SlideShare a Scribd company logo
1 of 43
EDELMAN PRIVACY RISK INDEX
POWERED BY PONEMON
BUSINESS LEFT VULNERABLE TO PRIVACY RISK

Privacy risks can have a substantial impact on
business operations and corporate reputation.         Edelman’s privacy research shows, for the
Companies face increasing regulation and              first time, the main drivers of privacy risk.
potential fines for the misuse and loss of            The survey reveals:
sensitive information. If regulatory pressure isn’t
enough, not a week goes by without a company
                                                          Privacy risks are at an all-time high, presenting
or an entire industry in the news for an alleged
                                                          a significant challenge for businesses.
privacy violation, causing significant harm to
corporate reputation.
                                                          Businesses are struggling to manage the
                                                          privacy practices that most contribute to risk.
Managing data security and privacy effectively is
essential to businesses today. The growing                Operating globally and in financial services
volume and sensitivity of information being               and health industries significantly contributes
shared, stored and used is driving demand for             to risk.
greater transparency about how it is being
managed and protected.
PRIVACY RISK AT AN ALL-TIME HIGH
THE CONSEQUENCES OF PRIVACY RISK
The costs are high. Businesses are losing customers and
money, reputations suffer. As a result, license to operate hangs in the
balance.




          CUSTOMERS                           CORPORATE REPUTATION




              MONEY                              BUSINESS DISRUPTION
DRIVERS OF PRIVACY RISK AND LIABILITY

   CONSUMER CONCERN                                        REGULATORY ENFORCEMENT


   Three quarters of consumers will stop using an online
                                                           FTC levels $22.5 million for privacy violation
   shop if information was accessed without permission

                                                           Proposed EU legislation may include fines up to 2%
                                                           of annual turnover
   Less than half of consumers trust healthcare
   organizations to protect information
   Edelman DSP Group Study


   LITIGATION                                              MEDIA SCRUTINY
   Average settlement $2,500 per plaintiff, and
   mean attorneys’ fees of $1.2 million
   Temple University Beasley School of Law
INTRODUCING THE EDELMAN PRIVACY RISK INDEX

  The Edelman Privacy Risk Index (ePRI) is a global benchmarking study and tool that
  measures the top drivers of privacy risk for businesses. The ePRI explores how companies
  are managing privacy risk caused by business practices and operations.



• Based on analysis of research from the Ponemon Institute over the last three years

• Analysis of 6,400 individual responses by risk managers, privacy professionals and IT Pros

• 29 countries included in benchmarking and tools

• The research serves as the baseline for an online tool that allows companies to access their
  privacy risk against the benchmark

• Intended to be directional NOT diagnostic
ELEMENTS OF PRIVACY RISK
The Edelman Privacy Risk Index reveals a lack of preparedness in managing the potential financial and reputational
damage relating to the loss or misuse of personal information. Our survey found companies face significant risk due to
business profile and failing to implement strong privacy practices.




     BUSINESS                                          PRIVACY
      PROFILE:                                        PRACTICES:
   WHAT DEFINES                                        HOW YOU                                       Overall
   YOUR BUSINESS                                       OPERATE                                        RISK
WHAT DEFINES
YOUR BUSINESS
BUSINESS PROFILE
Companies must understand how their business profile contributes to their privacy risk. Those
operating in high risk environments are particularly vulnerable to incidents if they don’t properly
manage privacy practices.




                                             Industry



                                                                                    Headcount/
     Geography                                                                         Size




                                              RISK
    Info Collected/
       Managed                                                                       Footprint
BUSINESS PROFILE RISK AT A GLANCE



      Geography                      Footprint            Industry            Headcount/          Info Collected
                                                                                 Size


         HIGHEST RISK                  HIGHEST RISK         HIGHEST RISK         HIGHEST RISK         HIGHEST RISK

 • Belgium                       • Global and Super   • Financial          • Small- and         • Sensitive
 • Italy                           Regional             Services             Medium-sized         Customer
 • Spain                                              • Health/Pharma        Businesses           Information
                                                      • Communications


         LOWEST RISK                   LOWEST RISK          LOWEST RISK          LOWER RISK           LOWER RISK

 • China                         • Local              • Industrial         • Enterprise         • Only Employee
 • India                                                Automotive
 • Brazil                                             • Manufacturing




See appendix for full findings
COMPANIES HAVE DIFFERENT STARTING RISKS
Companies in different industries, markets and sizes have different starting points for operational risk.
It’s essential that businesses understand where they stand and take action if they are at high risk.



             Company w/ Low                                               Company w/ High
             Risk Profile                                                 Risk Profile
                                               VS.
    Brazil                                                      Italy
    Manufacturing                                               Health
    Local                                                       Global
    Large Enterprise                                            SMB
    Collects employee info                                      Collects health and sensitive
                                                                customer information
PRIVACY PRACTICES
PRACTICES THAT DETERMINE RISK
The ePRI identified three pillars and twelve practices that are key indicators of businesses ability to
mitigate risk of a data breach, privacy lawsuit or regulatory action.


                      •   My organization is transparent about what it does with employee and customer information.

                          My organization is quick to respond to privacy complaints or questions from customers and regulators.

Communications        •   My organization makes a substantial effort to educate employees about privacy and data security.

 & Engagement         •   Employees in my organization understand the importance of privacy and how to protect personal and/or sensitive
                          information.

                      •   My organization considers privacy and the protection of personal information a corporate priority.

                      •   A high-level executive leads my organization's privacy program and is empowered to make decisions.

                      •   My organization understands global privacy cultural differences.
   Business
                      •   My organization strictly enforces all levels of non-compliance with laws and regulations.
  Operations

                      •   My organization believes a data breach would adversely affect our reputation and financial position.

                      •   My organization has ample resources to protect employee and customer information.

