Women In Security Magazine Issue 11

Page 102

PRIVACY THOUGHTS WITH KARA KELLY The metaverse presents many unique challenges to individuals’ privacy. Data minimisation—the need to collect only data necessary to conduct processing activities—is a principle of data protection regulations. A challenge posed by the metaverse is that the data processing required to create immersive environments is expected to result in massive collections of data about individuals, from health data to financial data. Companies in the metaverse such as JP Morgan, Walmart, Nike and Samsung may soon have access to surveillance data from business engagement and sales, exposing us to highly commercialised digital spaces where overcollection of data may become unavoidable. The 2022 Deloitte Australia Privacy Index stressed the link between consumer behaviour and privacy with 51 percent of individuals surveyed saying they were uncomfortable with their behaviour being subject to online surveillance. So, how do companies create these environments while managing consumer expectations of data minimisation? Meta is one company that has attempted to overcome this challenge. As of August 2022, users of Meta’s virtual reality (VR) devices will no longer need their Facebook account details to log in. However, Meta will still require name, email address, phone number, payment information and date of birth for age verification to create this new type of account. This practice raises the question of whether or not Meta is adhering to the principle of data minimisation.

How do we address the risk of overcollection of personal information in the metaverse?

and explain this to their users in a manner that

Most data protection laws are drafted to be agnostic

allows for informed decisions. Companies looking to

in their treatment of new technologies, and are

benefit long term in the metaverse by engaging with

applicable to the metaverse. The EU’s General Data

individuals must examine their data collection needs

Protection Regulations (GDPR) and China’s Personal

and build trust through transparency.

Information Protection Law (PIPL) specifically persons living within their territories regardless of

SECURITY THOUGHTS WITH SARAH IANNANTUONO

where the data gathered is processed. They also

The metaverse represents a convergence of multiple

require a high level of transparency from entities

technologies. This makes security a top priority

processing the personal information of individuals.

for metaverse development if the opportunities it

Such entities must be able to identify exactly what

creates are to be exploited. With countries like South

they are collecting and processing in the metaverse

Korea investing $US177.1 million into the metaverse

mention monitoring the behaviours of natural

102

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2022


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Gabrielle Raymundo

5min
pages 128-129

Haicheur Ichrak Amani

3min
pages 130-133

Jack K

2min
page 127

Kao Hansell

7min
pages 124-126

Oorja Rungta

6min
pages 122-123

Out of the shadows: how cybersecurity has taken centre stage in the Australian business arena

3min
pages 118-121

Key themes from 2022 taking us forward

4min
pages 116-117

neural networks and cybersecurity

2min
pages 114-115

Reflections on malware

4min
pages 112-113

Sharing our inner voice stories

7min
pages 108-111

behind cryptocurrency

3min
pages 106-107

Improving security together

3min
pages 102-105

Meeting the security and privacy challenges of the metaverse

1min
page 101

How is the industry responding to the skills and talent squeeze?

4min
pages 98-100

Looking back to move forward: thirty years of experience guiding the way

2min
pages 92-93

Corporate layoffs: a perfect storm for insider risk and the imperative for holistic mitigation approaches

7min
pages 88-91

Cyber resilience in the cyber world

4min
pages 85-87

2022 has been a watershed year for cybersecurity, but what’s next?

5min
pages 82-84

not fill you with dread

4min
pages 80-81

The future of developer security maturity is bright, and these verticals are leading the charge

4min
pages 78-79

Australia’s cybersecurity sector: where are the women?

5min
pages 74-77

you need to reach your vision

12min
pages 54-59

Keep calm and carry on

10min
pages 68-73

Women in cyber security from a recruiters perspective

4min
pages 52-53

Changing the ‘change’ journey

4min
pages 50-51

to cybersecurity

4min
pages 48-49

A real hard look

3min
pages 46-47

Scarlett McDermott

4min
pages 34-35

Jessica Williams

4min
pages 32-33

Cybercrime in 2022

1min
pages 14-15

Emily Goodman

3min
pages 30-31

Dina Atwell

4min
pages 24-27

Joyce Tiwari

2min
pages 18-19

Tara Murphy

2min
pages 28-29

Ranjeeta Rani

2min
pages 20-21

Annelies Moens

3min
pages 16-17

Sandy Assaf

3min
pages 22-23
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.