{"id":221,"date":"2017-08-17T13:02:31","date_gmt":"2017-08-17T13:02:31","guid":{"rendered":"https:\/\/www.imperva.com\/learn\/?post_type=data_security&#038;p=221"},"modified":"2025-05-15T09:38:53","modified_gmt":"2025-05-15T09:38:53","slug":"data-privacy","status":"publish","type":"data_security","link":"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/","title":{"rendered":"Data Privacy"},"content":{"rendered":"<p>Privacy, in the broadest sense, is the right of individuals, groups, or organizations to\u00a0<i>control<\/i>\u00a0who can access, observe, or use something they own, such as their bodies, property, ideas, data, or information.<\/p>\n<p>Control is established through physical, social, or informational boundaries that help prevent unwanted access, observation, or use. For example:<\/p>\n<ul>\n<li>A physical boundary, such as a locked front door, helps prevent others from entering a building without explicit permission in the form of a key to unlock the door or a person inside opening the door.<\/li>\n<li>A social boundary, such as a members-only club, only allows members to access and use club resources.<\/li>\n<li>An informational boundary, such as a non-disclosure agreement, restricts what information can be disclosed to others.<\/li>\n<\/ul>\n<p>The exponential growth of a global information economy, driven by new technologies and disruptive business models, means that an ever-increasing amount of personal data is being collected, used, exchanged, analyzed, retained, and sometimes used for commercial purposes. It also means there is an ever-increasing number of accidental or intentional data breaches, incorrect or lost data records, and data misuse incidents.<\/p>\n<p>As a result, the demand for data privacy \u2014 the right to control how personal information is collected, with whom it is shared, and how it is used, retained, or deleted \u2014 has grown, as has the demand for\u00a0data security.<\/p>\n<p>Balancing the individual\u2019s right to data privacy and an organization\u2019s desire to use personal data for its own purposes is challenging, but not impossible. It requires developing a data privacy framework.<\/p>\n<p>This is part of an extensive series of guides about <a href=\"https:\/\/cloudian.com\/guides\/hybrid-cloud\/what-is-hybrid-cloud-examples-use-cases-and-challenges\/\">hybrid cloud<\/a>.<\/p>\n<h2>Developing a Data Privacy Framework<\/h2>\n<p>Although there isn\u2019t a \u201cone-size-fits-all template\u201d for a framework, there are several universal processes that can help you develop one relevant to your business:<\/p>\n<p><b>Discovering and classifying personal data<\/b>\u00a0\u2014 Determining what types of data is collected (e.g., medical, financial, or personally identifying data such as Social Security numbers), where and how the data is collected, where data is stored, who has access to the data and where are they physically located, data flows within and across a business unit, and data transfers within and between countries.<\/p>\n<p><b>Conducting a Privacy Impact Assessment (PIA)<\/b>\u00a0\u2014 Determining how and where data is stored, backed up, and disposed, what data security measures are currently implemented, and where systems may be vulnerable to a data privacy breach. Examples of data security measures include the following:<\/p>\n<ul>\n<li><b>Change management\u00a0<\/b>\u2014\u00a0Monitors, logs, and reports on data structure changes. Shows compliance auditors that changes to the database can be traced to accepted change tickets.<\/li>\n<li><b>Data loss prevention\u00a0<\/b>\u2014\u00a0Monitors and protects data in motion on networks, at rest in data storage, or in use on endpoint devices. Blocks attacks, privilege abuse, unauthorized access, malicious web requests, and unusual activity to prevent data theft.<\/li>\n<li><b>Data masking\u00a0<\/b>\u2014\u00a0Anonymizes data via encryption\/hashing, generalization, perturbation, etc.\u00a0<a href=\"https:\/\/www.imperva.com\/datasecurity\/compliance-101\/pseudonymization\/\">Pseudonymizes\u00a0<\/a>data by replacing sensitive data with realistic fictional data that maintains operational and statistical accuracy.