What Everyone Should Know about Privacy, Security and Confidentiality

What Everyone Should Know about Privacy, Security and Confidentiality

When conducting a review of how a service provider will handle personal information for this or that process, the subject inevitably turns to the protection of the personal information involved. Often it is said that everything should be fine; the vendor passed the security review and the confidentiality clause is airtight. While these things are good and important and are positive statements about information protection, management, and recourse in the event it is needed; they are not answers as to how the personal information will be protected; i.e.; how privacy will be managed. 

The reason for this is the goals and requirement of privacy are not entirely the same as those of information security or those of confidentiality. As such, it is important not to confuse one for the other. In fact, doing so may create risk rather than mitigate it.

So, how is data privacy different from information security and from confidentiality? How are they alike? How they are alike is easy to answer. They are all forms of information protection. Beyond that it is easier to understand how they overlap by understanding how they are different.

Let’s start with definitions. 

Privacy is the fair and authorized processing and access of personal information. Note there are many definitions of privacy.  This is an operational definition.

What Everyone Should Know about Privacy Security and Confidentiality

Personal information is any information that can be used to identify or contact an individual or be reasonably linked to a specific individual, device or computer.

Processing is any action or inaction that can be performed in relation to that data or dataset. Processing personal information includes, but is not limited to, collection, storage, use, sharing, organization, display, recording, alignment, combination, disclosure by transmission, copying, consultation, erasure, destruction, and alteration of personally identifiable information and any data related to it.

Fair and authorized includes notions of the ideas embodied in the Fair Information Practice Principles or the OECD Privacy Guidelines such as collection limitation, data quality, purpose specification, use limitation, security safeguards, openness, accountability, and individual participation.

Information Security is that the use of logical, technical, administrative, physical safeguards to ensure the confidentiality, integrity, and availability of the data is maintained.

Confidentiality is preventing authorized access to non-public information that two or more parties have agreed to restrict.

The Overlaps

What Everyone Should Know about Privacy Security and Confidentiality

Information Security safeguards ensure the “authorized” in the “authorized access and use” that is a cornerstone the operational definition of privacy. This is why one cannot have privacy without security. Note, though one can have security without privacy (which is one of the major disconnects) where personal information is not involved.

Three other areas of overlap between privacy and information security:

  • Integrity (Information Security) and Accuracy (Privacy)
    • Information security’s integrity requirement overlaps with privacy’s accuracy requirement in that both target ensuring that the data are not altered without both authentication and authorization
  • Availability (Information Security) and Access (Privacy)
    • Information security’s availability requirement supports privacy’s access requirement because if the data is not available, it cannot be accessed
  • Accountability (both)
    • Both information security and privacy doctrines require data owners and custodians to be responsible for protecting the data in accordance with the respective protection regimen, which is a form of accountability

    What Everyone Should Know about Privacy Security and Confidentiality

    Confidentiality overlaps when the information being identified as “confidential” is both personal information and nonpublic because nonpublic data need to be kept nonpublic.

    Unfortunately, confidentiality does not help much if the data in question is “public.”

    The Disconnects

    First let’s look at the disconnects between Privacy and Information Security. The reason there is not a complete overlap between privacy and information security is threefold.

    First, privacy has a wider set of obligations and responsibilities than information security does, such as:

    • Collection limitation – simply put, there are limits to how data can acceptably be collected; that the collection must be fair and lawful and, where possible, with the individuals consent.
    • Openness – This means there should be transparency about an organization’s processing of personal information.
    • Relevancy – The data collected should be proportional and appropriate for the purpose of the processing.
    • Use limitation – the personal information should not be used for purposes other than those specified when the data was collected without additional permission.

    This means there are things privacy addresses that information security does not.

    The second disconnect is confidentiality. Because personal information (PI) is not always nonpublic (consider the phonebook), the notion of confidentiality does not apply. Also, in a resource-constrained world, if the data are not considered confidential, they are not always “valued” and the necessary measures to ensure authorized access and use will be overlooked.

    Third, and perhaps most important, while information security techniques can be privacy-enabling technologies (PETs) (which means they are tools that enable privacy) and are often necessary, these PETs can also become “feral” if applied incorrectly (i.e. in an invasive manner). As mentioned above, this is why one can have security without privacy, but one cannot have privacy without security.

    As for confidentiality, as mentioned above, confidentiality rules only apply to what is designated by agreement as confidential. This is the first difference between confidentiality and privacy. Confidential is an imposed label that signifies access control. PI is an organic label; it speaks to the substance of the information. Just as with that famous line in Shakespeare’s immortal play Romeo and Juliet “A rose by any other name would smell as sweet,” so it goes with PI. It’s always going to be personal information when it identifies an individual.

    Sometimes confidential information is also personal information. This is when the concepts overlap. Other times, for instance when the information is publically available, the notions of confidentiality miss the mark. Whereas public information – even public personal information -- is free of confidentiality requirements, it is not free of privacy requirements. One example of this is e-marketing lists. Many of our e-mail address are publically available, but that does not mean they can be wantonly maintained on e-marketing lists without our permission.

    So What Does This Mean?

    First and foremost, it is important to understand the difference between information security, confidentiality, and privacy. It is at one’s (or one’s organization’s) peril to substitute one for the other. It means that there is a rich tool set with which to protect information (including personal information), but that it is important for all practitioners of data protection – IP attorneys, Information Security Specialist, and Privacy Professionals – need to be mindful of the data in question and insure the proper protection paradigm is applied.

About the Authors

Michelle Dennedy is the VP and CPO at McAfee.

Jonathan Fox is the director of data privacy at McAfee.

Thomas Finneran is a principal consultant for the IDennedy.

Featured

  • Security Today Announces The Govies Government Security Award Winners for 2025

    Security Today is pleased to announce the 2025 winners in The Govies Government Security Awards. The awards honor outstanding government security products in a variety of categories. Read Now

  • Survey: 60 Percent of Organizations Using AI in IT Infrastructure

    Netwrix, a cybersecurity provider focused on data and identity threats, today announced the release of its annual global 2025 Cybersecurity Trends Report based on a global survey of 2,150 IT and security professionals from 121 countries. It reveals that 60% of organizations are already using artificial intelligence (AI) in their IT infrastructure and 30% are considering implementing AI. Read Now

  • New Research Reveals Global Video Surveillance Industry Perspectives on AI

    Axis Communications, the global industry leader in video surveillance, has released its latest research report, ‘The State of AI in Video Surveillance,’ which explores global industry perspectives on the use of AI in the security industry and beyond. The report reveals current attitudes on AI technologies thanks to in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners, and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist with regard to security, safety, business intelligence, and operational efficiency. Read Now

  • SIA Urges Tariff Relief for Security Industry Products

    Today, the Security Industry Association has sent a letter to U.S. Trade Representative Jamieson Greer and U.S. Secretary of Commerce Howard Lutnick requesting relief from tariffs for security industry products and asking that the Trump administration formulate a process that allows companies to apply for product-specific exemptions. The security industry is an important segment of the U.S. economy, contributing over $430 billion in total economic impact and supporting over 2.1 million jobs. Read Now

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.