i-law

World Insurance Report

The data security life cycle

Every day sees another headline that illustrates how data protection has been ignored resulting in vital government or corporate data that has been exposed or lost. Yet it is common knowledge that government agencies and private enterprises have a vested interest, and a legal obligation to effectively protect data. Companies must understand, and account, for any data security mishaps. Merely adopting a security policy alone, according to Dr. Peter Mitteregger, vice president of Europe & EMEA at data security consultancy Credant Technologies, will only provide a false sense of data protection and potentially lead to the cost, embarrassment and humiliation of notifying customers, shareholders and competitors when data does go missing. Dr Mittregger says it is wrong to think of data security as a static problem. A better way to view data security is as a lifecycle, which can be broken down into four phases of data protection: detecting the devices where data is stored; enforcing the encryption of sensitive data; putting in place an auditing and reporting system which proves that protection was in place in the event of a theft; and finally, providing a support system which helps users retrieve passwords and data from discarded media

The rest of this document is only available to i-law.com online subscribers.

If you are already a subscriber, click Log In button.

Copyright © 2025 Maritime Insights & Intelligence Limited. Maritime Insights & Intelligence Limited is registered in England and Wales with company number 13831625 and address 5th Floor, 10 St Bride Street, London, EC4A 4AD, United Kingdom. Lloyd's List Intelligence is a trading name of Maritime Insights & Intelligence Limited.

Lloyd's is the registered trademark of the Society Incorporated by the Lloyd's Act 1871 by the name of Lloyd's.