access Control (RBAC)

Role #

based access control (RBAC) is a security model that restricts access to resources based on the roles and responsibilities of users within an organization. This practice involves assigning permissions and privileges to user roles rather than individual users, simplifying access management and reducing the risk of unauthorized access. RBAC ensures that users only have access to the data and resources necessary to perform their job functions, enhancing data security and confidentiality.

Secure Socket Layer (SSL) #

Secure Socket Layer (SSL)

Secure Socket Layer (SSL) is a cryptographic protocol used to establish secure c… #

This practice encrypts data transmitted between a web server and a client to protect it from eavesdropping or tampering. SSL certificates are used to verify the identity of websites and ensure that data exchanged between users and servers is encrypted. SSL is essential for securing online transactions, communications, and data transfers.

Public Key Infrastructure (PKI) #

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) is a framework of technologies, policies, and pr… #

This practice enables secure communication, authentication, and data exchange between parties over insecure networks such as the internet. PKI includes components such as certificate authorities, registration authorities, and certificate revocation lists to establish trust and verify the identities of users and systems. PKI is essential for implementing secure data security and confidentiality practices.

Multi #

Factor Authentication (MFA)

Multi #

factor authentication (MFA) is a security mechanism that requires users to provide two or more forms of verification to access a system or application. This practice typically combines something the user knows (such as a password), something the user has (such as a smartphone or token), and something the user is (such as biometric data) to enhance security. MFA helps prevent unauthorized access to sensitive data and adds an extra layer of protection against cyber threats.

Data Breach #

Data Breach

A data breach is an incident in which sensitive, confidential, or protected info… #

This practice can occur due to cyberattacks, insider threats, human error, or system vulnerabilities. Data breaches can result in financial losses, reputational damage, regulatory fines, and legal consequences for organizations. Preventing and responding to data breaches is essential for maintaining data security and confidentiality.

Personally Identifiable Information (PII) #

Personally Identifiable Information (PII)

Personally Identifiable Information (PII) is any data that can be used to identi… #

This practice includes personal details such as names, addresses, social security numbers, email addresses, and biometric data. PII is considered sensitive and requires special protection to prevent unauthorized access or disclosure. Organizations must handle PII in accordance with data security and confidentiality practices to comply with privacy laws and regulations.

General Data Protection Regulation (GDPR) #

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is a comprehensive data protection… #

This practice aims to protect individuals' privacy rights and ensure that their personal information is handled responsibly. GDPR imposes strict requirements on data security, consent, transparency, and accountability to prevent data breaches and safeguard confidentiality. Organizations that fail to comply with GDPR may face severe penalties and fines.

Health Insurance Portability and Accountability Act (HIPAA) #

Health Insurance Portability and Accountability Act (HIPAA)

The Health Insurance Portability and Accountability Act (HIPAA) is a US law that… #

This practice applies to healthcare providers, health plans, and healthcare clearinghouses that handle protected health information (PHI). HIPAA mandates strict data security and confidentiality practices to safeguard PHI from unauthorized access, disclosure, or misuse. Compliance with HIPAA is essential for protecting patients' privacy and maintaining the integrity of healthcare data.

Payment Card Industry Data Security Standard (PCI DSS) #

Payment Card Industry Data Security Standard (PCI DSS)

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security… #

This practice applies to merchants, service providers, and other organizations that process, store, or transmit credit card information. PCI DSS compliance involves implementing data security and confidentiality measures such as encryption, access controls, and network segmentation to secure cardholder data. Non-compliance with PCI DSS can result in fines, penalties, and reputational damage for businesses.

Security Information and Event Management (SIEM) #

Security Information and Event Management (SIEM)

Security Information and Event Management (SIEM) is a technology solution that c… #

This practice enables organizations to detect, monitor, and respond to security threats by collecting and correlating data from various sources. SIEM solutions help improve data security and confidentiality by identifying abnormal behavior, unauthorized access, or suspicious activities that could indicate a potential breach.

Cloud Security #

Cloud Security

Cloud security is a set of practices, technologies, and policies designed to pro… #

This practice involves securing cloud services, data storage, and virtualized resources to prevent data breaches, data loss, or unauthorized access. Cloud security measures include encryption, access controls, data backup, and monitoring to ensure the confidentiality and integrity of data stored in the cloud. Organizations must implement robust cloud security practices to mitigate the risks associated with cloud computing.

Data Privacy #

Data Privacy

Data privacy refers to the right of individuals to control how their personal in… #

This practice encompasses legal, ethical, and technical considerations related to protecting individuals' privacy rights and preventing unauthorized access to sensitive data. Data privacy regulations such as GDPR, HIPAA, and CCPA require organizations to implement data security and confidentiality practices to safeguard personal information and respect individuals' privacy preferences.

Bring Your Own Device (BYOD) #

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) is a policy that allows employees to use their pers… #

This practice can pose security risks if not properly managed, as personal devices may not have the same level of security controls as corporate devices. BYOD policies should include data security and confidentiality measures such as mobile device management (MDM), encryption, and remote wipe capabilities to protect sensitive data from unauthorized access or loss.

Data Masking #

Data Masking

Data masking is a technique used to obfuscate or anonymize sensitive data by rep… #

This practice helps protect sensitive information from unauthorized access while still allowing users to work with realistic datasets for testing, development, or analytics purposes. Data masking techniques include techniques such as tokenization, hashing, and randomization.

Data Classification #

Data Classification

Data classification is the process of categorizing data based on its sensitivity… #

This practice involves labeling data with appropriate tags or metadata to indicate how it should be handled, stored, and shared. By classifying data, organizations can apply different levels of security controls and access restrictions to ensure that sensitive information is adequately protected.

Data Retention Policies #

Data Retention Policies

Data retention policies are guidelines that specify how long data should be stor… #

This practice helps organizations manage their data assets effectively while ensuring compliance with legal and industry standards. By implementing data retention policies, businesses can avoid storing unnecessary data and reduce the risk of data breaches.

Data Loss Prevention (DLP) #

Data Loss Prevention (DLP)

Data loss prevention (DLP) is a set of tools, technologies, and policies designe… #

This practice helps organizations monitor, control, and secure data as it moves within and outside the organization's network. DLP solutions can identify and block attempts to transfer sensitive data through email, web applications, or other channels to minimize the risk of data loss.

Vulnerability Assessment #

Vulnerability Assessment

Vulnerability assessment is the process of identifying, analyzing, and prioritiz… #

This practice involves scanning for weaknesses, misconfigurations, or known security flaws that could be exploited by attackers to gain unauthorized access to sensitive data. By conducting regular vulnerability assessments, organizations can proactively address security gaps and reduce the risk of data breaches.

Penetration Testing #

Penetration Testing

Penetration testing, also known as pen testing, is a simulated cyberattack condu… #

This practice involves attempting to exploit vulnerabilities to gain unauthorized access to sensitive data and assess the effectiveness of security controls. Penetration testing helps organizations identify weaknesses in their defenses and implement corrective measures to enhance data security.

Incident Response Plan #

Incident Response Plan

An incident response plan is a documented set of procedures and protocols that o… #

This practice includes predefined steps for detecting, containing, investigating, and mitigating security breaches to minimize the impact on the organization's operations and reputation. Having an incident response plan in place is essential for effectively handling data security incidents and ensuring business continuity.

Data Governance #

Data Governance

Data governance is a set of practices, policies, and procedures that define how… #

This practice encompasses data quality, data integrity, data privacy, and data security to ensure that data assets are used effectively and responsibly. Data governance helps organizations establish accountability, transparency, and compliance with regulatory requirements related to data security and confidentiality.

Role #

Based Access Control (RBAC)

Role #

based access control (RBAC) is a security model that restricts access to resources based on the roles and responsibilities of users within an organization. This practice involves assigning permissions and privileges to user roles rather than individual users, simplifying access management and reducing the risk of unauthorized access. RBAC ensures that users only have access to the data and resources necessary to perform their job functions, enhancing data security and confidentiality.

