Post Content
In this episode of the Azure Essentials Show, our Armchair Architects—Uli, Eric, and David—take on the critical and timely topics of data privacy and data security. They discuss the distinctions between these two concepts, emphasizing the importance of encryption, authentication, and authorization in data security. They also highlight the significance of compliance with privacy regulations like GDPR, CCPA, and HIPAA in data privacy. The conversation covers the implications of security and privacy incidents, the role of tokenization and other privacy-enhancing technologies, and the necessity of having robust processes in place to handle data breaches effectively. Join Uli, Eric, and David as they explore these essential aspects of data management and protection in this two-part conversation (part two is here: https://aka.ms/AzEssentials/188).
Resources
• Microsoft Privacy https://learn.microsoft.com/en-us/privacy/
• Privacy & data management https://learn.microsoft.com/compliance/assurance/assurance-privacy
• Microsoft Defender https://learn.microsoft.com/defender-endpoint/data-storage-privacy
• Azure data security and encryption best practices https://learn.microsoft.com/azure/security/fundamentals/data-encryption-best-practices
• Privacy-enhancing technologies https://wikipedia.org/wiki/Privacy-enhancing_technologies
Related episodes
• Armchair Architects: Data Privacy and Data Security (pt 2) https://aka.ms/AzEssentials/188
• Watch all the Armchair Architects episodes https://aka.ms/ArmchairArchitects
• Watch the Azure Essentials Show https://aka.ms/AzureEssentialsShow
Connect
• Ulrich (Uli) Homann https://www.linkedin.com/in/ulrichhomann
• Eric Charran https://www.linkedin.com/in/ericcharran
• David Blank-Edelman https://www.linkedin.com/in/dnblankedelman
Chapters
0:00 Introduction
1:12 Data security
1:40 Data privacy
2:37 Two aspects to privacy
3:33 Gone, baby, gone
3:58 Don’t misuse PII
5:29 Examples
6:46 Create a breach playbook
7:23 Tokenization explained
8:46 Don’t allow re-identification
9:18 Privacy-enhancing technologies (PET)
9:41 In part 2 … Read More Microsoft Developer