{"id":8299,"date":"2018-04-27T04:33:03","date_gmt":"2018-04-27T11:33:03","guid":{"rendered":"https:\/\/routeware.com\/blog\/recollect-culture-security\/"},"modified":"2025-05-06T12:43:47","modified_gmt":"2025-05-06T19:43:47","slug":"recollect-culture-security","status":"publish","type":"post","link":"https:\/\/routeware.com\/en_gb\/blog\/recollect-culture-security\/","title":{"rendered":"ReCollect &#8211; A Culture of Security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In recent weeks, privacy and data have been at the forefront of the news. The first instance involved <\/span><a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2018\/04\/11\/zuckerberg-facebook-hearing-congress-house-testimony\/?noredirect=on&amp;utm_term=.ea18af95c461\" rel=\"noopener\"><span style=\"font-weight: 400;\">a wave of headlines<\/span><\/a><span style=\"font-weight: 400;\"> about how social media platforms managed (or sometimes mismanaged) users\u2019 data. More recently, your inbox has likely been flooded by technology companies updating user agreements to ensure they conform with the EU\u2019s new General Data Protection Regulation (GDPR). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since arriving at ReCollect in 2014, I\u2019ve seen a dramatic shift in the conversation around data and privacy among our customers and users. It was sometimes a struggle to get organizations to understand why privacy and data security matter so much \u2013 even to a solid waste department \u2013 and why security and privacy are core to our company\u2019s culture. And getting it right often easily went unnoticed. In those early days, customers loved our products\u2019 convenience, ease of use, and ability to help them educate and communicate with their residents. Today, they still love these benefits, but thankfully they also value our regular security audits, our privacy rules, our security culture, and how some employees contribute to organizations like the <\/span><a href=\"https:\/\/www.eff.org\/\" rel=\"noopener\"><span style=\"font-weight: 400;\">Electronic Frontier Foundation<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">As both a user of online government services and an employee, I\u2019m grateful to see the growing recognition among governments of data privacy and security. Data is a resource whose value has been heralded for some time. Here at ReCollect, the data we collect about usage and queries helps our customers better understand their residents, answer questions more effectively, increase diversion, and generally be more proactive. But, as with any resource, data itself can be recycled or repurposed for ends other than those for which it is initially collected. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even with the best of intentions, any system attempting to keep data private and secure is only as good as the technology and practices that support it. Unfortunately, as we have <\/span><a href=\"https:\/\/winnipeg.ctvnews.ca\/apps-used-to-track-garbage-and-recycling-days-affected-by-data-breach-1.3890331\" rel=\"noopener\"><span style=\"font-weight: 400;\">recently seen<\/span><\/a><span style=\"font-weight: 400;\">, a lack of secure practices can easily <\/span><a href=\"https:\/\/communityimpact.com\/austin\/new-braunfels\/city-county\/2018\/04\/19\/officials-say-email-addresses-may-have-been-obtained-through-city-app-breach\/\" rel=\"noopener\"><span style=\"font-weight: 400;\">undermine privacy<\/span><\/a><span style=\"font-weight: 400;\">. The consequence goes beyond more spam in everyone\u2019s inbox or the potential for fraud in the short term \u2014 the longer term consequence is that these events impair trust not only in a specific vendor or industry (including us), but also in the governments that provision these services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At ReCollect, we believe the collection of any data should serve a single purpose \u2014 the delivery and improvement of the service for which it was provided. To do otherwise, intentionally or not, would be to undermine the trust that customers place in us to provide a framework of communications for them.<\/span><\/p>\n<h3><b>Data Cannot Be Private Unless it is Secure<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Vendors of Software-as-a-Service everywhere and in every sector should now be routinely facing some potentially tough questions, such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Have they ever suffered a data breach?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What data is collected?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is the policy on data retention?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Who owns it? And what happens to the data after the service is discontinued?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Where and how is it stored and conveyed?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How often and how extensively are services audited for security?<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Buyers of these services need to ask themselves what their operational costs of a data breach are, even if they are not responsible for it. Furthermore, what is the potential impact to the end user and the reputation of the buyer?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Building a culture of security, in which secure practices are intentionally designed and followed, has real costs \u2014 but data breaches, the alternative, cannot be considered a cost of doing business. Governments at all levels must take ownership of communications provided on their behalf if they are to fully realize and promote technology\u2019s huge benefits. At ReCollect, we ensure that our systems always use the latest in secure protocols, enforce secure practices whenever possible, and proactively commission periodic security audits run by independent third parties. Consequently, we have never had a data breach \u2014 that much we owe to our customers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Interested in learning more about security at ReCollect? <\/span><a href=\"https:\/\/recollect.net\/security\/\" rel=\"noopener\"><span style=\"font-weight: 400;\">Click here.<\/span><\/a><span style=\"font-weight: 400;\"> Have a question? We\u2019d love to <\/span><a href=\"mailto:sales@recollect.net\"><span style=\"font-weight: 400;\">hear from you<\/span><\/a><span style=\"font-weight: 400;\">!<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>In recent weeks, privacy and data have been at the forefront of the news. The first instance involved a wave of headlines about how social media platforms managed (or sometimes mismanaged) users\u2019 data. More recently, your inbox has likely been flooded by technology companies updating user agreements to ensure they conform with the EU\u2019s new [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3513,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-8299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","resourcetype-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/routeware.com\/en_gb\/wp-json\/wp\/v2\/posts\/8299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/routeware.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/routeware.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/routeware.com\/en_gb\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/routeware.com\/en_gb\/wp-json\/wp\/v2\/comments?post=8299"}],"version-history":[{"count":0,"href":"https:\/\/routeware.com\/en_gb\/wp-json\/wp\/v2\/posts\/8299\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/routeware.com\/en_gb\/wp-json\/wp\/v2\/media\/3513"}],"wp:attachment":[{"href":"https:\/\/routeware.com\/en_gb\/wp-json\/wp\/v2\/media?parent=8299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}