The onus for data privacy preservation has shifted partially toward businesses, but this doesn’t decrease the control of individuals. On the contrary, individuals have greater control of how their information is used, mostly because businesses are accountable for how they store, share, and use data.
Regulations like GDPR, CCPA, and LGPD are forcing businesses to absorb increased responsibility for data security. Along with the changing digital identity landscape, such regulations are the leading driver of privacy-enhancing technology adoption. 60% of large enterprises will be leveraging one or more privacy-enhancing technologies (PETs) by 2025.
While regulations and institutional pressure accelerate adoption of privacy-enhancing technologies, other forces delay deployment. Specifically, implementation costs create financial roadblocks. Our reporting on privacy-enhancing technologies outlines how data privacy strategies and notable PET providers help businesses reconcile costs and risks.
Privacy-enhancing technologies protect data by minimizing personal data use and sharing. The data becomes more secure while individuals gain visibility into (and control over) how their information is consumed.
PETs fall into two categories:
Soft and hard PETs all aim to increase data security and privacy. EU data protection authorities have levied $1.2 billion in fines over breaches of GDPR since January 2021. Privacy-enhancing technologies are designed to prevent such penalties for regulatory non-compliance, though there’s still a long way to go to address new risks.
Individuals are increasingly exposed to fraud, data breaches, and misuses of their personal data. Cellular technologies, devices, and networks that service over five billion mobile subscribers across the world also unlock new data streams that provide us with digital identities as unique as a fingerprint. Smartphones have become accurate identifiers of individuals, creating even more opportunities for data misuse. Public awareness of high-profile privacy failures is combined with regulators' powers and willingness to use them - both of these are keeping privacy in the mind of the public.
Regulators pass regulation to mandate data privacy, robust cybersecurity, and protection of children. In turn, strict regulations force businesses to re-evaluate their data management practices. Privacy concerns are especially high in some industries, and investing in PETs is much less costly than the impact of even one data privacy event, which can damage brand equity and spur financial penalties.
Few business leaders deny the importance of data privacy; however, there are competing priorities. Limited capabilities and resources prevent some businesses from adopting PETs in a timely manner. It’s especially difficult to find cost-effective techniques to meet all privacy requirements.
There are many solution providers to meet current market demand, but few do it sufficiently. Most PETs offer similar capabilities and use case coverage. Major players include first-movers with established reputations as well as well-funded newcomers. Some of these vendors are pulling ahead of the pack by eliminating burdensome implementation costs and offering compliance support with reduced technical complexity.
Effective adoption of PETs involves selecting techniques to satisfy specific use cases. Businesses that choose appropriate methods and providers receive the benefits they need without unnecessary costs. Our member-exclusive reporting on privacy-enhancing technologies maps data protection needs to specific providers.
The global data privacy software market size is expected to reach $17.8 billion by 2028. The market landscape will continue to change along with the state of consumer identity and privacy. For now, vendors typically operate on a tiered subscription basis based on factors such as number of licenses, platform utilization, and data volume.
Common data privacy and security methods include the following:
As service providers contribute more to online privacy, businesses realize previously aspirational privacy goals. Access member-exclusive reporting for more detailed descriptions of these five data privacy techniques and the challenges they address.
There are dozens of notable companies in the privacy market. Each has its own focus area, ranging from homomorphic encryption to data de-identification. Some specialize in providing encrypted data access for specific industries like fintech and healthcare.
Unfortunately, many of the most notable players in the PET market struggle to demonstrate tangible impact. Because data protection is difficult to demonstrate, some business leaders see little reason to tolerate costly and technically difficult implementations. For privacy-enhancing technologies to become fully mainstream, vendors must demonstrate how they can avoid the consequences of maintaining the status quo, reduce regulatory and legal risk, and create meaningful privacy interactions for consumers.
Businesses can’t afford not to invest in privacy-enhancing technology, but can’t afford to spend frivolously. The best PET provider for protected data analysis might not be the best option for privacy compliance or data localization. It takes some knowledge of the data privacy landscape to make an informed selection.
To learn more about all of the key players, contact Liminal for a full report on the PET market.