Yeah, that’s the downside with data like this, nothing prevents copying it. You’d need fines to help enforce it (which, as we’ve seen from this exact article, aren’t an effective deterrent).
Yeah, that’s the downside with data like this, nothing prevents copying it. You’d need fines to help enforce it (which, as we’ve seen from this exact article, aren’t an effective deterrent).
Just one more of a million massive breaches within the last 10 years. No real consequences, I’m sure.
At this point, I think it’s safe to say that no individual person’s personal data hasn’t been caught in one of these breaches (unless they were born very recently). That’s not even mentioning the hundreds of vendors who I no longer work with but still have my sensitive data on their systems.
I heard an idea a few years ago that I found interesting: each person has their private data hosted on a secure data hub. If a vendor needs some of that data (ex: FirstName, LastName, Email) for their system, they have to make a request to your hub for it, which you then have to approve. Each time a vendor system needs that data, they make a callout to your hub. As long as they have an active approval, the callout would succeed for the fields they’ve been authorized. You can then revoke that request whenever you’d like.
I like the idea of having a running list of vendors who have access to your data and being able to revoke that data. However, it would also create a single location (your data hub) that could be breached and be a higher value target than any of the particular vendors.
Trade-offs.
I tend not to finish them as well. I think I just like the exploration and learning part, then I get bored when it comes time to apply what I learned and power through content.
Red Dead 2 after the main story line… and then we got the epilogue!
You may be joking, but as long as you’re actually good at what you do, being a dickhead can be a winning strategy.
I’ve never been able to do it myself, but know many who have.