Cyber Security
Is Consent the Gateway to Ethical Data Usage Practices?
Every tech company under the sun is grappling with data privacy and protection policies and laws. However, consent is crucial when it comes to data collection and processing. Having the user’s consent to use their data is imperative. While securing the data after collection is also important, using customer data without their consent causes more serious issues. Without obtaining consent from the user, any data that you use for your business falls under the unlawful use of data regulations.
Users of the well-known platform Glassdoor, which allows individuals to anonymously review their employers, allege that the site collected and linked their names to their profiles without their permission. Glassdoor users have expressed alarm, and the issue has been widely featured on social media and news-sharing sites. They fear that their anonymity could be compromised if data about them is collected and added to their profiles.
The issue here boils down to a single word: consent.
The gray area of obtaining consent
Organizations can knowingly or unknowingly exploit users’ personal data without proper knowledge of data privacy. It is not enough just to get consent from users; explicit consent is required. This includes ensuring the user selects checkboxes during the signup process, enters their email address, authorizes receiving marketing emails and newsletters, and grants the app permission to track user data in specific situations.
But when it comes to verbal consent, there is ambiguity. The GDPR accepts verbal consent but requires written or recorded proof of the consent given. The GDPR states that, “when requested by the data subject, the information may be provided orally, provided that the identity of the data subject is proven by other means.” Therefore, it is better to record or have written proof of verbal consent; one must not assume or misunderstand that verbal consent only includes oral consent.
Often, there is less visibility of data usage for customers. More often than not, customers do not know what they are giving consent for or how their data will be used. Let’s take the case of location data sharing.
Location data can show if someone visited an abortion clinic or a cancer treatment center. People usually want to keep this type of information private and not share it with companies or third parties. When consent is given without knowing what it is for, the act of giving or obtaining consent becomes meaningless.
Why consent is important in ethical data practices
Although you are legally required to obtain the user’s consent to process their data, there is also such a thing as the ethical use of data. When you take measures to protect your customers’ data beyond what the law requires, it promotes trust among your customers.
People value privacy and appreciate brands that prioritize data privacy. Let’s say a consumer is given the option to choose between two brands: one with no privacy features and another that advocates for privacy with built-in privacy features. Which do you think the customer will choose? Obviously, the latter.
Understanding a company’s data privacy policy is crucial to 85% of consumers—even before they make a purchase, a global study determined. Equally as important, 40% of individuals have changed brands after discovering that a company failed to protect customer data adequately, according to the McKinsey Global Survey on Digital Trust.
This is why tech companies go out of their way to demonstrate the privacy features they offer and how user consent is prioritized in these features.
In a way, customers prioritizing consent compels companies to integrate ethical data privacy policies into their systems. But it’s time companies realize that consent is the backbone of data privacy regulations and take customer consent seriously, not just to avoid hefty fines, but to also value the customer’s choice and their right to privacy.
A final word
Organizations worldwide are facing issues with data privacy. What is important when trying to protect your customers’ data is to realize the role customer consent plays. This helps organizations develop features and draft policies with the customer’s consent in mind and to effectively communicate to the customers why they are seeking consent. Without this step, data privacy becomes compromised. So, both organizations and customers need to grasp why consent matters and advocate for the ethical processing of data.
ManageEngine is a division of Zoho Corporation that provides comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and managed service providers. ManageEngine strongly believes in privacy by design and continuously advocates for user privacy. Established and emerging enterprises—including nine of every 10 Fortune 100 organizations—rely on ManageEngine’s real-time IT management tools to ensure the optimal performance of their IT infrastructure. Learn more about ManageEngine’s comprehensive suite of IT management solutions here.
Cyber Security
World’s Largest Cybersecurity Startup Hub GISEC North Star Debuts in 2025
GISEC Global is thrilled to announce the launch of GISEC North Star, an expanded startup zone designed to connect cybersecurity innovators, investors, and industry leaders on an unprecedented global scale. In partnership with Expand North Star, the world-renowned startup and investor networking event, GISEC North Star aims to elevate the cybersecurity startup ecosystem by featuring 250 leading-edge cybersecurity startups and 150 investors. The 14th edition of GISEC Global anticipates over 25,000 visitors and participants from 160 countries.
