Most manufacturers have added connectivity features to more products for various purposes as cellular and wireless communication connections have become omnipresent and economically viable. Devices can and must be tracked with each other as well as third parties for safety and loss prevention purposes. The Internet of Everything commerces and communication is vast. Aside from concerns regarding notice, consent, and accountability, regulators and consumer protection authorities are particularly concerned about data security risks associated with big data, and, more generally, with a large database.
Nigerians are wary that not all companies can keep data secure. However, Nigerians will appreciate if companies can ensure that the supplied data is technically and securely managed. One of the best ways to achieve this would be identity access management. And as the web is increasingly used as a platform for various transactions, companies are faced with a new requirement for authentification, authorisation and identity management. As such, their IT architectural frameworks must have control access not only to single, isolated systems but to whole business-spanning applications and services. The Identity and Access Management(IAM) concepts are configured to increase security and authentication methodologies in the management of information. This is one of the most important concepts in information governance and companies must pay attention to it. (I would expand on this concept in future articles)
As technology advances, most tech companies rely heavily on big data. Information technology companies use the term “big data” to describe technologies, services, and applications that can process large amounts of often unstructured data to develop, for example, facial recognition systems for authentication and security purposes, for new forms of predictive analysis, urban planning, traffic forecasts and optimisation, and medical research.
Big data is traded by data brokers, that is, companies that buy and resell the information, including personal information. There are a lot of them in Nigeria. However, companies must be sure they understand the implication of dealing with such companies and carry out their due diligence before employing their services.
Adding everything together, the internet of things, identity and access management, and big data go hand-in-hand. As companies grow profits by exploring, using, studying and keeping data, it’s important that they put into consideration the various privacy implications embedded in their procedures and ensure there are steps in place to protect the freedoms and rights of data subjects.
Dr. Irene is Data Protection Consultant and writes in from London.