Advertisment

Don't help stalkers and kidnappers

author-image
CIOL Bureau
Updated On
New Update

MUMBAI, INDIA: Geolocation uses data acquired from a computer or mobile device to identify a physical location. Applications using this technology offer consumers greater convenience, discounted prices and easy information sharing, and enable enterprises to deliver more personalized customer service and offers. But as geolocation services become more common, the need for data management and enterprise controls increases significantly. 

Advertisment

Malicious use of geolocation data can put both an individual and an enterprise at risk. When a person’s personal information, such as gender, race, occupation and financial history, is combined with information from a GPS and geolocation tags, the data can be used by criminals to identify an individual’s present or future location. This raises the potential of threats ranging from burglary and theft to stalking and kidnapping

ISACA suggests some ways to avert these risks. An Enterprise can implement technology safeguards, leveraging frameworks such as COBIT as guidelines for policy development. It should regularly update the operating systems and software of work devices to ensure security improvements are quickly proliferated throughout the enterprise; Classify data, making the most sensitive data (personal, financial, client-sensitive or confidential) unreadable or inaccessible  and design a device management program that includes where the users connect, etc.

Take into account the applicable legislation and regulations on privacy around the world, which differ by country.

Implement an effective risk management policy that identifies where geolocation services add value and are to be utilized, and where they should be disabled. Geolocation should be part of an organization’s risk profile.

As to what Can Consumers and Employees Do: ISACA advises people to follow a five-step “ROUTE” for informed use of geolocation services. Read mobile app agreements to see what information you are sharing. Only enable geolocation when the benefits outweigh the risk. Understand that others can track your current and past locations. Think before posting tagged photos to social media sites. Embrace the technology, and educate yourself and others.

“There are great consumer advantages of geolocation services, such as photos being tagged with the correct location or assisting you with directions to the location you are travelling. However, as with all technologies, individuals and enterprises must consider their risk tolerance level,” said Robert Stroud, past international vice president of ISACA and vice president, Strategy and Innovation, at CA Technologies. “The fundamental issue at play is that many consumers are unaware of the risks. They need to educate themselves in order to make informed decisions.”