The event will take place during GISEC GLOBAL 2025 at the Dubai World Trade Centre from 6-8 May 2025, introducing unparalleled opportunities for networking, collaboration, and investment. As cybersecurity threats escalate globally, GISEC North Star is designed to foster an ecosystem of innovation and resilience by connecting global minds in cybersecurity technology, venture capital, and enterprise solutions.
As an anchor of GISEC Global, GISEC North Star will serve as a premier platform where disruptive startups can showcase their innovations, connect with leading global investors, and engage with key industry leaders across various sectors. The event will feature cutting-edge showcases, live demos, and panel discussions with top minds in cybersecurity technology and business.
“We are thrilled to expand GISEC’s role in the global cybersecurity ecosystem through our partnership with Expand North Star. GISEC North Star is committed to bringing together the brightest minds in cybersecurity, empowering startups with unparalleled access to the resources, networks, and investments they need to thrive in today’s fast-evolving digital landscape,” said Nawaz Ali, Commercial Director at GISEC Global.
GISEC North Star’s expansive setup is designed to attract the best cybersecurity talent from across the globe, uniting startups, investors, and visitors to collaboratively tackle the sector’s most pressing challenges. With participants from over 160 countries, the event will foster diverse and impactful exchanges that shape the future of global cybersecurity.
Designed to promote collaboration and growth, GISEC North Star is set to showcase breakthrough innovations that address critical challenges in cybersecurity, ranging from AI-driven threat detection to secure data management solutions. Investors will have an unprecedented opportunity to connect with and support promising startups driving advancements that safeguard the future.
Cyber Security
Check Point Software to Emphasise its Prevention-First Approach to Cyber Security
Ram Narayanan, the Country Manager at Check Point Software Technologies for the Middle East, says the company will introduce Check Point Infinity XDR/XPR in the UAE (more…)
Cyber Security
Tenable Urges Organisations to Reimagine Cybersecurity at GITEX 2024
Tenable will exhibit at GITEX Global at the Dubai International Convention and Exhibition Centre from October 14 – 18, 2024. At the event, Tenable will showcase its AI-powered exposure management solutions that illuminate the attack paths that exist within organizations’ infrastructure, from IT infrastructure to the cloud, to Operational Technology (OT) and everywhere in between. In addition, Tenable will launch its 2024 Cloud Risk Report during the show.
Scattered products, siloed views and disjointed teams are struggling to hold back threats across a fragmented attack surface. The cyber risk challenge won’t be won with security strategies and solutions that stand divided. Enterprises need one view of risk across all assets, to connect the dots between the damaging risk relationships that span solution silos and bring together disparate teams with the intelligence they need to strengthen defenses and protect against attacks as one.
Tenable exists to expose and close the resulting priority security gaps that put businesses at risk. Our industry-leading exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks, from IT infrastructure to the cloud to OT and everywhere in between.
“Rapid advancements in technology and digital transformation make it challenging for organizations to stay one step ahead of attackers,” said Maher Jadallah, Senior Director Middle East & North Africa, Tenable. “Security teams often have to juggle multiple clouds and identities across a converged IoT, OT and IT landscape. At GITEX 2024, we will show organizations how they can expose and close the priority security gaps that put their businesses at risk. Our team will be on hand to help visitors reimagine cybersecurity as a global force for eradicating their exposure.”
-
Cyber Security7 days ago
Tenable Urges Organisations to Reimagine Cybersecurity at GITEX 2024
-
Cyber Security7 days ago
Check Point Software to Emphasise its Prevention-First Approach to Cyber Security
-
GITEX1 week ago
OPSWAT to Showcase its Mobile Critical Infrastructure Protection Lab at GITEX 2024
-
GITEX1 week ago
Fortinet to Focus on Digital Transformation with Advanced Security at GITEX 2024
-
GITEX1 week ago
Snowflake to Demo its AI Data Cloud at GITEX 2024
-
GITEX7 days ago
Sophos to Highlight Advanced MDR Capabilities at GITEX Global 2024
-
Critical Communications3 days ago
Hytera to Show Off 4G and 5G Body Cameras for Law Enforcement at GITEX GLOBAL 2024
-
Artificial Intelligence6 days ago
Dataiku Launches LLM Guard Services to Control Generative AI Rollouts