Gartner: Reduce Privacy Risks When Using 5G Products and Services
Analysts: Bernard Woo

How can you safeguard your data on a 5G network?

 

From private networks to edge computing, 5G enables data to be processed at faster speeds and an exponentially larger scale. As a result, there is a higher risk that privacy can be compromised.

While security and risk management leaders cannot anticipate upcoming 5G products and services, it is important to take an active approach by implementing stringent measures to minimise privacy risks.  

 

Impacts highlighted in Gartner report:

  • “Offerings over 5G will generate and collect greater volumes, varieties and velocities of personal.”
  • “5G technology will enable the proliferation of interconnected devices, which will lead to an expanded attack surface bearing the risk of exposing personal data to harm.”
  • “Stakeholders will scrutinize and demand that the processing of personal data at 5G’s increased speed and scale is performed in line with clear and rigid standards.”

 

Recommendations by Gartner to reduce technology, information and resilience risk, security and risk management leaders:

  • “Enforce privacy risk treatment by requiring the completion of data protection/privacy impact assessments (DPIAs/PIAs) for projects involving personal data.”
  • “Limit the risk of attacks by driving the choice of service providers that implement protective measures at network (e.g., 5G core slicing) and device (e.g., pseudonymization) levels.”
  • “Enable transparency by building a privacy portal that explains how personal data is used, while giving individuals the ability to manage their consent and preferences.”

 

 

Gartner, Reduce Privacy Risks When Using 5G Products and Services, 16 July 2019,  Bernard Woo

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

To continue reading, please fill in the form to have the report emailed to you.

Last name is required.
Company name is required.
Email address is required.
Please confirm.
Digitisation vs Digitalisation

Harness the full power of smart devices for profit and productivity.

Read more
ICT Enterprise Insights in Digital Transformation

The top findings for enterprises digital transformation efforts.

Read more
Cyber Threat Intelligence: An Essential Solution for Proactive Security

This IDC Technology Spotlight examines organisations’ need for cyber threat intelligence, as cyber attacks have become increasingly sophisticated. 

Read more