Data Warehousing                

Security Measures used to protect privacy of information

"In many ways the average data warehouse team still lives in a world of naive innocence. The team is so busy sourcing data and deciding on hardware and software that a comprehensive security plan simply hasn't been done ... In many cases, sensitive information is lying right on the table and hasn't been abused only because no one has tried to grab it yet. The situation is similar to leaving a car unlocked in a shopping center parking lot. You might go for years without having the car broken into just because the thieves have not turned their attention to it yet." – Ralph Kimball

Data warehouses have been an important way for organizations to efficiently use digital information for decision making. Simply put, a data warehouse is a database system that focuses on data storage specifically structured for query and analysis (Kimball, 2002). That is, data warehouses are able to optimize database related queries and analysis tools with their data analysis abilities. All of the organisation’s decisive information can be found in a convenient format to retrieve and use. This can include information about operational systems information and other company information, such as products and customer details. These details can include names and addresses, bank account numbers and other confidential information. Such data stored in the data warehouse can be used by the company for strategic purposes.

However, because of the private information within the data warehouse, a concern has arisen concerning the safety and protection of their personal details. Data warehouses are subject-oriented, integrated and generally easily accessible (Inmon and Hackathorn, 1994). Because of these characteristics, data warehouses provide a prime target for unauthorized users who hope to gain access to this information. Unauthorized users can obtain information and use them for their own purposes, such as human resource, medical and financial data.

Security can be complicated as it has to accommodate the needs of the data warehouse. Security must stop unauthorized users from obtaining or changing data within a data warehouse. The data must be available to authorized users when needed, while keeping track of the actions performed on it (Elson and Le Clerc, 2005).

A rising need

When data warehouses were first established in the late 1980s, protection against unauthorized access was simpler. The person in charge of the data warehouse, the database administrator would know that whoever accessed the data warehouse worked for the company. Security breaches were limited to dishonest employees who would access and abuse the data, but was not a common occurrence.

With the Internet gaining public interest in the early 1990s, data warehouse security became more complicated. People wanting to gain unauthorized access were able to access the data warehouse electronically without the database administrator’s permission. They were able to do so without their location concealed and their identity remaining anonymous. Because of this new vulnerability, new security measures were needed to be established.

With the rising trend towards flatter, more horizontally structured companies, new security measures are required that enable a division within the company to view only the data that is relevant to them, yet allow employees on the higher corporate levels to be able to view the data as a whole.

Join now!

Higher levels of Government have recognized the need for privacy, and hence privacy laws govern the use of personal information within a data warehouse. It is the company’s responsibility to obey the law, especially to those companies who sell data to clients.

Privacy Laws

To reduce the concern of unauthorized use of personal data, national Governments have passed laws establishing requirements in the management of customer information. By understanding such laws, establishment of appropriate security measures in the data warehouse environment can be made. Here are examples of Acts and regulations that demonstrate this.

Australia has The Privacy ...

This is a preview of the whole essay