Data can’t be breached if it doesn’t exist
Find out if Integrity Advocate is right for you
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Get a Free Demo

Data can’t be breached if it doesn’t exist

Data can’t be breached if it doesn’t exist

November 15, 2020

Tag Icon

The hacking, sale, and distribution of private data has in recent years become a major concern to educational institutions, students, and private organizations alike.  

There are legitimate reasons to be concerned. Without naming the organizations involved (you can Google it if you’re interested), a recent data leak from a large proctoring service provider affected hundreds of thousands of students. In this case, as in many others, the service provider was reported as not aware that the data they held was compromised and being sold until the hacker made this fact public.

We used the words “data they held” rather than “their data” in this context because the compromised data was never theirs to begin with. Sure, their reputation was affected by the leak… but the effect on the individuals (ie, students) is far worse: an irreversible risk of identity theft and privacy loss.

In the reported hack above, the data that was compromised and made public went back approximately 10 years. Why was this data needed years after the user interaction had ended? Here is something to consider: It is widely known that data amassed can increase a tech company’s financial evaluation. The elimination of personal data is also an extra effort that the organization is often not compensated for... which in most cases lowers their priority to do so.

Organizations like the proctoring service provider referenced above promise data security, talk serious encryption, and flaunt security certificates, designations, and privacy policies. That’s all fine, but in reality, the only true method of protecting your personal data is to destroy or anonymize it as soon as it is no longer required.

Data encryption is not enough.

For this reason, Integrity Advocate embraces Privacy by Design architecture  in our remote proctoring solution to remove user privacy risk. We use Time To Live (TTL) technology that automatically eliminates a learner’s personal data as soon as it is no longer needed. In fact, all photo ID and violation-free media is deleted within 24 hours. Data can’t be breached if it doesn’t exist. 

Contact our team today to learn more about how our best-in-class privacy standards protect learners.