Browse Definitions :
Definition

data shadow

Contributor(s): Matthew Haughn

A data shadow is the collective body of data that is automatically generated and recorded as we go about our lives rather than intentionally created. Sources include sensors and IP surveillance, metadata from communciations and security and authentication mechanisms, among other possibilities. Shadow, in this context, means to follow: Our data shadow follows us.

Surveillance-related data is a particular driver for storage capacity requirements. This data is often recorded and stored long-term, providing a persistent record of activities online and in the physical world. The data presents a privacy concern for individuals and a burden on IT shoulders as it pushes storage demands and potentially exposes sensitive data.

Individuals are recorded on higher resolution video for significant portions of their days in many places. The number of these data files and their size are expected to increase as the number of devices, their resolution and other data detail increases. This massive volume of data calls for consideration into privacy policies, data ownership, retention and disposal. Administrators that are not adequately aware of the problem or keeping up on policy stand to be found responsible for leaks, should data be retained that should have been disposed of or, alternately, responsible for compliance failure should data be found missing that should have been saved.

This was last updated in July 2016

Continue Reading About data shadow

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close