<\/li>\n<li><b>Data protection\u00a0<\/b>\u2014\u00a0Ensures data integrity and confidentiality through change control reconciliation, data-across-borders controls, query whitelisting, etc.<\/li>\n<li><b>Ethical walls\u00a0<\/b>\u2014\u00a0Maintains strict separation between business groups to comply with M&amp;A requirements, government clearance, etc.<\/li>\n<li><b>Privileged user monitoring\u00a0<\/b>\u2014\u00a0Monitors privileged user database access and activities. Blocks access or activity, if necessary.<\/li>\n<li><b>Secure audit trail archiving\u00a0<\/b>\u2014\u00a0Secures the audit trail from tampering, modification, or deletion, and provides forensic visibility.<\/li>\n<li><b>Sensitive data access auditing<\/b>\u00a0\u2014 Monitors access to and changes of data protected by law, compliance regulations, and contractual agreements. Triggers alarms for unauthorized access or changes. Creates an audit trail for forensics.<\/li>\n<li><b>User rights management\u00a0<\/b>\u2014\u00a0Identifies excessive, inappropriate, and unused privileges.<\/li>\n<li><b>User tracking\u00a0<\/b>\u2014\u00a0Maps the web application end user to the shared application\/database user and then to the final data accessed.<\/li>\n<li><b>VIP data privacy \u2014\u00a0<\/b>Maintains strict access control on highly sensitive data, including data stored in multi-tier enterprise applications such as SAP and PeopleSoft.<\/li>\n<\/ul>\n<p><b>Understanding marketing issues<\/b>\u00a0\u2014 Determining cross-border marketing issues (e.g., whether products or services are directly marketed to residents of other countries, the language used on a website, or a deployment of mobile applications), and third-party marketing issues (e.g., sharing of information for marketing purposes).<\/p>\n<p><b>Analyzing compliance requirements<\/b>\u00a0\u2014 Determining applicable compliance requirements, based on the results gathered in understanding the personal data and conducting a PIA.<\/p>\n<ul>\n<li><b>Legislative Regulations<\/b>\u00a0\u2014 State, country, or governmental agency laws regulating personal data collection, use, storage, transport, and protection. Examples include General Data Protection Regulation (<a href=\"https:\/\/www.imperva.com\/datasecurity\/regulation-glossary\/gdpr\/\">GDPR<\/a>\u00a0\u2014 European Union), Personal Information Protection and Electronic Documents Act (PIPEDA \u2014 Canada), Information Technology Act 2000 (ITA \u2014 India), Privacy Act 1993 (New Zealand).<\/li>\n<li><b>Industry-specific Regulations<\/b>\u00a0\u2014 Laws or mandates defining how a specific industry, type of business, or government agency will treat and secure personal data. Examples include <a href=\"https:\/\/www.imperva.com\/learn\/data-security\/hipaa-privacy-rule\/\">Health Information Portability and Accountability Act<\/a> (HIPAA), Health Information Technology for Economic and Clinical Health (HITECH), Payment Card Industry Data Security Standards (PCI DSS).<\/li>\n<li><b>Third-Party Obligations<\/b>\u00a0\u2014 Agreements among business partners defining how a contractor, vendor, or other external agency will treat and secure personal data collected by the \u2018parent\u2019 organization. For example, an agency located in India providing credit card services for a U.S. based vendor must observe PCI DSS data protection requirements.<\/li>\n<\/ul>\n<p><b>Developing privacy policies and internal controls<\/b>\u00a0\u2014 Creating external privacy statements (e.g., website, mobile app, and offline privacy policies); internal and external privacy policies and procedures related to <a href=\"https:\/\/www.imperva.com\/learn\/data-security\/data-governance\/\">data governance<\/a>, data privacy and security breaches; and data privacy training.<\/p>\n<p>Learn how Imperva data\u00a0<a href=\"https:\/\/www.imperva.com\/Products\/SecureSphereforData\">security\u00a0<\/a>and data\u00a0<a href=\"https:\/\/www.imperva.com\/Products\/camouflage-data-masking\">masking\u00a0<\/a>solutions\u00a0can help you develop your Data Privacy Framework.<\/p>\n<h2>See Additional Guides on Key Hybrid Cloud Topics<\/h2>\n<p>Together with our content partners, we have authored in-depth guides on several other topics that can also be useful as you explore the world of <a href=\"https:\/\/cloudian.com\/guides\/hybrid-cloud\/what-is-hybrid-cloud-examples-use-cases-and-challenges\/\">hybrid cloud<\/a>.<\/p>\n<h2><a href=\"https:\/\/faddom.com\/nutanix-history-products-and-top-5-alternatives\/\">Nutanix<\/a><\/h2>\n<p>Authored by Faddom<\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/faddom.com\/nutanix-history-products-and-top-5-alternatives\/\">[Guide] Nutanix: History, Products, and Top 5 Alternatives\u00a0<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/faddom.com\/vmware-vs-nutanix\/\">[Guide] Nutanix vs. VMware: 5 Key Differences and How to Choose<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/faddom.com\/\">[product] Faddom | Instant Application Dependency Mapping Tool\u200b<\/a><\/li>\n<\/ul>\n<h2><a href=\"https:\/\/www.atlantic.net\/dedicated-server-hosting\/bare-metal-servers\/\">Bare Metal Server<\/a><\/h2>\n<p>Authored by Atlantic<\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/www.atlantic.net\/dedicated-server-hosting\/bare-metal-servers\/\">[Guide] Bare Metal Server Hosting<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/www.atlantic.net\/dedicated-server-hosting\/what-is-a-bare-metal-server-benefits-use-cases-and-best-practices\/\">[Guide] What Is a Bare Metal Server? Benefits, Use Cases, and Best Practices<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/www.atlantic.net\/dedicated-server-hosting\/how-to-secure-ssh-server-on-arch-linux\/\">[Blog] How to Secure SSH Server on Arch Linux\u00a0<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/www.atlantic.net\/cloud-platform\/\">[Product] Atlantic.Net Cloud Platform | Scalable, Secure Cloud Solutions<\/a><\/li>\n<\/ul>\n<div class=\"ddos-banner\"><div class=\"wrap\"><p>See how Imperva Data Protection can help you with data privacy.<\/p>\n<div class=\"cta-container\">\n                                                    <a class=\"impv-yellow-btn\"  event-action=\"Click\"  event-category=\"LC Banner\"  event-label=\"Request demo\"  gtm-track  target=\"_self\" href=\"javascript:openModal('modalid3533', '\/learn\/banner\/virtual\/request-demo\/', 'Personal Demo Request | Imperva');\">Request demo<\/a>\n                                                    <a class=\"gst-yellow-dark-text-btn\"  event-action=\"Click\"  event-category=\"LC Banner\"  event-label=\"Learn more\"  gtm-track  target=\"_self\" href=\"https:\/\/www.imperva.com\/products\/data-protection\/\">Learn more<\/a>\n                                                <\/div><\/div><\/div><h2><a href=\"https:\/\/komodor.com\/learn\/kubernetes-architecture\/\">Kubernetes Architecture<\/a><\/h2>\n<p>Authored by Komodor<\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/komodor.com\/learn\/kubernetes-deployment-how-it-works-and-5-deployment-strategies\/\">[Guide] Kubernetes Deployment: How It Works &amp; 5 Deployment Strategies<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/komodor.com\/learn\/kubernetes-namespace-a-practical-guide-and-6-tips-for-success\/\">[Guide] Kubernetes Namespace: Practical Guide &amp; 6 Tips for Success<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/komodor.com\/blog\/best-practices-guide-for-kubernetes-labels-and-annotations\/\">[Blog] Kubernetes labels best practices<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/komodor.com\/\">[Product] Komodor | Kubernetes Management and Troubleshooting<\/a><\/li>\n<\/ul>\n","protected":false},"featured_media":0,"template":"","categories":[22],"class_list":["post-221","data_security","type-data_security","status-publish","hentry","category-data"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Privacy | Imperva<\/title>\n<meta name=\"description\" content=\"Learn how to manage data privacy\u2014the right to control how personal information is collected, shared, used, or retained\u2014in the context of data security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Privacy | Imperva\" \/>\n<meta property=\"og:description\" content=\"Learn how to manage data privacy\u2014the right to control how personal information is collected, shared, used, or retained\u2014in the context of data security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Center\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-15T09:38:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Itamar