Data sovereignty and technological sovereignty are the two pillars of digital sovereignty, which can be defined as the degree of control an organization has over its entire digital environment, including data, applications, software, systems, and hardware. Which is aligned to the WEF definition “the ability to have control over your own digital destiny – the data, hardware and software that you rely on and create.”
A closer examination reveals that cybersecurity is at the heart of data sovereignty and helps enhance technological sovereignty.
It’s important that organizations understand that digital sovereignty is not an “all or nothing” proposition. Digital sovereignty exists in varying degrees on a scale which is constantly in flux.
Governments and organizations advocating for digital sovereignty need to adopt a risk-based approach. They must carefully assess their level of control over data and technology, and take great care to ensure that sovereignty does not come at the cost of agility — a key factor to thriving in the Digital Age.
Source: https://atos.net/en/lp/digital-sovereignty-cybersecurity-magazine/what-is-sovereignty-and-why-it-does-matter
But instead of institutionalizing digital sovereignty governments across the world are busy institutionalizing artificial intelligence which needs wider ratification from all stakeholders instead becoming a trend amongst wealthy and mighty.
No comments:
Post a Comment