{"id":37526,"date":"2020-04-27T17:14:42","date_gmt":"2020-04-27T21:14:42","guid":{"rendered":"http:\/\/www.andysowards.com\/blog\/?p=37526"},"modified":"2023-04-11T18:51:15","modified_gmt":"2023-04-11T22:51:15","slug":"solving-data-accessibility-data-protection-conundrum","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/","title":{"rendered":"Solving The Data Accessibility &#038; Data Protection Conundrum"},"content":{"rendered":"<p>Data is at the heart of one of the biggest dilemmas of the modern age in I.T. On the one hand, your data are detrimental to your decision-making processes. Without data, you lack information on what is going on, both in your business and in the market. And without reliable information, your business decisions may not meet your target. Besides, data are also chunks of information that you share with your audience. Potential customers may refer to visible data about your company to gain an overview of your prices, services, delivery policies, or even location. When you think of data as pieces of content designed to address your audience\u2019s queries, it becomes indispensable to promote maximum accessibility.<\/p>\n<p>But, on the other hand, your data can make your business and your customers vulnerable if they land in the wrong hands. Hackers have made it their mission to breach data security measures and access confidential information that can be used for profit. While payment data are a popular target for hackers, many have developed complex strategies to reach the sensitive core of organizations. From there, they can not only read payment data, but also steal customers\u2019 identities, detract business processes, and freeze server activities for crypto-mining purposes.<\/p>\n<p>There it transpires that data need to establish a healthy balance between accessibility and protection. Defining where data accessibility starts and where it ends without putting data protection at risk requires a strict digital strategy.<\/p>\n<h3>What does it mean to promote data accessibility?<\/h3>\n<p><a href=\"https:\/\/www.andysowards.com\/blog\/2020\/essential-5-tips-enhancing-data-visualization-website\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-large wp-image-37528 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-6-1024x680.jpeg\" alt=\"Solving The Data Accessibility &amp; Data Protection Conundrum 6\" width=\"1024\" height=\"680\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-6.jpeg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-6-768x510.jpeg 768w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/680;\" \/><\/a><br \/>\n<em>Essential 5 Tips For Enhancing Data Visualization On Your Website<\/em><\/p>\n<p>At the heart of the data conundrum, you need to define precisely the level of data accessibility you require. Indeed, data accessibility refers to the way you deliver your content, both for business actors and customers.<\/p>\n<h3>Making your content digestible<\/h3>\n<p><a href=\"http:\/\/infinigeek.com\/let-infographics-lead-your-content-strategy\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-37534 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-9.jpg\" alt=\"Solving The Data Accessibility &amp; Data Protection Conundrum 9\" width=\"680\" height=\"451\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 680px; --smush-placeholder-aspect-ratio: 680\/451;\" \/><\/a><br \/>\n<em>Time To Let Infographics Lead Your Content Strategy<\/em><\/p>\n<p>Accessibility, from the Latin accessus, which means approach or advance, needs to promote an easy way for your audience to approach your business information. In other words, publishing your data online is not enough to claim they are accessible. You also need to focus on making your content easy to understand for the typical digital user. The attention span online is around 8 seconds, which makes it hard to convey information in a text format. As such, using data visualization tools and best practices to create a <a href=\"https:\/\/www.andysowards.com\/blog\/2020\/essential-5-tips-enhancing-data-visualization-website\/\" target=\"_blank\" rel=\"noopener\">visual representation of complex information<\/a> is the preferred method. Graphs and infographics can handle large sets of data and convey a powerful message in a matter of seconds.<\/p>\n<h3>Ensuring all users can visit the site<\/h3>\n<p><a href=\"http:\/\/infinigeek.com\/creating-content-for-business\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-37535 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-8.png\" alt=\"Solving The Data Accessibility &amp; Data Protection Conundrum 8\" width=\"614\" height=\"434\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 614px; --smush-placeholder-aspect-ratio: 614\/434;\" \/><\/a><br \/>\n<em>Creating Content For Business And Beyond<\/em><\/p>\n<p>As mentioned before, publishing your content online doesn\u2019t mean it is accessible. For disabled users, a website that doesn\u2019t promote accessibility for screen-readers or any other assistive technology fails to share its content adequately. It is the responsibility of the business to provide their users with a website that supports data sharing for all. First of all, the Americans with Disabilities Act, ADA for short, includes sites, which means that a non-accessible website is a violation of Title II of the ADA. You\u2019re not just keeping customers excluded from your content, but you are also at risk of receiving a legal complaint.<\/p>\n<h3>Make your data easy to find<\/h3>\n<p><a href=\"https:\/\/www.andysowards.com\/blog\/2020\/businesses-handle-customer-data\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-large wp-image-37530 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-4-1024x768.jpeg\" alt=\"Solving The Data Accessibility &amp; Data Protection Conundrum 4\" width=\"1024\" height=\"768\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-4.jpeg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-4-768x576.jpeg 768w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/768;\" \/><\/a><br \/>\n<em>How Businesses Should Handle Customer Data<\/em><\/p>\n<p>The fact that users can read and access your data is one thing. Maintaining clear access for crawlers and search engines is another. Ensuring full data accessibility for your website begins with your technical factors, such as structured data. Schema.org is a semantic language of microtags that can be added to your HTML code to make its content more readable and accessible to search engines such as Google or Bing. The tags help to clarify your content, and therefore improve the indexing process. Search engines can gain a better understanding of your site, and hence, rank it higher in the results of relevant search terms.<\/p>\n<h3>Where does data protection start?<\/h3>\n<p><a href=\"http:\/\/infinigeek.com\/provide-cloud-data-security\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-large wp-image-37531 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-3-1024x680.png\" alt=\"Solving The Data Accessibility &amp; Data Protection Conundrum 3\" width=\"1024\" height=\"680\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-3.png 1024w, https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-3-768x510.png 768w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/680;\" \/><\/a><br \/>\n<em>How to Provide Cloud Data Security<\/em><\/p>\n<p>Public data need to remain accessible at all times. On the other hand, confidential and personal data require protection from unwanted access. For a lot of businesses, managing both accessibility and data protection is a tricky challenge, especially in a business world that has moved toward the digital sphere.<\/p>\n<h3>Keeping your information and business protected<\/h3>\n<p><a href=\"http:\/\/infinigeek.com\/for-peace-of-mind-you-need-to-protect-your-business\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-37527 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-7.jpeg\" alt=\"Solving The Data Accessibility &amp; Data Protection Conundrum 7\" width=\"700\" height=\"350\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 700px; --smush-placeholder-aspect-ratio: 700\/350;\" \/><\/a><br \/>\n<em>For Peace of Mind You Need to Protect Your Business<\/em><\/p>\n<p>As more and more companies rely on cloud solutions and digital tools, monitoring and anticipating threats is, by far, the biggest challenge small businesses face. With over 60% of small businesses dramatically affected by cyber-attacks, it has become essential for companies to rely on managed I.T. services for protection. Indeed, I.T. experts can help to prevent harmful cyber-attacks and keep hackers at bay. Security breaches can, unfortunately, have devastating consequences. As such, preventive methods for data protection are more effective than patching up issues once after a hack.<\/p>\n<h3>Knowing best practices<\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-37533 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1-1024x683.jpeg\" alt=\"Solving The Data Accessibility &amp; Data Protection Conundrum 1\" width=\"1024\" height=\"683\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1-1024x683.jpeg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1-768x512.jpeg 768w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/683;\" \/><br \/>\n<a href=\"https:\/\/www.pexels.com\/photo\/women-holding-space-gray-iphone-x-and-black-pen-744461\/\" target=\"_blank\" rel=\"noopener\"><i>Image Source<\/i><\/a><\/p>\n<p>Hackers are becoming smarter. Many use hacking tools bought on the dark web. However, these tools can be easily spotted and rendered harmless by a managed I.T. service provider. On the other hand, scams and phishing emails rely on human psychology and weaknesses. Hackers can receive personal information directly through emails if they target their victims skillfully. Pretending to be a new colleague and asking for a protected password can lead to a data breach. Alternatively, some hackers rely on creating scam emails that implement a sense of urgency, such as inviting recipients to log into their online account through a link on the email. The method is used to copy confidential passwords. Therefore, knowing how to recognize potentially dangerous communication can help protect your data.<\/p>\n<h3>Protect your customers&#8217; data<\/h3>\n<p><a href=\"http:\/\/infinigeek.com\/are-companies-doing-enough-to-protect-your-personal-data\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-37536 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-10.jpg\" alt=\"Solving The Data Accessibility &amp; Data Protection Conundrum 10\" width=\"770\" height=\"513\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-10.jpg 770w, https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-10-768x512.jpg 768w\" data-sizes=\"(max-width: 770px) 100vw, 770px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 770px; --smush-placeholder-aspect-ratio: 770\/513;\" \/><\/a><br \/>\n<em>Are Companies Doing Enough to Protect your Personal Data?<\/em><\/p>\n<p>As a business, you need to take additional measures to protect your customers\u2019 data. Securing your data storage facilities is the first step you need to take. Additionally, you need to consider all areas on the website where your customers can share confidential information. HTTPS offers secure communication over a computer network, which means that data are encrypted. As such, hackers will find it hard to lift private data from online forms. Additionally, if your website promotes online payment methods, you need to focus on secure payment solutions.<\/p>\n<p>Ultimately, data protection starts where data accessibility ends. Managing both with equal success is a delicate balancing act that requires strategic thinking and planning. Businesses need to work in close collaboration with data experts to design the best approach to protection and accessibility for all. Keeping your data visible to the relevant targets and invisible to hackers is the key to managing your digital data effectively.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data is at the heart of one of the biggest dilemmas of the modern age in I.T. On the one hand, your data are detrimental to your decision-making processes. Without<\/p>\n","protected":false},"author":1,"featured_media":37533,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,5695,1],"tags":[1438,6117,3864,6020,974,12126,6249,6474,4368,796,12127,4377,177,5879,21,220,10330],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Solving The Data Accessibility &amp; Data Protection Conundrum<\/title>\n<meta name=\"description\" content=\"Data is at the heart of one of the biggest dilemmas of the modern age in I.T. On the one hand, your data are detrimental to your decision-making\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solving The Data Accessibility &amp; Data Protection Conundrum\" \/>\n<meta property=\"og:description\" content=\"Data is at the heart of one of the biggest dilemmas of the modern age in I.T. On the one hand, your data are detrimental to your decision-making\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-27T21:14:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-11T22:51:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2250\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/\",\"name\":\"Solving The Data Accessibility & Data Protection Conundrum\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1.jpeg\",\"datePublished\":\"2020-04-27T21:14:42+00:00\",\"dateModified\":\"2023-04-11T22:51:15+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"Data is at the heart of one of the biggest dilemmas of the modern age in I.T. On the one hand, your data are detrimental to your decision-making\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1.jpeg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1.jpeg\",\"width\":2250,\"height\":1500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solving The Data Accessibility &#038; Data Protection Conundrum\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Solving The Data Accessibility & Data Protection Conundrum","description":"Data is at the heart of one of the biggest dilemmas of the modern age in I.T. On the one hand, your data are detrimental to your decision-making","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/","og_locale":"en_US","og_type":"article","og_title":"Solving The Data Accessibility & Data Protection Conundrum","og_description":"Data is at the heart of one of the biggest dilemmas of the modern age in I.T. On the one hand, your data are detrimental to your decision-making","og_url":"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2020-04-27T21:14:42+00:00","article_modified_time":"2023-04-11T22:51:15+00:00","og_image":[{"width":2250,"height":1500,"url":"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1.jpeg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/","url":"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/","name":"Solving The Data Accessibility & Data Protection Conundrum","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1.jpeg","datePublished":"2020-04-27T21:14:42+00:00","dateModified":"2023-04-11T22:51:15+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"Data is at the heart of one of the biggest dilemmas of the modern age in I.T. On the one hand, your data are detrimental to your decision-making","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1.jpeg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/Solving-The-Data-Accessibility-Data-Protection-Conundrum-1.jpeg","width":2250,"height":1500},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2020\/solving-data-accessibility-data-protection-conundrum\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Solving The Data Accessibility &#038; Data Protection Conundrum"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/37526"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=37526"}],"version-history":[{"count":2,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/37526\/revisions"}],"predecessor-version":[{"id":45725,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/37526\/revisions\/45725"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/37533"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=37526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=37526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=37526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}