Verta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/\",\"url\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/\",\"name\":\"Data Privacy | Imperva\",\"isPartOf\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/#website\"},\"datePublished\":\"2017-08-17T13:02:31+00:00\",\"dateModified\":\"2025-05-15T09:38:53+00:00\",\"description\":\"Learn how to manage data privacy\u2014the right to control how personal information is collected, shared, used, or retained\u2014in the context of data security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.imperva.com\/learn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DataSec\",\"item\":\"https:\/\/www.imperva.com\/learn\/data-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.imperva.com\/learn\/#website\",\"url\":\"https:\/\/www.imperva.com\/learn\/\",\"name\":\"Learning Center\",\"description\":\"Imperva\",\"publisher\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.imperva.com\/learn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.imperva.com\/learn\/#organization\",\"name\":\"Imperva Inc\",\"url\":\"https:\/\/www.imperva.com\/learn\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg\",\"contentUrl\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg\",\"width\":1200,\"height\":627,\"caption\":\"Imperva Inc\"},\"image\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Privacy | Imperva","description":"Learn how to manage data privacy\u2014the right to control how personal information is collected, shared, used, or retained\u2014in the context of data security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/","og_locale":"en_US","og_type":"article","og_title":"Data Privacy | Imperva","og_description":"Learn how to manage data privacy\u2014the right to control how personal information is collected, shared, used, or retained\u2014in the context of data security.","og_url":"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/","og_site_name":"Learning Center","article_modified_time":"2025-05-15T09:38:53+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes","Written by":"Itamar Verta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/","url":"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/","name":"Data Privacy | Imperva","isPartOf":{"@id":"https:\/\/www.imperva.com\/learn\/#website"},"datePublished":"2017-08-17T13:02:31+00:00","dateModified":"2025-05-15T09:38:53+00:00","description":"Learn how to manage data privacy\u2014the right to control how personal information is collected, shared, used, or retained\u2014in the context of data security.","breadcrumb":{"@id":"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.imperva.com\/learn\/data-security\/data-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.imperva.com\/learn\/"},{"@type":"ListItem","position":2,"name":"DataSec","item":"https:\/\/www.imperva.com\/learn\/data-security\/"},{"@type":"ListItem","position":3,"name":"Data Privacy"}]},{"@type":"WebSite","@id":"https:\/\/www.imperva.com\/learn\/#website","url":"https:\/\/www.imperva.com\/learn\/","name":"Learning Center","description":"Imperva","publisher":{"@id":"https:\/\/www.imperva.com\/learn\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.imperva.com\/learn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.imperva.com\/learn\/#organization","name":"Imperva Inc","url":"https:\/\/www.imperva.com\/learn\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/","url":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg","contentUrl":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg","width":1200,"height":627,"caption":"Imperva Inc"},"image":{"@id":"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/data_security\/221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/data_security"}],"about":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/types\/data_security"}],"version-history":[{"count":10,"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/data_security\/221\/revisions"}],"predecessor-version":[{"id":3427,"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/data_security\/221\/revisions\/3427"}],"wp:attachment":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/media?parent=221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/categories?post=221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}