Contact tracing apps are designed to help public health agencies connect the dots by linking confirmed carriers of novel coronavirus to recent, close-proximity interactions. In theory, this creates a protective safety net — a way for countries to manage the spread and mitigate the impact of COVID-19 at scale.

Despite good intentions, the push for third-party pairings produces a more pressing problem: privacy. In a June 2020 article about contact tracing apps, Forbes notes that failing confidence in app security could significantly reduce user adoption and limit the efficacy of this approach. Already, Norway has been ordered to shutter its contact tracing program and stop all data collection unless its government can demonstrate measurable benefits that balance privacy concerns.

Deployment speed is also a challenge. According to news website TechHQ, public health agencies looking to roll out centralized solutions need time to build out sufficient data collection, storage and analysis infrastructure. However, decentralized options — led by an unprecedented partnership between Google and Apple — offer a workaround by providing the information technology (IT) backbone health organizations need to get tracing efforts off the ground. As enterprises reopen offices and put employees back in the field, there’s a case to be made for in-house app development to support workforce health and boost application uptake.

But data protection issues don’t vanish just because organizations build apps in their own backyard. Here’s a break down of the top five challenges enterprises should overcome to deliver on the potential of prescriptive privacy.

The Contact Conundrum

Contact tracing applications are designed to collect COVID-19 testing data (inputted by a user) and user location history to form a network of potentially infected user connections. It then notifies the connections via a mobile device when one user has been infected to help stop the spread. But just like governments and tech giants, enterprises tackling their own tracing technology must address key challenges.

  • Authority: The National Institute of Standards and Technology (NIST) Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations cites that agencies must establish and document legal authority that “permits the collection, use, maintenance and sharing of personally identifiable information (PII).” They must also clearly define the purpose of their application.

    The same applies to enterprises designing and deploying contact tracing apps. The current public health crisis may offer solid ground for initial authority. But, it still is essential to define the scope of collected data and describe its intended purpose to ensure employees provide informed consent. 

  • Anonymity: Time, location and testing status are critical for contact tracing apps to function. But, protecting user privacy requires the de-identification of data. However, common anonymization techniques, such as adding noise and dataset sampling aren’t always effective. Emerging artificial intelligence (AI) and machine learning (ML) tools can help reduce the risk of accidental identity exposure. 
  • Access: If threat actors can gain access to critical data, they could deliberately force the quarantine of entire departments by sending out false alerts. In turn, this can cause profit loss for enterprises and potential stress for staff. To enhance app security, businesses must deploy intelligent defenses, such as WAF and RASP tools, capable of detecting and deflecting potential issues on-demand. 
  • Accuracy: NIST standards also identify data quality and integrity as critical components of any application that involves PII. Quality starts with accuracy. Enterprise contact tracing applications must include the capability to collect personal data directly from staff, rather than electronic intermediaries. Meanwhile, integrity relies on the ability of applications to regularly check the reliability of current data and request new information as required.
  • Accountability: The foundation of successful contact tracing applications is consent. Here, accountability is key. Users must be fully informed before opting-in. Users must also be permitted to opt-out on demand. Enterprises should develop policies and procedures that facilitate the swift removal of current and historic user data to ensure regulatory compliance. This is especially critical as regulatory legislation evolves. Under the European Union’s GDPR, for example, organizations have one month to remove requested data or face potential fines.

The Prescriptive Potential

Integrated IT resources available to enterprises offer the ideal constructive framework for contact tracing apps. Staff can benefit from the speed and specificity of connective, prescriptive protection. But, the shift to community-focused computing also presents new privacy challenges. Success in the “new normal” may require a dual approach to security. Companies should think about combining soft skills in cybersecurity with hard lines on data protection to deliver solutions capable of balancing public good against personal privacy.

More from Application Security

Gozi strikes again, targeting banks, cryptocurrency and more

3 min read - In the world of cybercrime, malware plays a prominent role. One such malware, Gozi, emerged in 2006 as Gozi CRM, also known as CRM or Papras. Initially offered as a crime-as-a-service (CaaS) platform called 76Service, Gozi quickly gained notoriety for its advanced capabilities. Over time, Gozi underwent a significant transformation and became associated with other malware strains, such as Ursnif (Snifula) and Vawtrak/Neverquest. Now, in a recent campaign, Gozi has set its sights on banks, financial services and cryptocurrency platforms,…

Vulnerability management, its impact and threat modeling methodologies

7 min read - Vulnerability management is a security practice designed to avoid events that could potentially harm an organization. It is a regular ongoing process that identifies, assesses, and manages vulnerabilities across all the components of an IT ecosystem. Cybersecurity is one of the major priorities many organizations struggle to stay on top of. There is a huge increase in the number of cyberattacks carried out by cybercriminals to steal valuable information from businesses. Hence to encounter these attacks, organizations are now focusing…

X-Force releases detection & response framework for managed file transfer software

5 min read - How AI can help defenders scale detection guidance for enterprise software tools If we look back at mass exploitation events that shook the security industry like Log4j, Atlassian, and Microsoft Exchange when these solutions were actively being exploited by attackers, the exploits may have been associated with a different CVE, but the detection and response guidance being released by the various security vendors had many similarities (e.g., Log4shell vs. Log4j2 vs. MOVEit vs. Spring4Shell vs. Microsoft Exchange vs. ProxyShell vs.…

Unmasking hypnotized AI: The hidden risks of large language models

11 min read - The emergence of Large Language Models (LLMs) is redefining how cybersecurity teams and cybercriminals operate. As security teams leverage the capabilities of generative AI to bring more simplicity and speed into their operations, it's important we recognize that cybercriminals are seeking the same benefits. LLMs are a new type of attack surface poised to make certain types of attacks easier, more cost-effective, and even more persistent. In a bid to explore security risks posed by these innovations, we attempted to…