Do you know where your data is ?

Do you know where your data is ?

by Michael Queralt

Complex and obscure data supply chains are making it difficult for users to understand where their data is captured, transacted and exposed.

A clear example is generated by a simple test — I went to the website to check if any of my email accounts have been breached

The website is a large repository of all of the email accounts that have been breached. Great work and effort by Troy Hunt —

Discovering that the email and password have been compromised was not a surprise; The database contains information on over 7.5B accounts that have been compromised representing 347 websites.

The surprise was to see the services that exposed the information. They are not the usual suspects, like; Home Depot, Marriott, Equifax, Blue Cross or others… they are unrecognizable organizations that have gain access — either by direct business relationships, affiliation, aggregation or other methods to my account and profile information and due to a breach, that information has now been compromised.

The image below shows the three organizations that compromised the data and it also describes the information that they exposed.


The are many issues, but one of the key ones is the lack of transparency on the user terms and conditions agreements — which in many cases it enables organizations to use (or sell) data with affiliates, third party vendors and many other organizations to use the data for other services without them “bearing any responsibility” on how its used.

ACBJ.COM privacy & security policy


The second issue is the aggregation of data; how organizations are leveraging basic account information and then aggregate data from multiple sources to enhance the data set, increase its value under the premise of improved performance;

jpmorgan privacy & security policy


Transacting with personal information is nothing new — the difference is the digitalization of the ecosystem — which creates rapid technology rails for such aggregation and consolidation — and the lack of strong security postures that have enabled that billions or data records and information is available in the web.

The impact of of such flow of information is felt by organizations and individuals by the rise of sophisticated phishing attacks driven by know information and behavior, or by increased identity theft due to the creation of false profiles and accounts, or spam and other methods.

But the greatest threat; is when such compromised data reenters the supply chain, and is used by individuals or organizations to make decisions.

Only then will individuals understand the impact of the data breaches, as the issue will move from just being a nuisance to change passwords due to a breach, to the real life impact that data driven decisions will have on individuals trying to gain access to services or other products — limiting access to innovation and services.

About the author

As an entrepreneur with over 30 years of experience, Michael bridges the gap between product, technology and business objectives. His extensive experience with start ups, B2B sales management, product development, funding and early customer adoption, provides a unique view for any organization that is looking to design innovation and achieve new revenue objectives with scalable processes. Following the principles of a customer centric –  product, market, fit approach, he has enabled numerous organizations define their revenue strategies, adopt innovation and define sales and operations to drive top line revenues. His technology focus is on identities, authentication, privacy and contextual decisions, where he has worked with organizations like the Department of Homeland Security Science and Technology, FIDO Alliance, DC Government, John Hopkins Applied Physics Laboratory and others. His business expertise is on consultative sales, understanding end user requirements and sales processes, which have been defined by working with organizations like Queralt, Xerox, Vanstar, Compucom and many of their corporate customers.

Michael’s LinkedIn profile:

The article was originally published at:


March 25, 2019
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013