                      •   My organization is able to prevent and quickly detect the theft or misuse of personal information.

Data Protection       •   My organization has the expertise and technology to protect personal information.
BUSINESSES FALLING SHORT

 Fewer than half of those surveyed agreed they effectively manage
 risk, leaving them highly susceptible (or exposed) to a privacy incident.


 They are failing to:

     •   Make privacy a priority and devote resources

     •   Engage their employees

     •   Embrace transparency

     •   Manage regulatory concerns
COMPANIES LACK RESOURCES AND EXPERTISE



                  Approximately 2 out of 3 companies do
                  NOT have the expertise and technology
                  to protect personal information




                  Over half do not have the resources
                  needed to protect the information they
                  collect
COMPANIES FAIL TO PRIORITIZE



         Believe a data breach would not adversely
   53%   impact company reputation



         Do not consider privacy and protection of personal
   60%   information a corporate priority




         Don't have a high level executive managing privacy
   61%   programs
COMPANIES FAIL TO ENGAGE EMPLOYEES

Privacy incidents often originate when employees improperly use or accidently expose
information. The ePRI found a majority or companies fail to address the potential risk
presented by poor employee education.



                                 Over half (57%) of companies think their
                                 employees do not understand the importance
                                 of security and privacy




                                2 out of 3 companies surveyed do not proactively
                                educate employees on privacy and security issues
COMPANIES ARE NOT TRANSPARENT OR
RESPONSIVE
Despite new laws around the world calling for greater notice and consent before collecting consumer
information and increased media scrutiny, companies struggle to be transparent and respond to
complaints.



                           Over half of the organizations surveyed (57%)
                           are not transparent about what they do with
                           personal information collected




                           And 61% say they are not quick to respond to
                           customer privacy complaints
COMPANIES ARE LAX ON REGULATORY
COMPLIANCE
Many companies struggle to comply with increasing and evolving regulatory requirements
around the globe.




6 out of 10 companies (61%) do not strictly
enforce compliance regulations
MANAGING PRIVACY RISK
WHERE TO START



1   UNDERSTAND:            Use the ePRI tool to better understand your company’s privacy risk. Share results
    with key stakeholders in legal, communications and technology to get consensus of risk.




2
    PRIORITIZE: Armed with understanding, an enterprise now has a powerful directional lens to evaluate its
    privacy program. Smart organizations will prioritize the weakest elements of their privacy DNA (under-
    performing practices) with consideration for their potential impact on enterprise effectiveness.




3   ACTIVATE:       Work cross-company on programs to improve at-risk privacy practices. Consider how
    communications, legal/risk and technology leaders can collaborate on solutions.
UNDERSTAND YOUR RISK: ePRI TOOL




Leverage the ePRI Tool
to better understand your
risk and how your
practices relate to the
benchmark.
PRIORITZE: RISKY PRACTICES

                             My organization considers privacy and the
                             protection of personal information a corporate priority.


                                                  Priority #1

Determine and
explore deficient            My organization has the expertise and technology
                             to protect personal information.
privacy practices
                                                  Priority #2
most contributing
to corporate risk.
                             My organization is transparent about what it does
                             with employee and customer information.




                             My organization is quick to respond to consumers’
                             and regulators’ privacy complaints.


                                                  Priority #3
ACTIVATE CROSS-ORGANIZATION PRIVACY TEAM


                    BUSINESS: Proper collection, use and storage of
                    information. Embrace Privacy by Design.

Invest in privacy
                    LEGAL/GOV AFFAIRS: Compliance with local laws
practices and       in all the geographies of operation.
programming to
improve             INFORMATION TECHNOLOGY: Technology systems
                    to prevent and recover from a data incident.
performance.

                    COMMUNICATIONS: Employee
                    engagement, stakeholder engagement, data breach
                    communications.
FIRST STEP: CONVENE PRIVACY WORKSHOP
WITH EDELMAN
                               OUTCOMES

                                         Customized
Edelman and our
                          Privacy Risk     Privacy
partners can meet with     Snapshot       Program
you to help explore and                  Roadmaps
prioritize areas of
privacy risk.

                            Internal      Privacy
                          Integration    Playbooks
EDELMAN SERVICES
EDELMAN AND OUR PRIVACY PARTNERS CAN HELP
WITH SYSTEMS INTEGRATION

    COMMUNICATIONS          AUDIT                    POLICY/LEGAL


• Security and privacy   • Reputation and         • Policy analysis and
  message development      communications audit     navigation
• Internal               • Privacy risk           • Active regulatory and
  communications and       assessment               policymaker
  employee engagement    • Communications team      engagement
                           integration            • Litigation
• Influencer and                                    communications
  competitive mapping    • Customer and market
                           research               • Influence policy
• Privacy and security                              outcomes
  response management    • Crisis protocols
                                                  • Coalition building and
• Data breach training                              grassroots support
  and simulations
• Thought leadership
  and executive
  positioning
CONTACT




   WEB:
   Datasecurity.edelman.com
   Edelman.com/expertise/practices/data security & privacy


   TWITTER:
   @EdelmanDSP


   CONTACT:
   Pete Pedersen, Global Chair, Technology             Ben Boyd, Global Chair, Corporate
   Pete.Pedersen@edelman.com                           Ben.Boyd@edelman.com
APPENDIX I
LANDSCAPE RESEARCH
GAP IN CONSUMER TRUST
 Our survey, Privacy & Security: The New Drivers of Brand, Reputation and Action, shows a significant gap between
 the importance of privacy to consumers and the amount they trust companies to protect it.


