19 novembre 2020
#Data Ethic
Where Do We Stand on Data Ethics?
Over the years, we have seen a real boom in digital technology in the context of our work and in our private lives. The volume of data created and exchanged continues to grow. The way in which it is processed has become increasingly elaborate. The value of some particular types of data continues to rise, which highlights its vulnerability even further. Data development is not without problems, and raises its own set of questions. This is the source of the term data ethics. #### Legislation is changing Current legislation provides a framework for using data. But it is struggling to adapt to a world that is reinvented every day. What with the large-scale application of Artificial Intelligence, IoT, the increasing use of algorithms, things are changing constantly. How can you legislate in such a shifting context, with technology developing at a mind-boggling speed? Therein lies the whole problem. When GDPR, the European data protection regulation, was introduced in 2018, it provided a legal framework on the use of personal data. This was an initial step. However, there are a great number of companies and organizations battling with the reality and difficulties of implementing this legal text. #### And where does digital society come into all this? Digital society questions the best way to protect the private life of e-citizens and the freedom of internet users. And this despite some glaring contradictions… This is how the idea of data ethics formed. It is everyone’s role to question the moral principles that should be applied to “data management” and particularly the way in which these are put into practice. #### Could data compliance be the solution? Adopting a data compliance approach might be the first way to address the challenging issue of data ethics, referring to the legal framework, current standards, actively watching technology and its daily application. One thing is certain: Today, an organization that invests in digital confidence and the prevention of cyber risks has a considerable competitive edge and will be preparing a brighter future.
2 octobre 2019
Your Data Security
How could we not talk about data security as October gets underway? Perhaps you know this already, but, in the last few years, October has been dedicated to “**cyber security**”. It is an opportunity to (re)share best practices in data **security** and computer and server protection. There isn’t a week that goes by without a computer security problem hitting the press headlines. Such questions are seldom the focus of our daily preoccupations: - “It only happens to big multinationals” - “What could anyone want to steal?” - “How can you expect me to remember 5 passwords?” And the list goes on…. I often hear remarks like this when the sensitive subject of data protection is broached. **Where do you start?** Firstly, you need to know where you stand concerning your data security procedures. Let’s be honest, there is no magic formula to secure your data. You need to take restrictive measures. To visualize what I’m saying a bit better, let’s take your house or your apartment as an example. You probably think it’s ridiculous to have just one key for your gate, your front door, your garage door, your garden shed, your car and your bike lock. You may think it’s even more ridiculous to always use the same key for your company, your office and your filing cabinet. What is true in real life is also true in the “digital” world. **Checklist** Here are 4 steps towards getting started on your data protection or continuing your efforts: - **Secure all points of access:** from proper password management to best practices applied daily. For example: lock your workstation when you leave your office. We strongly recommend that you check what the French National Cyber Security Agency (ANSSI) has to say. You will find practical data by branches of industry and kits to help make your staff more aware of the subject. - **Identify your company’s data:**  knowing your own data is a key step to making sure it is secure. You would be surprised just how many organizations botch this step and then make inappropriate decisions. We are not going to lie to you. This phase takes a long time. Don’t downplay its importance. But it is as tiresome as it is indispensable. - **Your organization should be appropriate:** When you know who does what, it’s much easier to make progress in the right direction together. Having security and/or compliance advisers in each sector makes communication smoother. Don’t forget: security is everyone’s business. It should not be the “sole responsibility” of the ISD. - **Introduce appropriate procedures** in case of incidents.This makes things a whole lot easier when dealing with an operational problem. The teams focus on the battle plan drawn up. Don’t forget that in the event of an incident, the ANSSI teams are also very helpful. Check their [incident management]( section. ![Description]( > your data security
23 septembre 2019
#cybersecurity #Event
Wavestone’s Radar 2019 of Cyber Security Startups
Wavestone’s radar 2019 of French **cyber security** startups has just been published. And guess what? Dawizz figures in the **Data Security** category! This radar is an integral part of a more extensive study of the **cyber security** market and the challenges met by startups of this ecosystem. The key question is how to help boost the development of these startups, of which Dawizz is one. The cyber security ecosystem has been growing very fast for several years. Market needs are increasingly pressing and business owners are meeting them with ever more innovative solutions. The AI boom is definitely playing a role. 19% of the startups identified are already using Artificial Intelligence in their products. **“How can we consolidate this?”** Here lies the true problem. Big groups are still reticent to work directly with startups and very young companies. One solution suggested in this study is an incubation period and a POC (Proof of concept) transition phase. This tests the product’s robustness, building the mutual trust you need for the success of any project. If you would like to see the study, please click [here]( ![Description]( > Wavestone cyber security radar Dawizz With MyDataCatalogue, Dawizz offers its clients a large range of data compliance and data security tools, to improve the quality of their data and facilitate working together and sharing their data.
17 septembre 2018
The challenges of data governance
The growing amount of data has become difficult to address. Companies and public organizations must now introduce real data governance. You should keep the following goal in mind “better control over your data optimizes resources and improves computer security”. Faced with the extent of the problem it is often difficult to know where to begin. Progress step-by-step to gain a clearer vision: ## What is data governance? Data governance aims to identify, understand and control data so that it can be used better. By identifying who is involved in collecting data and the methods used, you can improve its reliability considerably. Another point that should not be overlooked is understanding the purpose of this data, in other words what it will be used for. ## The five key characteristics of data Data is a commodity that everyone is talking about, but what exactly are the criteria it must meet? >-    **Data availability:** the data is stored in the information system and is always accessible to users, according to their user rights. The data must be available > >-    **Data usability:** computer tools must be easy to learn to operate and use. They must be efficient. > >- **Data integrity:** the accuracy and consistency of the data must be maintained and it must not be destroyed or modified during processing, transfer or storage. > >-    **Data security:** the organization must ensure the data is secure by implementing a security policy. So, you need to check who accesses the data, track changes, and protect it from external attacks, etc. > >-    **Data privacy:** data privacy is the protection of stored communications or data against interception or being read by unauthorized people. ## And what about people in all that? Like any project affecting work organization, transparency and communication between each management team are vital to success and will greatly facilitate the implementation of effective data governance. Fortunately, the human side is still essential. Speaking of the human side, let us take a closer look at who are the key people in such an approach. We hear about the **Chief Data Officer** (CDO) and **data scientists** more and more. But what exactly are their jobs? CDOs are in charge of **data governance**. They are responsible for managing the organization's data: quality, security, coherence, data protection and dialogue between each management team. As for data scientists, they are the organization’s **data experts**. They are in charge of collecting and processing data with the purpose of making it usable (format, size, etc.). They then analyze the data to detect tangible trends in keeping with the company business and strategy. **Data governance** is anchored to the values of the company, including its culture and history. ## Boost your data governance with “Data Mapping” You are now aware that data governance requires an excellent understanding of your data assets. We recommend that you map your data and keep it up-to-date to get a handle on what it involves! If you produce a data map it will help you implement an accurate and efficient plan of action. **GDPR focus** >GDPR, which came into effect on 25 May 2018, resulted in increased focus on **data governance**. This European regulation strengthens existing user rights and places new obligations on organizations in relation to the protection of personal data. In keeping with GDPR, personal data must be listed and identified in a register of processing operations, which may be consulted by the French data protection office, the CNIL. This refers to **personal data mapping**. Feel like taking things further? Why not check out some of our **examples of use**?