Secure Socket Layer (SSL) #

Secure Socket Layer (SSL)

Secure Socket Layer (SSL) is a cryptographic protocol used to establish secure c… #

This practice encrypts data transmitted between a web server and a client to protect it from eavesdropping or tampering. SSL certificates are used to verify the identity of websites and ensure that data exchanged between users and servers is encrypted. SSL is essential for securing online transactions, communications, and data transfers.

Public Key Infrastructure (PKI) #

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) is a framework of technologies, policies, and pr… #

This practice enables secure communication, authentication, and data exchange between parties over insecure networks such as the internet. PKI includes components such as certificate authorities, registration authorities, and certificate revocation lists to establish trust and verify the identities of users and systems. PKI is essential for implementing secure data security and confidentiality practices.

Multi #

Factor Authentication (MFA)

Multi #

factor authentication (MFA) is a security mechanism that requires users to provide two or more forms of verification to access a system or application. This practice typically combines something the user knows (such as a password), something the user has (such as a smartphone or token), and something the user is (such as biometric data) to enhance security. MFA helps prevent unauthorized access to sensitive data and adds an extra layer of protection against cyber threats.

Security Information and Event Management (SIEM) #

Security Information and Event Management (SIEM)

Security Information and Event Management (SIEM) is a technology solution that c… #

This practice enables organizations to detect, monitor, and respond to security threats by collecting and correlating data from various sources. SIEM solutions help improve data security and confidentiality by identifying abnormal behavior, unauthorized access, or suspicious activities that could indicate a potential breach.

Cloud Security #

Cloud Security

Cloud security is a set of practices, technologies, and policies designed to pro… #

This practice involves securing cloud services, data storage, and virtualized resources to prevent data breaches, data loss, or unauthorized access. Cloud security measures include encryption, access controls, data backup, and monitoring to ensure the confidentiality and integrity of data stored in the cloud. Organizations must implement robust cloud security practices to mitigate the risks associated with cloud computing.

Data Privacy #

Data Privacy

Data privacy refers to the right of individuals to control how their personal in… #

This practice encompasses legal, ethical, and technical considerations related to protecting individuals' privacy rights and preventing unauthorized access to sensitive data. Data privacy regulations such as GDPR, HIPAA, and CCPA require organizations to implement data security and confidentiality practices to safeguard personal information and respect individuals' privacy preferences.

Bring Your Own Device (BYOD) #

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) is a policy that allows employees to use their pers… #

This practice can pose security risks if not properly managed, as personal devices may not have the same level of security controls as corporate devices. BYOD policies should include data security and confidentiality measures such as mobile device management (MDM), encryption, and remote wipe capabilities to protect sensitive data from unauthorized access or loss.

Challenges of Data Security and Confidentiality #

Challenges of Data Security and Confidentiality

Implementing effective data security and confidentiality practices can be challe… #

Implementing effective data security and confidentiality practices can be challenging for organizations due to various factors, including:

- Complexity: Managing data security and confidentiality in a complex IT environ… #

- Complexity: Managing data security and confidentiality in a complex IT environment with multiple systems, networks, and applications can be daunting.

- Compliance: Ensuring compliance with data protection regulations such as GDPR,… #

- Compliance: Ensuring compliance with data protection regulations such as GDPR, HIPAA, and PCI DSS requires ongoing monitoring and enforcement.

- Insider Threats: Dealing with insider threats, such as employees or contractor… #

- Insider Threats: Dealing with insider threats, such as employees or contractors with malicious intent or negligent behavior, poses a significant risk to data security.

- Data Volume: Handling large volumes of data and ensuring its security and conf… #

- Data Volume: Handling large volumes of data and ensuring its security and confidentiality at scale can be a logistical challenge.

- Emerging Threats: Staying ahead of evolving cyber threats, such as ransomware,… #

- Emerging Threats: Staying ahead of evolving cyber threats, such as ransomware, phishing attacks, and social engineering, requires continuous monitoring and adaptation of security measures.

May 2026 intake · open enrolment
from £90 GBP
Enrol