Hoarders And Data Collectors: On The Brink Of Unmanageability

Big Data Collect

Hoarders and Data Collectors

In our physical world, hoarders are deemed “out of control” when they collect too much.  Surely the same analogy applies in our online world.  When providers collect realms of data from us, it seems they lose control of that too?  In the last months it’s not just the frequency of data breaches that has increased, it is the sheer volumes of personal data that are being breached that has reached new heights of “out of control”.  This article explores the connections between the physical world of hoarders and the online world of data collectors and proposes ways to reign in control of our data.

Big Data Bloat

In our digital world, providers of all kinds of services can’t seem to collect enough data on us. Whether the use case is marketing, sales or simply for providing improved services, we have become the guinea pigs for today’s Big Data analysis. And, the more services we sign up for the more data that is processed on us and stored or transacted on back end clouds. It’s not just that the data that is being collected on us, it’s being used to profile us in ways we might not have intended. And, as today’s data-centric world has suddenly crept up on us, there seems to be a lack of due process and corresponding toolsets for securely managing user data.

Hoarding is considered a disorder in our society. It is characterized by a pattern of excessive acquisition and inability to let go of large quantities of objects. Hoarding behaviors are associated with health risks, impaired functioning and economic as well as social burden. Data collectors are hoarders of information. And, like their physical hoarder counterparts their data collection is characterized too by excessive gathering and acquisition. Data collectors may have algorithms and processes for assembling profiles of individuals and in that sense may create more order than the disorder that typically characterizes a hoarder’s physical world. However, as in the physical world, it is hard to manage increasing volumes of things, so too in the digital world realms and realms of data are very challenging to secure. Similar to the physical world where hoarding results in impaired function, the volumes of information that are exposed in data breaches are also symptomatic of impaired function and processing.

So, what’s to be done about it?

Organizations with a data-collecting model need to be proactive. They need to anticipate privacy and security risks in their environment before collecting individuals’ information. While it might sound basic advice, all too often organizations do not take into enough consideration the expectations of consumers that they are collecting information from. Consumers have a right to expect that the organizations they are providing their personal data to take the very necessary precautions, such as auditing and logging, data protection measures such as encryption in its various forms for highly sensitive and confidential data and put into place appropriate consent management and access control mechanisms.

It may run contrary to what many BigData scientists and marketers believe, but taking a minimalist approach might be the single best thing that their organization might do from a security and a privacy standpoint. While marketers may believe that collecting more data improves the accuracy of marketing, if it can’t be handled securely or transacted in in a way that is privacy-preserving the impact to company reputation and brand and not to mention to the individuals whose data may be exposed will far outweigh marketing benefits.

Data Protection and Marketing

(Image Source: Neonsms)

The real challenge with data minimization will be to decide what information to collect and what to keep as no one single blueprint will apply equally to businesses. And, for data minimization practices to be successful it will require collaboration not just between privacy and security practitioners but also a company’s legal, marketing and Human Resources functions.

I believe that data collectors will end up shedding their current packrat practices as community outrage around the massive exposure of today’s data breaches is only set to increase. And, who knows, a more minimalist approach may also result in just as accurate marketing forecasting and more up-to-date customer profiles.

By Evelyn de Souza

Aruna Headshot

Top Four Predictions in 2020 for Unified Collaboration

Predictions in 2020 The year 2020 promises to usher in significant new developments in collaboration and communication. It’s part of an unending climb, moving higher on a logarithmic curve of progress. New technologies continue to ...
Madhaven Krishnan

Steps To Achieve Hyper Productivity With Your Digital Apps Development

Achieve Hyper Productivity The mobile and cloud revolution in enterprise IT is well underway and is already causing never-before--seen changes in the way apps are developed, managed and transformed. The driving factors behind these changes ...
Yotascale podcast

Episode 10: The Modern Day Smokestack? The Economics of Cloud Management

The Modern Day Smokestack A conversation with Asim Razzaq, CEO, Yotascale Why is cloud cost management so difficult? What are the main challenges in achieving cloud cost optimization? What are the principles of cost optimization ...
Jen Klostermann

FinTech and Blockchain vs Traditional Banking

FinTech and Blockchain Growth "The Rise of FinTech - New York’s Opportunity for Tech Leadership", a report by Accenture and the Partnership Fund for New York City, reveals that global investment in FinTech endeavors has ...
Peter Tsai

Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Updated: 11.19.2020 What is IaaS? Infrastructure as a Service (IaaS) allows you to rent computing resources from a third party that you then access through the web. You essentially outsource having to set up ...
New York

From Y2K To NYC Parking Meters: Have We Learned Anything About Complacency In Cybersecurity?

Cybersecurity Complacency This past January – in what seems like a different world now – a story briefly hit the headlines and was seen as more of a quirk than a threat. It was soon ...