   92%                                                                           Importance of privacy and security in each industry (global)
                84%                                                              Trust in each industry to protect personal information (global)
                            78%           77%
         69%                                           69%
                                                                    63%

                                  51%                                           50%         50%
                                                48%
                                                                                                        43%
                                                                                                                  37%
                      33%
                                                                          27%
                                                                                                                                 23%

                                                          12%                      12%                     11%
                                                                                                  9%
                                                                                                                        6%



   Finance       Online     Medical &    Government     Social     Technology News & Media Automotive   Food &    Gaming     Utilities*
               Shopping &   Healthcare                Networking                                        Grocery
                 Retail




Q7. How important is your privacy and security when doing business with the following industries? *NOTE: Utilities not included as a response code
Q8. Which industry do you trust most to adequately protect your personal information? Please select the top three industries.
CONSUMERS ATTRITION DUE TO PRIVACY
Consumers will leave services if personal information was accessed without
permission, costing negligent companies significantly in potential business.


Consumers Likely to Switch Providers or Stop Using Services Entirely if Personal Information was
Accessed Without Permission (Global)
   80%         79%        77%         75%        75%
                                                             67%        67%         65%        63%
                                                                                                           59%
                                                                                                                      55%         55%        54%
                                                                                                                                                        50%




Base: All respondents (Global n=4,050)
Q9. For the following types of companies, if your personal information was accessed without your permission, how likely would you be to switch to a different
provider or stop using these services entirely, if they did have personal information on you? Please use a scale of 1-5, where 1 is “not at all likely” and 5 is “very
likely.”
REGULATORY ACTION IN UNITED STATES
All Federal agencies with jurisdiction over privacy are significantly increasing
enforcement and rhetoric about privacy violations by companies.


                          Google pays $22.5 million to settle FTC charges
                          it misrepresented privacy assurances.




                          BlueCross BlueShield of Tennessee (BCBST)
                          fined $1.5 million for 2009 data breach.



                          SEC requires publicly traded companies to disclose
                          data breaches citing the issue is a substantial
                          business risk.
A NEW REGIME IN THE EU


EU institutions are currently discussing far-ranging proposals to modify and
substantially overhaul the Union’s patchwork of 27 data protection regimes to
create a new, single Europe-wide regime.

If approved in the current format, the new regime would radically change the
obligations of data controllers, strengthen competences of Data Protection
Authorities (DPAs) and increase the rights of individuals.

The current regulation draft foresees fines for non-compliance of up to 2% of
annual turnover. The impact of this would be global.
ASIA NOT FAR BEHIND
Many countries in Asia are creating new privacy laws similar to those in place in Europe
and the United States, imposing fines for data breaches and more stringent privacy
standards.


             India: Passed Information Technology Rules (2011)

             Singapore: Personal Data Protection Act (2012)

             Hong Kong: Amended Personal Data Ordinance (2012)

             APEC Region: APEC Privacy Framework
LITIGATION ON THE RISE


“NebuAd Settles Lawsuit Over Behavioral               “Lawsuit Claims
       Targeting Test” – MediaPost         Microsoft, McDonald’s, Mazda & CBS
                                           Used Ads as Cover for Data Mining”
                                                      – Network World

        Average settlement $2,500 per
        plaintiff, and mean attorneys’
        fees of $1.2 million – Temple
        University Beasley School of Law


          “Facebook sued for
    $15 billion over alleged privacy
            infractions” – CNET
CRITICAL MEDIA
Companies face an increasingly critical and vocal media environment, creating a significant potential for
reputational damage.




    GM's Boneheaded                    Security Tops
    Privacy Mistake                    Boardroom
    With OnStar                        Agendas




                                      Facebook Complies
                                      with EU Data Protection
    Apple moves to quell              Law, Dumps Facial
    Path privacy gaffe                Recognition




    Privacy Concerns
    Affect Purchase                  Questions for Amazon on
    Decisions                        Privacy and the Kindle Fire
APPENDIX II
EDELMAN PRIVACY RISK INDEX
BY GEOGRAPHY
The ePRI found operating in Europe presents the most privacy risk, likely due to recent policy
developments and a significant cultural expectation of privacy.




        50.9                              58.7
        NORTH                            EUROPE
       AMERICA                                       41.1
                                                     MIDDLE
                                                      EAST
                                                                                 42.7
                                                                                  ASIA-
                                                                                 PACIFIC



                    40.2
                    LATIN
                   AMERICA
RISK IN SPECIFIC MARKETS
  There are significant differences between the most and least risky countries. The eleven countries
  with the highest privacy risk are located in the European Union with many developing nations
  presenting lower risk.
             Belgium                                                                                                   68.6
                   Italy                                                                                        65.2
         Netherlands                                                                                          64.1
                 Spain                                                                                     62.5
               France                                                                               59.2
            Germany                                                                                 59.1
             Sweden                                                                                58.7
               Poland                                                                          56.5
            Denmark                                                                            56.3
              Norway                                                                        55.0
               Ireland                                                                      54.8
        New Zealand                                                                         54.7
             Australia                                                                     54.2
              Canada                                                                      53.8
            Argentina                                                                    53.3
     United Kingdom                                                                      53.0
 Russian Federation                                                               50.4
          Hong Kong                                                              50.0
        United States                                                         48.1
                Japan                                                  43.2
                 Israel                                               42.2
United Arab Emirates                                               41.2
        Saudi Arabia                                             39.7
           Singapore                                          38.7
              Mexico                                         37.9
                Korea                                       37.2
        China (PRC)                                  32.0
                  India                            31.3
                 Brazil                         29.3

                           -   10.0   20.0   30.0           40.0              50.0              60.0               70.0       80.0
CORPORATE FOOTPRINT INTRODUCES RISK

Adding significant complexity to geographic concerns is the risk presented by
operating in multiple markets.
                                                       Local
80.0                                                   The company primarily operates in one country
70.0                                           66.8

                                  58.3                 Regional
60.0
                                                       The company operates in two or more countries primarily
50.0                                                   in one region
                    39.0
40.0     36.0
                                                       Super regional
30.0                                                   The company operates in multiple countries in two or
20.0
                                                       more regions

10.0
                                                       Global
  -                                                    The company operates in all regions around the world
        Local     Regional   Super regional   Global
INDUSTRY BENCHMARK DRIVEN BY DATA
Industries that collect the most sensitive information about customers present the most significant privacy risk. There is a
significant drop off in privacy risk for organizations that don’t collect significant amounts of information online.

                  Financial services                                                                                                    79.3
                   Health & pharma                                                                                                     78.3
                   Communications                                                                                          66.0
                             Airlines                                                                                  62.8
               Professional services                                                                                61.0
                       Public sector                                                                            58.8
               Education & research                                                                          56.5
                      Transportation                                                                         56.3
                          Hospitality                                                                    55.0
                   Energy & utilities                                                                    55.0
              Technology & software                                                                     53.8
                     Retail (Internet)                                                                52.0
                Retail (conventional)                                                        44.5
                 Consumer products                                                           44.3
                            Services                                                  39.5
              Entertainment & media                                         32.8
                          Agriculture                                       32.3
                           Industrial                                27.5
                         Automotive                           24.0
                      Manufacturing                        20.8

                                         -   10.0   20.0          30.0             40.0        50.0          60.0             70.0   80.0      90.0
BY COMPANY SIZE
Smaller organizations have substantially higher privacy risk than larger organizations. This can potentially be
explained by larger organizations typically having more resources to devote to managing privacy risk.
However, large organizations still face risks, often due to having a significant amounts of information and
increased regulatory attention.



            501 to 1,000                                                                           59.5


           Less than 500                                                                         57.5


          1.001 to 5,000                                                                  50.3


         5,001 to 10,000                                                           46.5


       More than 75,000                                                           45.8


        25,001 to 75,000                                                          45.8


        10,001 to 25,000                                                         44.8


                           -        10.0        20.0        30.0        40.0        50.0         60.0      70.0
BY INFORMATION COLLECTED
The volume and sensitivity of data collected significantly influences privacy risk.




     Types of personal information stored:
        Customer with PII                         Customer without PII
        Employee                                  Consumer (targeted customer)
        Citizen (government use)                  Patient (health records)
        Student                                   Shareholder/investor

More Related Content

What's hot

Accenture 2015: Global Risk Management Study - North American Insurance Report
Accenture 2015: Global Risk Management Study - North American Insurance ReportAccenture 2015: Global Risk Management Study - North American Insurance Report
Accenture 2015: Global Risk Management Study - North American Insurance ReportAccenture Insurance
 
Adding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activitiesAdding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activitiesGrant Thornton LLP
 
The way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe Economist Media Businesses
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesThe Economist Media Businesses
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?- Mark - Fullbright
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryAccenture Insurance
 
Accenture Public Service Citizen Survey: Social Services
Accenture Public Service Citizen Survey: Social ServicesAccenture Public Service Citizen Survey: Social Services
Accenture Public Service Citizen Survey: Social Servicesaccenture
 
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw NearUse AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw NearCognizant
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBsCarbonite
 
2015 Corporate general counsel survey results
2015 Corporate general counsel survey results2015 Corporate general counsel survey results
2015 Corporate general counsel survey resultsGrant Thornton LLP
 
Improving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause AnalysisImproving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause AnalysisCognizant
 
2015 Edelman Trust Barometer - Financial Services Results
2015 Edelman Trust Barometer - Financial Services Results2015 Edelman Trust Barometer - Financial Services Results
2015 Edelman Trust Barometer - Financial Services ResultsEdelman
 
The hype and the hope: The road to big data adoption in Asia-Pacific
The hype and the hope: The road to big data adoption in Asia-PacificThe hype and the hope: The road to big data adoption in Asia-Pacific
The hype and the hope: The road to big data adoption in Asia-PacificThe Economist Media Businesses
 
Turning big data into big revenue
Turning big data into big revenueTurning big data into big revenue
Turning big data into big revenuePwC
 
P 01 paw_shiny_methods_2017_10_31_v14
P 01 paw_shiny_methods_2017_10_31_v14P 01 paw_shiny_methods_2017_10_31_v14
P 01 paw_shiny_methods_2017_10_31_v14Vishwa Kolla
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorAccenture Insurance
 

What's hot (18)

Accenture 2015: Global Risk Management Study - North American Insurance Report
Accenture 2015: Global Risk Management Study - North American Insurance ReportAccenture 2015: Global Risk Management Study - North American Insurance Report
Accenture 2015: Global Risk Management Study - North American Insurance Report
 
Adding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activitiesAdding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activities
 
The way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of Things
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
Accenture Public Service Citizen Survey: Social Services
Accenture Public Service Citizen Survey: Social ServicesAccenture Public Service Citizen Survey: Social Services
Accenture Public Service Citizen Survey: Social Services
 
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw NearUse AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
 
2015 Corporate general counsel survey results
2015 Corporate general counsel survey results2015 Corporate general counsel survey results
2015 Corporate general counsel survey results
 
Improving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause AnalysisImproving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause Analysis
 
Decision making article
Decision making articleDecision making article
Decision making article
 
2015 Edelman Trust Barometer - Financial Services Results
2015 Edelman Trust Barometer - Financial Services Results2015 Edelman Trust Barometer - Financial Services Results
2015 Edelman Trust Barometer - Financial Services Results
 
The hype and the hope: The road to big data adoption in Asia-Pacific
The hype and the hope: The road to big data adoption in Asia-PacificThe hype and the hope: The road to big data adoption in Asia-Pacific
The hype and the hope: The road to big data adoption in Asia-Pacific
 
Turning big data into big revenue
Turning big data into big revenueTurning big data into big revenue
Turning big data into big revenue
 
P 01 paw_shiny_methods_2017_10_31_v14
P 01 paw_shiny_methods_2017_10_31_v14P 01 paw_shiny_methods_2017_10_31_v14
P 01 paw_shiny_methods_2017_10_31_v14
 
Attego Trust Index
Attego Trust IndexAttego Trust Index
Attego Trust Index
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
 

Similar to Privacy Risk at an All-Time High

Edelman Privacy Risk Index
Edelman Privacy Risk IndexEdelman Privacy Risk Index
Edelman Privacy Risk IndexEdelman Japan
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsElizabeth Dimit
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...IDology, Inc
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudWynyard Group
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk ManagementManoj Jain
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarFERMA
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
ERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSMichel Rochette
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?IBM Security
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Satyanandan Atyam
 

Similar to Privacy Risk at an All-Time High (20)

Edelman Privacy Risk Index
Edelman Privacy Risk IndexEdelman Privacy Risk Index
Edelman Privacy Risk Index
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk Management
 
Riskpro information risk management
Riskpro information risk managementRiskpro information risk management
Riskpro information risk management
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk Management
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk Management
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk Webinar
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
ERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORS
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
Riskpro information risk management 2013
Riskpro information risk management 2013Riskpro information risk management 2013
Riskpro information risk management 2013
 
Riskpro information risk management 2013
Riskpro information risk management 2013Riskpro information risk management 2013
Riskpro information risk management 2013
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0
 

More from Edelman

2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.Edelman
 
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBALEdelman
 
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact StudyEdelman
 
2018 Federal Cabinet Shuffle
2018 Federal Cabinet Shuffle2018 Federal Cabinet Shuffle
2018 Federal Cabinet ShuffleEdelman
 
The Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet ShuffleThe Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet ShuffleEdelman
 
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World 2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World Edelman
 
Edelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry PerceptionsEdelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry PerceptionsEdelman
 
2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional Investors2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional InvestorsEdelman
 
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive SummaryEdelman
 
8 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 20188 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 2018Edelman
 
The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018Edelman
 
2018 Edelman Trust Barometer Special Report: Trust in Brand China
2018 Edelman Trust Barometer Special Report:  Trust in Brand China2018 Edelman Trust Barometer Special Report:  Trust in Brand China
2018 Edelman Trust Barometer Special Report: Trust in Brand ChinaEdelman
 
2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report 2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report Edelman
 
Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018Edelman
 
2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAE2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAEEdelman
 
2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia Report2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia ReportEdelman
 
2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia Results2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia ResultsEdelman
 
2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa Report2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa ReportEdelman
 
2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil Report2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil ReportEdelman
 
Edelman 2018 Federal Budget Update
Edelman 2018 Federal Budget UpdateEdelman 2018 Federal Budget Update
Edelman 2018 Federal Budget UpdateEdelman
 

More from Edelman (20)

2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
 
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
 
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
 
2018 Federal Cabinet Shuffle
2018 Federal Cabinet Shuffle2018 Federal Cabinet Shuffle
2018 Federal Cabinet Shuffle
 
The Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet ShuffleThe Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet Shuffle
 
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World 2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
 
Edelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry PerceptionsEdelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry Perceptions
 
2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional Investors2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional Investors
 
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
 
8 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 20188 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 2018
 
The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018
 
2018 Edelman Trust Barometer Special Report: Trust in Brand China
2018 Edelman Trust Barometer Special Report:  Trust in Brand China2018 Edelman Trust Barometer Special Report:  Trust in Brand China
2018 Edelman Trust Barometer Special Report: Trust in Brand China
 
2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report 2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report
 
Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018
 
2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAE2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAE
 
2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia Report2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia Report
 
2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia Results2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia Results
 
2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa Report2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa Report
 
2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil Report2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil Report
 
Edelman 2018 Federal Budget Update
Edelman 2018 Federal Budget UpdateEdelman 2018 Federal Budget Update
Edelman 2018 Federal Budget Update
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Privacy Risk at an All-Time High

  • 1. EDELMAN PRIVACY RISK INDEX POWERED BY PONEMON
  • 2. BUSINESS LEFT VULNERABLE TO PRIVACY RISK Privacy risks can have a substantial impact on business operations and corporate reputation. Edelman’s privacy research shows, for the Companies face increasing regulation and first time, the main drivers of privacy risk. potential fines for the misuse and loss of The survey reveals: sensitive information. If regulatory pressure isn’t enough, not a week goes by without a company Privacy risks are at an all-time high, presenting or an entire industry in the news for an alleged a significant challenge for businesses. privacy violation, causing significant harm to corporate reputation. Businesses are struggling to manage the privacy practices that most contribute to risk. Managing data security and privacy effectively is essential to businesses today. The growing Operating globally and in financial services volume and sensitivity of information being and health industries significantly contributes shared, stored and used is driving demand for to risk. greater transparency about how it is being managed and protected.
  • 3. PRIVACY RISK AT AN ALL-TIME HIGH
  • 4. THE CONSEQUENCES OF PRIVACY RISK The costs are high. Businesses are losing customers and money, reputations suffer. As a result, license to operate hangs in the balance. CUSTOMERS CORPORATE REPUTATION MONEY BUSINESS DISRUPTION
  • 5. DRIVERS OF PRIVACY RISK AND LIABILITY CONSUMER CONCERN REGULATORY ENFORCEMENT Three quarters of consumers will stop using an online FTC levels $22.5 million for privacy violation shop if information was accessed without permission Proposed EU legislation may include fines up to 2% of annual turnover Less than half of consumers trust healthcare organizations to protect information Edelman DSP Group Study LITIGATION MEDIA SCRUTINY Average settlement $2,500 per plaintiff, and mean attorneys’ fees of $1.2 million Temple University Beasley School of Law
  • 6.
  • 7. INTRODUCING THE EDELMAN PRIVACY RISK INDEX The Edelman Privacy Risk Index (ePRI) is a global benchmarking study and tool that measures the top drivers of privacy risk for businesses. The ePRI explores how companies are managing privacy risk caused by business practices and operations. • Based on analysis of research from the Ponemon Institute over the last three years • Analysis of 6,400 individual responses by risk managers, privacy professionals and IT Pros • 29 countries included in benchmarking and tools • The research serves as the baseline for an online tool that allows companies to access their privacy risk against the benchmark • Intended to be directional NOT diagnostic
  • 8. ELEMENTS OF PRIVACY RISK The Edelman Privacy Risk Index reveals a lack of preparedness in managing the potential financial and reputational damage relating to the loss or misuse of personal information. Our survey found companies face significant risk due to business profile and failing to implement strong privacy practices. BUSINESS PRIVACY PROFILE: PRACTICES: WHAT DEFINES HOW YOU Overall YOUR BUSINESS OPERATE RISK
  • 10. BUSINESS PROFILE Companies must understand how their business profile contributes to their privacy risk. Those operating in high risk environments are particularly vulnerable to incidents if they don’t properly manage privacy practices. Industry Headcount/ Geography Size RISK Info Collected/ Managed Footprint
  • 11. BUSINESS PROFILE RISK AT A GLANCE Geography Footprint Industry Headcount/ Info Collected Size HIGHEST RISK HIGHEST RISK HIGHEST RISK HIGHEST RISK HIGHEST RISK • Belgium • Global and Super • Financial • Small- and • Sensitive • Italy Regional Services Medium-sized Customer • Spain • Health/Pharma Businesses Information • Communications LOWEST RISK LOWEST RISK LOWEST RISK LOWER RISK LOWER RISK • China • Local • Industrial • Enterprise • Only Employee • India Automotive • Brazil • Manufacturing See appendix for full findings
  • 12. COMPANIES HAVE DIFFERENT STARTING RISKS Companies in different industries, markets and sizes have different starting points for operational risk. It’s essential that businesses understand where they stand and take action if they are at high risk. Company w/ Low Company w/ High Risk Profile Risk Profile VS. Brazil Italy Manufacturing Health Local Global Large Enterprise SMB Collects employee info Collects health and sensitive customer information
  • 14. PRACTICES THAT DETERMINE RISK The ePRI identified three pillars and twelve practices that are key indicators of businesses ability to mitigate risk of a data breach, privacy lawsuit or regulatory action. • My organization is transparent about what it does with employee and customer information. My organization is quick to respond to privacy complaints or questions from customers and regulators. Communications • My organization makes a substantial effort to educate employees about privacy and data security. & Engagement • Employees in my organization understand the importance of privacy and how to protect personal and/or sensitive information. • My organization considers privacy and the protection of personal information a corporate priority. • A high-level executive leads my organization's privacy program and is empowered to make decisions. • My organization understands global privacy cultural differences. Business • My organization strictly enforces all levels of non-compliance with laws and regulations. Operations • My organization believes a data breach would adversely affect our reputation and financial position. • My organization has ample resources to protect employee and customer information. • My organization is able to prevent and quickly detect the theft or misuse of personal information. Data Protection • My organization has the expertise and technology to protect personal information.
  • 15. BUSINESSES FALLING SHORT Fewer than half of those surveyed agreed they effectively manage risk, leaving them highly susceptible (or exposed) to a privacy incident. They are failing to: • Make privacy a priority and devote resources • Engage their employees • Embrace transparency • Manage regulatory concerns
  • 16. COMPANIES LACK RESOURCES AND EXPERTISE Approximately 2 out of 3 companies do NOT have the expertise and technology to protect personal information Over half do not have the resources needed to protect the information they collect
  • 17. COMPANIES FAIL TO PRIORITIZE Believe a data breach would not adversely 53% impact company reputation Do not consider privacy and protection of personal 60% information a corporate priority Don't have a high level executive managing privacy 61% programs
  • 18. COMPANIES FAIL TO ENGAGE EMPLOYEES Privacy incidents often originate when employees improperly use or accidently expose information. The ePRI found a majority or companies fail to address the potential risk presented by poor employee education. Over half (57%) of companies think their employees do not understand the importance of security and privacy 2 out of 3 companies surveyed do not proactively educate employees on privacy and security issues
  • 19. COMPANIES ARE NOT TRANSPARENT OR RESPONSIVE Despite new laws around the world calling for greater notice and consent before collecting consumer information and increased media scrutiny, companies struggle to be transparent and respond to complaints. Over half of the organizations surveyed (57%) are not transparent about what they do with personal information collected And 61% say they are not quick to respond to customer privacy complaints
  • 20. COMPANIES ARE LAX ON REGULATORY COMPLIANCE Many companies struggle to comply with increasing and evolving regulatory requirements around the globe. 6 out of 10 companies (61%) do not strictly enforce compliance regulations
  • 22. WHERE TO START 1 UNDERSTAND: Use the ePRI tool to better understand your company’s privacy risk. Share results with key stakeholders in legal, communications and technology to get consensus of risk. 2 PRIORITIZE: Armed with understanding, an enterprise now has a powerful directional lens to evaluate its privacy program. Smart organizations will prioritize the weakest elements of their privacy DNA (under- performing practices) with consideration for their potential impact on enterprise effectiveness. 3 ACTIVATE: Work cross-company on programs to improve at-risk privacy practices. Consider how communications, legal/risk and technology leaders can collaborate on solutions.
  • 23. UNDERSTAND YOUR RISK: ePRI TOOL Leverage the ePRI Tool to better understand your risk and how your practices relate to the benchmark.
  • 24. PRIORITZE: RISKY PRACTICES My organization considers privacy and the protection of personal information a corporate priority. Priority #1 Determine and explore deficient My organization has the expertise and technology to protect personal information. privacy practices Priority #2 most contributing to corporate risk. My organization is transparent about what it does with employee and customer information. My organization is quick to respond to consumers’ and regulators’ privacy complaints. Priority #3
  • 25. ACTIVATE CROSS-ORGANIZATION PRIVACY TEAM BUSINESS: Proper collection, use and storage of information. Embrace Privacy by Design. Invest in privacy LEGAL/GOV AFFAIRS: Compliance with local laws practices and in all the geographies of operation. programming to improve INFORMATION TECHNOLOGY: Technology systems to prevent and recover from a data incident. performance. COMMUNICATIONS: Employee engagement, stakeholder engagement, data breach communications.
  • 26. FIRST STEP: CONVENE PRIVACY WORKSHOP WITH EDELMAN OUTCOMES Customized Edelman and our Privacy Risk Privacy partners can meet with Snapshot Program you to help explore and Roadmaps prioritize areas of privacy risk. Internal Privacy Integration Playbooks
  • 27. EDELMAN SERVICES EDELMAN AND OUR PRIVACY PARTNERS CAN HELP WITH SYSTEMS INTEGRATION COMMUNICATIONS AUDIT POLICY/LEGAL • Security and privacy • Reputation and • Policy analysis and message development communications audit navigation • Internal • Privacy risk • Active regulatory and communications and assessment policymaker employee engagement • Communications team engagement integration • Litigation • Influencer and communications competitive mapping • Customer and market research • Influence policy • Privacy and security outcomes response management • Crisis protocols • Coalition building and • Data breach training grassroots support and simulations • Thought leadership and executive positioning
  • 28. CONTACT WEB: Datasecurity.edelman.com Edelman.com/expertise/practices/data security & privacy TWITTER: @EdelmanDSP CONTACT: Pete Pedersen, Global Chair, Technology Ben Boyd, Global Chair, Corporate Pete.Pedersen@edelman.com Ben.Boyd@edelman.com
  • 30. GAP IN CONSUMER TRUST Our survey, Privacy & Security: The New Drivers of Brand, Reputation and Action, shows a significant gap between the importance of privacy to consumers and the amount they trust companies to protect it. 92% Importance of privacy and security in each industry (global) 84% Trust in each industry to protect personal information (global) 78% 77% 69% 69% 63% 51% 50% 50% 48% 43% 37% 33% 27% 23% 12% 12% 11% 9% 6% Finance Online Medical & Government Social Technology News & Media Automotive Food & Gaming Utilities* Shopping & Healthcare Networking Grocery Retail Q7. How important is your privacy and security when doing business with the following industries? *NOTE: Utilities not included as a response code Q8. Which industry do you trust most to adequately protect your personal information? Please select the top three industries.
  • 31. CONSUMERS ATTRITION DUE TO PRIVACY Consumers will leave services if personal information was accessed without permission, costing negligent companies significantly in potential business. Consumers Likely to Switch Providers or Stop Using Services Entirely if Personal Information was Accessed Without Permission (Global) 80% 79% 77% 75% 75% 67% 67% 65% 63% 59% 55% 55% 54% 50% Base: All respondents (Global n=4,050) Q9. For the following types of companies, if your personal information was accessed without your permission, how likely would you be to switch to a different provider or stop using these services entirely, if they did have personal information on you? Please use a scale of 1-5, where 1 is “not at all likely” and 5 is “very likely.”
  • 32. REGULATORY ACTION IN UNITED STATES All Federal agencies with jurisdiction over privacy are significantly increasing enforcement and rhetoric about privacy violations by companies. Google pays $22.5 million to settle FTC charges it misrepresented privacy assurances. BlueCross BlueShield of Tennessee (BCBST) fined $1.5 million for 2009 data breach. SEC requires publicly traded companies to disclose data breaches citing the issue is a substantial business risk.
  • 33. A NEW REGIME IN THE EU EU institutions are currently discussing far-ranging proposals to modify and substantially overhaul the Union’s patchwork of 27 data protection regimes to create a new, single Europe-wide regime. If approved in the current format, the new regime would radically change the obligations of data controllers, strengthen competences of Data Protection Authorities (DPAs) and increase the rights of individuals. The current regulation draft foresees fines for non-compliance of up to 2% of annual turnover. The impact of this would be global.
  • 34. ASIA NOT FAR BEHIND Many countries in Asia are creating new privacy laws similar to those in place in Europe and the United States, imposing fines for data breaches and more stringent privacy standards. India: Passed Information Technology Rules (2011) Singapore: Personal Data Protection Act (2012) Hong Kong: Amended Personal Data Ordinance (2012) APEC Region: APEC Privacy Framework
  • 35. LITIGATION ON THE RISE “NebuAd Settles Lawsuit Over Behavioral “Lawsuit Claims Targeting Test” – MediaPost Microsoft, McDonald’s, Mazda & CBS Used Ads as Cover for Data Mining” – Network World Average settlement $2,500 per plaintiff, and mean attorneys’ fees of $1.2 million – Temple University Beasley School of Law “Facebook sued for $15 billion over alleged privacy infractions” – CNET
  • 36. CRITICAL MEDIA Companies face an increasingly critical and vocal media environment, creating a significant potential for reputational damage. GM's Boneheaded Security Tops Privacy Mistake Boardroom With OnStar Agendas Facebook Complies with EU Data Protection Apple moves to quell Law, Dumps Facial Path privacy gaffe Recognition Privacy Concerns Affect Purchase Questions for Amazon on Decisions Privacy and the Kindle Fire
  • 38. BY GEOGRAPHY The ePRI found operating in Europe presents the most privacy risk, likely due to recent policy developments and a significant cultural expectation of privacy. 50.9 58.7 NORTH EUROPE AMERICA 41.1 MIDDLE EAST 42.7 ASIA- PACIFIC 40.2 LATIN AMERICA
  • 39. RISK IN SPECIFIC MARKETS There are significant differences between the most and least risky countries. The eleven countries with the highest privacy risk are located in the European Union with many developing nations presenting lower risk. Belgium 68.6 Italy 65.2 Netherlands 64.1 Spain 62.5 France 59.2 Germany 59.1 Sweden 58.7 Poland 56.5 Denmark 56.3 Norway 55.0 Ireland 54.8 New Zealand 54.7 Australia 54.2 Canada 53.8 Argentina 53.3 United Kingdom 53.0 Russian Federation 50.4 Hong Kong 50.0 United States 48.1 Japan 43.2 Israel 42.2 United Arab Emirates 41.2 Saudi Arabia 39.7 Singapore 38.7 Mexico 37.9 Korea 37.2 China (PRC) 32.0 India 31.3 Brazil 29.3 - 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0
  • 40. CORPORATE FOOTPRINT INTRODUCES RISK Adding significant complexity to geographic concerns is the risk presented by operating in multiple markets. Local 80.0 The company primarily operates in one country 70.0 66.8 58.3 Regional 60.0 The company operates in two or more countries primarily 50.0 in one region 39.0 40.0 36.0 Super regional 30.0 The company operates in multiple countries in two or 20.0 more regions 10.0 Global - The company operates in all regions around the world Local Regional Super regional Global
  • 41. INDUSTRY BENCHMARK DRIVEN BY DATA Industries that collect the most sensitive information about customers present the most significant privacy risk. There is a significant drop off in privacy risk for organizations that don’t collect significant amounts of information online. Financial services 79.3 Health & pharma 78.3 Communications 66.0 Airlines 62.8 Professional services 61.0 Public sector 58.8 Education & research 56.5 Transportation 56.3 Hospitality 55.0 Energy & utilities 55.0 Technology & software 53.8 Retail (Internet) 52.0 Retail (conventional) 44.5 Consumer products 44.3 Services 39.5 Entertainment & media 32.8 Agriculture 32.3 Industrial 27.5 Automotive 24.0 Manufacturing 20.8 - 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0 90.0
  • 42. BY COMPANY SIZE Smaller organizations have substantially higher privacy risk than larger organizations. This can potentially be explained by larger organizations typically having more resources to devote to managing privacy risk. However, large organizations still face risks, often due to having a significant amounts of information and increased regulatory attention. 501 to 1,000 59.5 Less than 500 57.5 1.001 to 5,000 50.3 5,001 to 10,000 46.5 More than 75,000 45.8 25,001 to 75,000 45.8 10,001 to 25,000 44.8 - 10.0 20.0 30.0 40.0 50.0 60.0 70.0
  • 43. BY INFORMATION COLLECTED The volume and sensitivity of data collected significantly influences privacy risk. Types of personal information stored:  Customer with PII  Customer without PII  Employee  Consumer (targeted customer)  Citizen (government use)  Patient (health records)  Student  Shareholder/investor

