Even as GDPR insisting enterprises to comply with privacy laws, except in EU, data privacy is a thing of past. Invasive technology shot to limelight, which’s now putting certain governments and associations on tenterhooks for implementing more stringent security and regulatory frameworks.
The news of invasive technology surely comes in as a rude shock to almost all employees, who are introduced to this technology. In fact, Amazon has recently got patent to a gilt-edged wrist band, which will be used to track the hand movements of employees working in the warehouses. The band, which gives the ability for companies to pre-record the right gestures, will automatically buzz in case workers moves the hand in a direction that’s will hamper the workflow even for a second.
This is just one side of the coin. The invasive technology is not limited to companies trying to monitor employees, it’s also used by intruders to use or rather misuse the crucial personal data that they have submitted as a part of certain surveys. A similar incident came to light when Indian Government turned its eyes red over alleged personal data leak of Facebook users. Responding to it, Mark Zuckerberg tendered an apology.
The bigger challenge is hurled from miscreants, who use sophisticated invasive technologies to steal the crucial information, to put in in short—a new form of cyber threat. Recently, security agencies in Israel said that a terrorist organization created fake apps such as online data apps etc. and made them available on Google Store. Reportedly, 100 soldiers joined the list of victims who have fallen prey to the malware. Such fake apps were created to
-Identify GPS location of the handset
-Steal the critical data from the handset
-Capture photos secretly
-Record the user’s telephone conversations
Yet another malicious app named Smesh App was allegedly used by Pakistani security forces to reportedly steal crucial information from India. Russian based extremist group had also hit the headlines for trying to steal information from Ukranian forces.
Role of Security & Regulatory Framework:
Federal agencies are apparently planning to strengthen or implement new security and regulatory framework to put a check on malicious online content. In fact, NIST (National Institute of Standards Technology) recently released guide to better implementation of security & regulatory framework. It also scheduled conference in September 2018 at Maryland and welcomed federal agencies and cyber security agencies to discuss their views on the same.
In May 2018, United Kingdom has released Security Policy Framework, which emphasized on the need to build a robust framework that would protect the critical data. Deloitte Governance Now has said that India must have a cyber security and regulatory framework in place. Australia has recently introduced Protective Security Policy Network (PSPN) that will protect its citizens and information.
Conclusion: Now that invasive technology is sending shockwaves irrespective of industries and companies, governments have shifted their focus on implementing more stringent security and regulatory framework. The more invasive technology advances, the better security & regulatory framework will come to force.