Surprisingly, a new study indicates financial organizations use actual data when building and testing apps. I came across a rather disturbing bit of information the other day: many financial services organizations use real data in the development and testing of applications. At least that’s the findings of a study commissioned by Compuware Corp. and conducted by the Ponemon Institute, an independent research firm focused on information and privacy management practices. To be more exact, the study found that 83% of financial service companies use real data in the development and testing of applications.Perhaps these companies overlook that obvious security flaw because they figure application development and testing is typically done in the back room, off the main network, in a non-production environment. Or perhaps, from what I’ve read, developers often prefer to use the real McCoy when developing and testing apps to ensure they are ready for prime time when the time comes. Or perhaps there’s some other reason.Regardless, it’s not the best practice. And you’d think financial services organizations wouldn’t be doing such a thing. After all, financial companies these days are bound by so many data privacy regulations, such as the Sarbanes-Oxley Act (SOX) of 2002 or the data breach notification laws now in effect in a majority of states. And these regulations do not differentiate between product and testing environments; data is data is data, and if it’s supposed to be safe and protected, well then…So this (to me, anyway) surprising statistic got me wondering what the developers many companies have contracted to build and test applications are doing. It’s a critical question I think should be added to a security checklist that needs to be picked through during the deal-making and then deal-signing phases of any outsourcing contract. When you ask whether your outsourcer is ISO 27001- or ISO 27002-certified (two standards that define and specify information management systems for examining risks, threats, and vulnerabilities and implementing controls and management processes), and and exactly who will be touching the code that’s being developed and tested, and whether they’ve had extensive background checks; and when you provide the outsourcer with explicit directions regarding who, and with whom, your code will be shared; you should probably bring up the data point.Forrester Research suggests four steps that companies should follow regarding data and application development and testing: 1) take inventory of test data requirements by defining the regulations and practices you need to comply with; 2) assess your risks by categorizing the sensitivity of production data and determining what data, if any, can be used; 3) create a strategy for replacing production data by masking or depersonalizing data when necessary; and 4) determine who will enforce the practices. What about you, wise readers? Do the findings from the Compuware/Ponemon study surprise you? And more importantly, do you have any advice or wisdom when it comes to ensuring outsourcers hired to develop and test applications are safeguarding data? Related content opinion IT Offshoring and Data Privacy Are They Incongruous? India enacts new privacy laws while China considers adopting them. What are the ramifications to IT outsourcing? By Beth Bacheldor May 07, 2011 4 mins Enterprise Applications opinion For Successful IT Outsourcing, Providers Must Earn CIOs Respect A talk with HCL Technologies sheds light on the need for getting a CIOs attention and focusing on business results. By Beth Bacheldor Apr 28, 2011 5 mins Enterprise Applications opinion More U.S. Companies are Offshoring More and More U.S. Commerce Data shows offshoring is up. The question is, good or bad? By Beth Bacheldor Apr 25, 2011 4 mins Enterprise Applications opinion IBMs Growing Outsourcing Business in India IBM lands another big outsourcing deal with a company in India; this time with PepsiCo. By Beth Bacheldor Apr 15, 2011 2 mins Enterprise Applications Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe