
{"id":3005,"date":"2015-01-19T00:00:00","date_gmt":"2015-01-19T00:00:00","guid":{"rendered":"http:\/\/otava.test\/maintaining-privacy-in-the-cloud-cultures-keeper\/"},"modified":"2015-01-19T00:00:00","modified_gmt":"2015-01-19T00:00:00","slug":"maintaining-privacy-in-the-cloud-cultures-keeper","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/","title":{"rendered":"Maintaining privacy in the cloud: culture&#8217;s keeper?"},"content":{"rendered":"<p><i>\u201cDear Diary,\u201d<a href=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-15887\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg\" alt=\"privacy_thumb\" width=\"254\" height=\"195\" \/><\/a><\/i><\/p>\n<p>These words carry two powerful implications:<\/p>\n<ol>\n<li>If I am the author, this information is personally valuable and private to me.<\/li>\n<li>If I am not the author and reading someone else\u2019s \u201cdear diary\u201d entry without being granted permission, I am violating a deeply personal boundary.<\/li>\n<\/ol>\n<p>With everything-as-a-service and the prevailing forecast calling for use of \u201cclouds everywhere\u201d to store and send all manner of sensitive data &#8211; personal, financial, or health related information &#8211; the internet of everything now harbors millions of \u201cdear diary\u201d entries. At odds are the increasing use of cloud services in corporations without IT department involvement &#8211; so called \u201cshadow IT\u201d &#8211; and the cries of consumers, companies, and countries that \u201csomething must be done\u201d to protect privacy. It\u2019s no wonder that the majority of executives and board members are worried about cloud privacy, according to a recent survey by the Cloud Security Alliance (CSA).<\/p>\n<p>Maintaining privacy is not a simple fix. As Forbes contributor Ben Kepes points out, <i>\u201cTechnology alone cannot fix this problem.\u201d<\/i><\/p>\n<p>Indeed. At its core, privacy comes down to my attitude of respect and discretion towards information that is deeply private and meaningful to you. In other words, a company\u2019s privacy record might be best predicted by culture, rather than by technology or even policy.<\/p>\n<p>Each participant along the cloud highway &#8211; from infrastructure to networks, storage arrays, cloud controllers, backup environments, and user facing interfaces &#8211; needs to incorporate privacy, and the security safeguards that protect it, as a non-negotiable part of design requirements. Even \u201cpublic clouds\u201d would do well to ensure that they can be \u201c<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">private clouds<\/a>\u201d.<\/p>\n<p>Accomplishing privacy in the cloud requires two things:<\/p>\n<ol>\n<li>setting aside the time and the money to consider and implement privacy safeguards at the start of new projects, and<\/li>\n<li>monitoring and reviewing privacy controls as a part of daily operations and finding ways to incentivize ongoing improvement.<\/li>\n<\/ol>\n<p>Neither of these points have a high take rate: they are complex, challenging, and require ongoing commitment. Worse, they threaten timelines, budgets, and short-term profits. But any informed cost comparison between taking these preventative measures to exercise the privacy muscle on a daily basis to avoid the long-term risks and costs associated with breaching private information suggests they are worth investing in.<\/p>\n<p>Let\u2019s look at some examples.<\/p>\n<p><strong>Policy without process or ongoing commitment to privacy<\/strong><\/p>\n<p>The FCC (Federal Communications Commission) announced last fall their plans to levy a $10M fine against two telecoms for storing personal information of over 300,00 of their customers, including social security and driver\u2019s license numbers, on public servers &#8211; accessible to anyone on the internet. Big mistake? Absolutely, but large fines typically mean more than an isolated process or technology error. In this case, two additional issues contributed to the action:<\/p>\n<ol>\n<li>The company stated in their privacy policy that they had \u201ctechnology and security features in place to safeguard the privacy of your customer specific information from unauthorized access or improper use.\u201d<\/li>\n<li>Even after the companies learned of the security breach, they failed to notify all affected consumers, jeopardizing their ability to take measure to safeguard their information.<\/li>\n<\/ol>\n<p><strong>Policy without technology or ongoing commitment to privacy<\/strong><\/p>\n<p>The action of the FTC (Federal Trade Commission) against Wyndham hotels has been brewing for a long time. The breach of personal and credit card information several years ago resulted in over $10M in fraudulent claims and countless headaches for their patrons.<\/p>\n<p>Those of you familiar know this case is not just a matter of missing firewalls, intrusion detection and prevention, encryption, and other basic security technologies. Nor about poor processes that delayed detection of intrusion by 4 months and also stood in the way of being able to physically locate the compromised servers after persistent failed login attempts were finally identified.<\/p>\n<p>The galling issue, and one of the core reasons that the FTC is involved is because of the blatant misrepresentation to consumers in their privacy policy that \u201ccommercially reasonable\u201d and \u201cindustry standard\u201d protections were in place to protect their information &#8211; with nothing of substance to back up the promise.<\/p>\n<p>While the Wyndham case is still churning in the courts, the FTC settled with ChoicePoint out of Atlanta for $10M in civil penalties and $5M for consumer redress when personal information including social security numbers was sold without adequate assurance that\u00a0the requesting customers had a legitimate right to receive\u00a0it.<\/p>\n<p><strong>Lack of commitment to privacy<\/strong><\/p>\n<p>In perhaps the clearest attribution of organizational culture to its impact on privacy, the Health and Human Services (HHS) Office of Civil Rights (OCR) levied a $275,000 fine against a medical center when 2 senior executives shared personally identifiable information about a patient throughout their organization with staff that had no clear need to know, as well as with members of the media.<\/p>\n<p>Then OCR director Leon Rodriguez stated: <i>\u201cSenior leadership helps define the culture of an organization and is responsible for knowing and complying with the HIPAA privacy and security requirements to ensure patients\u2019 rights are fully protected.<\/i>\u201d<\/p>\n<p>In addition the penalty, the resolution agreement calls for policy overhaul throughout the 16 medical centers and hospitals under the same ownership.<\/p>\n<p><strong>Your commitment to privacy<\/strong><\/p>\n<p>Whenever you see large fines associated with a data breach, recognize there is usually a bigger integrity issue &#8211; not just a technology, process, or policy flaw.<\/p>\n<p>So, how can you improve a culture of privacy in your organization?<\/p>\n<ul>\n<li>Equate all digital information without your organization with that \u201cdear diary\u201d entry. Even if you CAN read it, don\u2019t. Ever. Even if a customer requests it.<\/li>\n<li>Incentivize proactive reflection and communication about lax safeguards so that your experts on the front lines can earn kudos for surfacing weak links.<\/li>\n<li>Engage and encourage close partnership and ongoing dialog with experts like auditors and security consultants so that year over year, your organization becomes better at safeguarding information.<\/li>\n<li>Don\u2019t tolerate integrity transgressions\u00a0in your organization; deal with them strongly and promptly.<\/li>\n<\/ul>\n<p>How do you assess a culture of privacy in your partners and associates?<\/p>\n<ul>\n<li>Ask them to share documentation of risk assessment or safeguard controls, and read it.<\/li>\n<li>Experience it yourself; nothing beats an onsite visit.<\/li>\n<li>Humans come equipped with a good gut sense about integrity. Trust it.<\/li>\n<\/ul>\n<p>Perhaps humorist David Sedaris said\u00a0it best: <i>\u201cIf you read someone else\u2019s diary, you get what you deserve.\u201d<\/i><\/p>\n<p>Related information and references:<\/p>\n<p><a href=\"https:\/\/www.onlinetech.com\/company\/events\/webinar-is-the-ftc-coming-after-your-company-next-court-confirms-that-the-ftc-has-authority-to-punish-companies-for-poor-cyber-security-practices\">WEBINAR: Is the FTC Coming After Your Company Next? Court Confirms that the FTC Has Authority to Punish Companies for Poor Cyber Security Practices<\/a><\/p>\n<p><a href=\"https:\/\/www.fcc.gov\/document\/fcc-plans-10m-fine-carriers-breached-consumer-privacy\">FCC plans $10M fine for carriers that breached consumer privacy<\/a><\/p>\n<p><a href=\"https:\/\/www.skyhighnetworks.com\/wp-content\/uploads\/2015\/01\/CSA-Cloud-Adoption-Survey-0115a.pdf\">https:\/\/www.skyhighnetworks.com\/wp-content\/uploads\/2015\/01\/CSA-Cloud-Adoption-Survey-0115a.pdf<\/a><\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/benkepes\/2015\/01\/09\/you-dont-say-in-the-face-of-massive-security-breaches-execs-are-concerned\/\">https:\/\/www.forbes.com\/sites\/benkepes\/2015\/01\/09\/you-dont-say-in-the-face-of-massive-security-breaches-execs-are-concerned\/<\/a><\/p>\n<p><a href=\"https:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/enforcement\/examples\/shasta-agreement.pdf\">https:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/enforcement\/examples\/shasta-agreement.pdf<\/a><\/p>\n<p><a href=\"https:\/\/barclayagency.com\/sedaris.html\">https:\/\/barclayagency.com\/sedaris.html<\/a><\/p>\n<p><a href=\"https:\/\/www.ftc.gov\/enforcement\/cases-proceedings\/052-3069\/choicepoint-inc\">https:\/\/www.ftc.gov\/enforcement\/cases-proceedings\/052-3069\/choicepoint-inc<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cDear Diary,\u201d These words carry two powerful implications: If I am the author, this information is personally valuable and private to me. If I am not the author and reading someone else\u2019s \u201cdear diary\u201d entry without being granted permission, I am violating a deeply personal boundary. With everything-as-a-service and the prevailing forecast calling for use of \u201cclouds everywhere\u201d to store and send all manner of sensitive data &#8211; personal, financial, or health related information &#8211; the internet of everything now harbors millions of \u201cdear diary\u201d entries. At odds are the increasing use of cloud services in corporations without IT department involvement &#8211; so called \u201cshadow IT\u201d &#8211; and the cries of consumers, companies, and countries that \u201csomething must be done\u201d to protect privacy. It\u2019s no wonder that the majority of executives and board members are worried about cloud privacy, according to a recent survey by the Cloud Security Alliance (CSA). Maintaining privacy is not a simple fix. As Forbes contributor Ben Kepes points out, \u201cTechnology alone cannot fix this problem.\u201d Indeed. At its core, privacy comes down to my attitude of respect and discretion towards information that is deeply private and meaningful to you. In other words, a company\u2019s privacy&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-3005","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Maintaining privacy in the cloud: culture&#039;s keeper? | OTAVA<\/title>\n<meta name=\"description\" content=\"With everything-as-a-service and the prevailing use of cloud, what does that mean for data security and privacy for organizations?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Maintaining privacy in the cloud: culture&#039;s keeper?\" \/>\n<meta property=\"og:description\" content=\"With everything-as-a-service and the prevailing use of cloud, what does that mean for data security and privacy for organizations?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-19T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Maintaining privacy in the cloud: culture&#8217;s keeper?\",\"datePublished\":\"2015-01-19T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/\"},\"wordCount\":1140,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/\",\"url\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/\",\"name\":\"Maintaining privacy in the cloud: culture's keeper? | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg\",\"datePublished\":\"2015-01-19T00:00:00+00:00\",\"description\":\"With everything-as-a-service and the prevailing use of cloud, what does that mean for data security and privacy for organizations?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Maintaining privacy in the cloud: culture&#8217;s keeper?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Maintaining privacy in the cloud: culture's keeper? | OTAVA","description":"With everything-as-a-service and the prevailing use of cloud, what does that mean for data security and privacy for organizations?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/","og_locale":"en_US","og_type":"article","og_title":"Maintaining privacy in the cloud: culture's keeper?","og_description":"With everything-as-a-service and the prevailing use of cloud, what does that mean for data security and privacy for organizations?","og_url":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/","og_site_name":"OTAVA","article_published_time":"2015-01-19T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Maintaining privacy in the cloud: culture&#8217;s keeper?","datePublished":"2015-01-19T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/"},"wordCount":1140,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/","url":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/","name":"Maintaining privacy in the cloud: culture's keeper? | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg","datePublished":"2015-01-19T00:00:00+00:00","description":"With everything-as-a-service and the prevailing use of cloud, what does that mean for data security and privacy for organizations?","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/privacy_thumb.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/maintaining-privacy-in-the-cloud-cultures-keeper\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Maintaining privacy in the cloud: culture&#8217;s keeper?"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=3005"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3005\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=3005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=3005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=3005"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=3005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}