Editor's Notes

  1. Edelman Privacy Risk Index by the Ponemon Institute See slide 7 for methodology
  2. Edelman Privacy Risk Index by the Ponemon Institute See slide 7 for methodology
  3. Edelman Privacy Risk Index by the Ponemon Institute See slide 7 for methodology
  4. Edelman Privacy Risk Index by the Ponemon Institute See slide 7 for methodology
  5. Edelman Privacy Risk Index by the Ponemon Institute See slide 7 for methodology
  6. Edelman Privacy Risk Index by the Ponemon Institute See slide 7 for methodology
  7. Edelman Privacy Risk Index by the Ponemon Institute See slide 7 for methodology
  8. Edelman Privacy Risk Index by the Ponemon Institute See slide 7 for methodology
  9. Edelman Privacy Risk Index by the Ponemon Institute See slide 7 for methodology
  10. Edelman Privacy Risk Index by the Ponemon Institute See slide 7 for methodology
  11. This needs to be visual.
  12. Edelman can host a summit to help your company better understand your privacy needs and the specific programing needed across functions. From there, we can help work with your existing team on new programing or bring in many of our partners who can assist as need on legal or technology needs.
  13. The premium placed on privacy and security also translates to the adoption and retention of customers using an online service. Several indicated a willingness to leave online services if personal information was accessed without permission. Consistent with other questions, people are most concerned about financial services, like mobile payment companies, banks and online retailers.  
  14. Data security and privacy can have a major impact on corporate reputation and receive a disproportionately high amount of media and regulatory attention. This is creating the need for greater corporate transparency and accountability on privacy and security issues. The FTC in the US and privacy regulators in the EU are taking companies to task for violating user privacy and are likely to receive increased regulatory authority. Data breaches take a significant toll on corporate reputation and can cause significant risk, making it an issue that boards must address. Finally, consumers are becoming more aware of privacy and security issues and they are affecting their purchasing decisions
  15. Operating in more than one region creates significantly more privacy risk and requires companies to look at risk for their entire operation. For instance, a US multinational operating in Brazil and in Germany needs means an incident impacting both markets it will have different ramifications in both of those markets AND the home market where it will be reported that the companies has been breached internationally.
  16. The sensitivity of information involved to operate in an industry has a significant baring on privacy risk. Health and financial services companies typically collect the largest amounts of sensitive information, leading to greater risk of damage due to a breach, more stringent regulatory rules in several markets and are being regularly targeted by cyber attacks.