Customer demand for secure mobile banking has led the Commonwealth Bank of Australia (CBA) to start investigating the development of privacy technologies to be built into its products and services.Speaking at the launch of Privacy Awareness Week in Sydney, CBA enterprise privacy, identity and cyber executive general manager Gary Blair told delegates that the technologies would help customers to control their own privacy settings when using mobile banking apps such as Kaching.“As we move forward in this privacy domain, we will see a lot more discussion about enabling the true owners of the data to have as much control over that data as possible,” he said.For example, the bank was exploring what he called the “right to be forgotten” where if customers leave the bank, they can request that certain information is deleted. Privacy Commissioner launches Guide to Information SecurityAustralian banks welcome real-time payments service Aussie banks divided over mobile security educationAccording to Blair, 60 per cent of all of its projects now have a privacy impact assessment (PIA) performed.For example, an extensive PIA was done by the bank before it developed Kaching for use on Facebook in March 2013 due to concerns about privacy and security on the social networking site.“In our normal methodology we go through a process where we apply security architecture and design patterns,” Blair said. “This is to ensure that we are building security and privacy into the platforms from the outset rather than bolting it on as an afterthought.”He added that securing customer data was paramount for the bank due to the steady rise in online transactions. Data from CBA showed that as of December 2012, more than 60 per cent of all online transactions are conducted via mobile devices in Australia.Follow Hamish Barwick on Twitter: @HamishBarwick Follow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld Australia Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe