SlideShare a Scribd company logo
1 of 43
Download to read offline
EDELMAN PRIVACY RISK INDEX
POWERED BY PONEMON
BUSINESS LEFT VULNERABLE TO PRIVACY RISK

Privacy risks can have a substantial impact on
business operations and corporate reputation.         Edelman’s privacy research shows, for the
Companies face increasing regulation and              first time, the main drivers of privacy risk.
potential fines for the misuse and loss of            The survey reveals:
sensitive information. If regulatory pressure isn’t
enough, not a week goes by without a company
                                                          Privacy risks are at an all-time high, presenting
or an entire industry in the news for an alleged
                                                          a significant challenge for businesses.
privacy violation, causing significant harm to
corporate reputation.
                                                          Businesses are struggling to manage the
                                                          privacy practices that most contribute to risk.
Managing data security and privacy effectively is
essential to businesses today. The growing                Operating globally and in financial services
volume and sensitivity of information being               and health industries significantly contributes
shared, stored and used is driving demand for             to risk.
greater transparency about how it is being
managed and protected.
PRIVACY RISK AT AN ALL-TIME HIGH
THE CONSEQUENCES OF PRIVACY RISK
The costs are high. Businesses are losing customers and money,
reputations suffer. As a result, license to operate hangs in the balance.




          CUSTOMERS                            CORPORATE REPUTATION




              MONEY                              BUSINESS DISRUPTION
DRIVERS OF PRIVACY RISK AND LIABILITY

   CONSUMER CONCERN                                        REGULATORY ENFORCEMENT


   Three quarters of consumers will stop using an online
                                                           FTC levels $22.5 million for privacy violation
   shop if information was accessed without permission

                                                           Proposed EU legislation may include fines up to 2%
                                                           of annual turnover
   Less than half of consumers trust healthcare
   organizations to protect information
   Edelman DSP Group Study


   LITIGATION                                              MEDIA SCRUTINY
   Average settlement $2,500 per plaintiff, and
   mean attorneys’ fees of $1.2 million
   Temple University Beasley School of Law
INTRODUCING THE EDELMAN PRIVACY RISK INDEX

  The Edelman Privacy Risk Index (ePRI) is a global benchmarking study and tool that
  measures the top drivers of privacy risk for businesses. The ePRI explores how companies
  are managing privacy risk caused by business practices and operations.



• Based on analysis of research from the Ponemon Institute over the last three years

• Analysis of 6,400 individual responses by risk managers, privacy professionals and IT Pros

• 29 countries included in benchmarking and tools

• The research serves as the baseline for an online tool that allows companies to access their
  privacy risk against the benchmark

• Intended to be directional NOT diagnostic
ELEMENTS OF PRIVACY RISK
The Edelman Privacy Risk Index reveals a lack of preparedness in managing the potential financial and reputational
damage relating to the loss or misuse of personal information. Our survey found companies face significant risk due to
business profile and failing to implement strong privacy practices.




     BUSINESS                                          PRIVACY
      PROFILE:                                        PRACTICES:
   WHAT DEFINES                                        HOW YOU                                       Overall
   YOUR BUSINESS                                       OPERATE                                        RISK
WHAT DEFINES
YOUR BUSINESS
BUSINESS PROFILE
Companies must understand how their business profile contributes to their privacy risk. Those
operating in high risk environments are particularly vulnerable to incidents if they don’t properly
manage privacy practices.




                                             Industry



                                                                                    Headcount/
     Geography                                                                         Size




                                              RISK
    Info Collected/
       Managed                                                                       Footprint
BUSINESS PROFILE RISK AT A GLANCE



      Geography                      Footprint            Industry            Headcount/          Info Collected
                                                                                 Size


         HIGHEST RISK                  HIGHEST RISK         HIGHEST RISK         HIGHEST RISK         HIGHEST RISK

 • Belgium                       • Global and Super   • Financial          • Small- and         • Sensitive
 • Italy                           Regional             Services             Medium-sized         Customer
 • Spain                                              • Health/Pharma        Businesses           Information
                                                      • Communications


         LOWEST RISK                   LOWEST RISK          LOWEST RISK          LOWER RISK           LOWER RISK

 • China                         • Local              • Industrial         • Enterprise         • Only Employee
 • India                                                Automotive
 • Brazil                                             • Manufacturing




See appendix for full findings
COMPANIES HAVE DIFFERENT STARTING RISKS
Companies in different industries, markets and sizes have different starting points for operational risk.
It’s essential that businesses understand where they stand and take action if they are at high risk.



             Company w/ Low                                               Company w/ High
             Risk Profile                                                 Risk Profile
                                               VS.
    Brazil                                                      Italy
    Manufacturing                                               Health
    Local                                                       Global
    Large Enterprise                                            SMB
    Collects employee info                                      Collects health and sensitive
                                                                customer information
PRIVACY PRACTICES
PRACTICES THAT DETERMINE RISK
The ePRI identified three pillars and twelve practices that are key indicators of businesses ability to
mitigate risk of a data breach, privacy lawsuit or regulatory action.


                      •   My organization is transparent about what it does with employee and customer information.

                          My organization is quick to respond to privacy complaints or questions from customers and regulators.

Communications        •   My organization makes a substantial effort to educate employees about privacy and data security.

 & Engagement         •   Employees in my organization understand the importance of privacy and how to protect personal and/or sensitive
                          information.

                      •   My organization considers privacy and the protection of personal information a corporate priority.

                      •   A high-level executive leads my organization's privacy program and is empowered to make decisions.

                      •   My organization understands global privacy cultural differences.
   Business
                      •   My organization strictly enforces all levels of non-compliance with laws and regulations.
  Operations

                      •   My organization believes a data breach would adversely affect our reputation and financial position.

                      •   My organization has ample resources to protect employee and customer information.

                      •   My organization is able to prevent and quickly detect the theft or misuse of personal information.

Data Protection       •   My organization has the expertise and technology to protect personal information.
BUSINESSES FALLING SHORT

 Fewer than half of those surveyed agreed they effectively manage risk,
 leaving them highly susceptible (or exposed) to a privacy incident.


 They are failing to:

     •   Make privacy a priority and devote resources

     •   Engage their employees

     •   Embrace transparency

     •   Manage regulatory concerns
COMPANIES LACK RESOURCES AND EXPERTISE



                  Approximately 2 out of 3 companies do
                  NOT have the expertise and technology
                  to protect personal information




                  Over half do not have the resources
                  needed to protect the information they
                  collect
COMPANIES FAIL TO PRIORITIZE



         Believe a data breach would not adversely
   53%   impact company reputation



         Do not consider privacy and protection of personal
   60%   information a corporate priority




         Don't have a high level executive managing privacy
   61%   programs
COMPANIES FAIL TO ENGAGE EMPLOYEES

Privacy incidents often originate when employees improperly use or accidently expose
information. The ePRI found a majority or companies fail to address the potential risk
presented by poor employee education.



                                 Over half (57%) of companies think their
                                 employees do not understand the importance
                                 of security and privacy




                                2 out of 3 companies surveyed do not proactively
                                educate employees on privacy and security issues
COMPANIES ARE NOT TRANSPARENT OR
RESPONSIVE
Despite new laws around the world calling for greater notice and consent before collecting consumer
information and increased media scrutiny, companies struggle to be transparent and respond to
complaints.



                           Over half of the organizations surveyed (57%)
                           are not transparent about what they do with
                           personal information collected




                           And 61% say they are not quick to respond to
                           customer privacy complaints
COMPANIES ARE LAX ON REGULATORY
COMPLIANCE
Many companies struggle to comply with increasing and evolving regulatory requirements
around the globe.




6 out of 10 companies (61%) do not strictly
enforce compliance regulations
MANAGING PRIVACY RISK
WHERE TO START



1   UNDERSTAND:            Use the ePRI tool to better understand your company’s privacy risk. Share results
    with key stakeholders in legal, communications and technology to get consensus of risk.




2
    PRIORITIZE:        Armed with understanding, an enterprise now has a powerful directional lens to evaluate its
    privacy program. Smart organizations will prioritize the weakest elements of their privacy DNA (under-
    performing practices) with consideration for their potential impact on enterprise effectiveness.




3   ACTIVATE: Work cross-company on programs to improve at-risk privacy practices. Consider how
    communications, legal/risk and technology leaders can collaborate on solutions.
UNDERSTAND YOUR RISK: ePRI TOOL




Leverage the ePRI Tool
to better understand your
risk and how your
practices relate to the
benchmark.
PRIORITZE: RISKY PRACTICES

                             My organization considers privacy and the
                             protection of personal information a corporate priority.


                                                  Priority #1

Determine and
explore deficient            My organization has the expertise and technology
                             to protect personal information.
privacy practices
                                                  Priority #2
most contributing
to corporate risk.
                             My organization is transparent about what it does
                             with employee and customer information.




                             My organization is quick to respond to consumers’
                             and regulators’ privacy complaints.


                                                  Priority #3
ACTIVATE CROSS-ORGANIZATION PRIVACY TEAM


                    BUSINESS: Proper collection, use and storage of
                    information. Embrace Privacy by Design.

Invest in privacy
                    LEGAL/GOV AFFAIRS: Compliance with local laws
practices and       in all the geographies of operation.
programming to
improve             INFORMATION TECHNOLOGY: Technology systems
                    to prevent and recover from a data incident.
performance.

                    COMMUNICATIONS: Employee engagement,
                    stakeholder engagement, data breach
                    communications.
FIRST STEP: CONVENE PRIVACY WORKSHOP
WITH EDELMAN
                               OUTCOMES

                                         Customized
Edelman and our
                          Privacy Risk     Privacy
partners can meet with     Snapshot       Program
you to help explore and                  Roadmaps
prioritize areas of
privacy risk.

                            Internal      Privacy
                          Integration    Playbooks
EDELMAN SERVICES
EDELMAN AND OUR PRIVACY PARTNERS CAN HELP
WITH SYSTEMS INTEGRATION

    COMMUNICATIONS          AUDIT                    POLICY/LEGAL


• Security and privacy   • Reputation and         • Policy analysis and
  message development      communications audit     navigation
• Internal               • Privacy risk           • Active regulatory and
  communications and       assessment               policymaker
  employee engagement    • Communications team      engagement
                           integration            • Litigation
• Influencer and                                    communications
  competitive mapping    • Customer and market
                           research               • Influence policy
• Privacy and security                              outcomes
  response management    • Crisis protocols
                                                  • Coalition building and
• Data breach training                              grassroots support
  and simulations
• Thought leadership
  and executive
  positioning
CONTACT




   WEB:
   Datasecurity.edelman.com
   Edelman.com/expertise/practices/data security & privacy


   TWITTER:
   @EdelmanDSP


   CONTACT:
   Pete Pedersen, Global Chair, Technology             Ben Boyd, Global Chair, Corporate
   Pete.Pedersen@edelman.com                           Ben.Boyd@edelman.com
APPENDIX I
LANDSCAPE RESEARCH
GAP IN CONSUMER TRUST
 Our survey, Privacy & Security: The New Drivers of Brand, Reputation and Action, shows a significant gap between
 the importance of privacy to consumers and the amount they trust companies to protect it.


   92%                                                                           Importance of privacy and security in each industry (global)
                84%                                                              Trust in each industry to protect personal information (global)
                            78%           77%
         69%                                           69%
                                                                    63%

                                  51%                                           50%         50%
                                                48%
                                                                                                        43%
                                                                                                                  37%
                      33%
                                                                          27%
                                                                                                                                 23%

                                                          12%                      12%                     11%
                                                                                                  9%
                                                                                                                        6%


   Finance       Online     Medical &    Government     Social     Technology News & Media Automotive   Food &    Gaming     Utilities*
               Shopping &   Healthcare                Networking                                        Grocery
                 Retail




Q7. How important is your privacy and security when doing business with the following industries? *NOTE: Utilities not included as a response code
Q8. Which industry do you trust most to adequately protect your personal information? Please select the top three industries.
CONSUMERS ATTRITION DUE TO PRIVACY
Consumers will leave services if personal information was accessed without permission,
costing negligent companies significantly in potential business.


Consumers Likely to Switch Providers or Stop Using Services Entirely if Personal Information was
Accessed Without Permission (Global)
   80%         79%        77%         75%        75%
                                                             67%        67%         65%        63%
                                                                                                          59%
                                                                                                                      55%        55%         54%
                                                                                                                                                        50%




Base: All respondents (Global n=4,050)
Q9. For the following types of companies, if your personal information was accessed without your permission, how likely would you be to switch to a different
provider or stop using these services entirely, if they did have personal information on you? Please use a scale of 1-5, where 1 is “not at all likely” and 5 is “very
likely.”
REGULATORY ACTION IN UNITED STATES
All Federal agencies with jurisdiction over privacy are significantly increasing
enforcement and rhetoric about privacy violations by companies.


                          Google pays $22.5 million to settle FTC charges
                          it misrepresented privacy assurances.




                          BlueCross BlueShield of Tennessee (BCBST)
                          fined $1.5 million for 2009 data breach.



                          SEC requires publicly traded companies to disclose
                          data breaches citing the issue is a substantial
                          business risk.
A NEW REGIME IN THE EU


EU institutions are currently discussing far-ranging proposals to modify and
substantially overhaul the Union’s patchwork of 27 data protection regimes to
create a new, single Europe-wide regime.

If approved in the current format, the new regime would radically change the
obligations of data controllers, strengthen competences of Data Protection
Authorities (DPAs) and increase the rights of individuals.

The current regulation draft foresees fines for non-compliance of up to 2% of
annual turnover. The impact of this would be global.
ASIA NOT FAR BEHIND
Many countries in Asia are creating new privacy laws similar to those in place in Europe
and the United States, imposing fines for data breaches and more stringent privacy
standards.


             India: Passed Information Technology Rules (2011)

             Singapore: Personal Data Protection Act (2012)

             Hong Kong: Amended Personal Data Ordinance (2012)

             APEC Region: APEC Privacy Framework
LITIGATION ON THE RISE


“NebuAd Settles Lawsuit Over Behavioral    “Lawsuit Claims Microsoft, McDonald’s,
       Targeting Test” – MediaPost          Mazda & CBS Used Ads as Cover for
                                                        Data Mining”
                                                        – Network World

        Average settlement $2,500 per
        plaintiff, and mean attorneys’
        fees of $1.2 million – Temple
        University Beasley School of Law


          “Facebook sued for
    $15 billion over alleged privacy
            infractions” – CNET
CRITICAL MEDIA
Companies face an increasingly critical and vocal media environment, creating a significant potential for
reputational damage.




    GM's Boneheaded                    Security Tops
    Privacy Mistake With               Boardroom
    OnStar                             Agendas




                                      Facebook Complies with
                                      EU Data Protection Law,
    Apple moves to quell              Dumps Facial
    Path privacy gaffe                Recognition




    Privacy Concerns
    Affect Purchase                  Questions for Amazon on
    Decisions                        Privacy and the Kindle Fire
APPENDIX II
EDELMAN PRIVACY RISK INDEX
BY GEOGRAPHY
The ePRI found operating in Europe presents the most privacy risk, likely due to recent policy
developments and a significant cultural expectation of privacy.




        50.9                              58.7
        NORTH                            EUROPE
       AMERICA                                       41.1
                                                     MIDDLE
                                                      EAST
                                                                                 42.7
                                                                                  ASIA-
                                                                                 PACIFIC



                    40.2
                    LATIN
                   AMERICA
RISK IN SPECIFIC MARKETS
  There are significant differences between the most and least risky countries. The eleven countries
  with the highest privacy risk are located in the European Union with many developing nations
  presenting lower risk.
             Belgium                                                                                                   68,6
                   Italy                                                                                        65,2
         Netherlands                                                                                          64,1
                 Spain                                                                                     62,5
               France                                                                               59,2
            Germany                                                                                 59,1
             Sweden                                                                                58,7
               Poland                                                                          56,5
            Denmark                                                                            56,3
              Norway                                                                        55,0
               Ireland                                                                      54,8
        New Zealand                                                                         54,7
             Australia                                                                     54,2
              Canada                                                                      53,8
            Argentina                                                                    53,3
     United Kingdom                                                                      53,0
 Russian Federation                                                               50,4
          Hong Kong                                                              50,0
        United States                                                         48,1
                Japan                                                  43,2
                 Israel                                               42,2
United Arab Emirates                                               41,2
        Saudi Arabia                                             39,7
           Singapore                                          38,7
              Mexico                                         37,9
                Korea                                       37,2
        China (PRC)                                  32,0
                  India                            31,3
                 Brazil                         29,3
                           -   10,0   20,0   30,0           40,0              50,0              60,0               70,0       80,0
CORPORATE FOOTPRINT INTRODUCES RISK

Adding significant complexity to geographic concerns is the risk presented by
operating in multiple markets.
                                                       Local
80,0                                                   The company primarily operates in one country
70,0                                          66,8

                                 58,3                  Regional
60,0
                                                       The company operates in two or more countries primarily
50,0                                                   in one region
                   39,0
40,0    36,0
                                                       Super regional
30,0                                                   The company operates in multiple countries in two or
20,0
                                                       more regions

10,0
                                                       Global
  -                                                    The company operates in all regions around the world
       Local     Regional   Super regional   Global
INDUSTRY BENCHMARK DRIVEN BY DATA
Industries that collect the most sensitive information about customers present the most significant privacy risk. There is a
significant drop off in privacy risk for organizations that don’t collect significant amounts of information online.

                   Financial services                                                                                                    79,3
                    Health & pharma                                                                                                     78,3
                    Communications                                                                                          66,0
                              Airlines                                                                                  62,8
                Professional services                                                                                61,0
                        Public sector                                                                            58,8
                Education & research                                                                          56,5
                       Transportation                                                                         56,3
                           Hospitality                                                                    55,0
                    Energy & utilities                                                                    55,0
               Technology & software                                                                     53,8
                      Retail (Internet)                                                                52,0
                 Retail (conventional)                                                        44,5
                 Consumer products                                                            44,3
                             Services                                                  39,5
               Entertainment & media                                         32,8
                           Agriculture                                       32,3
                            Industrial                                27,5
                          Automotive                           24,0
                       Manufacturing                        20,8

                                          -   10,0   20,0          30,0             40,0        50,0          60,0             70,0   80,0      90,0
BY COMPANY SIZE
Smaller organizations have substantially higher privacy risk than larger organizations. This can potentially be
explained by larger organizations typically having more resources to devote to managing privacy risk.
However, large organizations still face risks, often due to having a significant amounts of information and
increased regulatory attention.



           501 to 1,000                                                                            59,5


          Less than 500                                                                          57,5


          1.001 to 5,000                                                                  50,3


        5,001 to 10,000                                                            46,5


       More than 75,000                                                           45,8


       25,001 to 75,000                                                           45,8


       10,001 to 25,000                                                          44,8


                           -       10,0        20,0        30,0        40,0         50,0         60,0      70,0
BY INFORMATION COLLECTED
The volume and sensitivity of data collected significantly influences privacy risk.




     Types of personal information stored:
        Customer with PII                         Customer without PII
        Employee                                  Consumer (targeted customer)
        Citizen (government use)                  Patient (health records)
        Student                                   Shareholder/investor

More Related Content

What's hot

A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021Merry D'souza
 
The risk landscape dave cunningham quoted sep 2008
The risk landscape   dave cunningham quoted sep 2008The risk landscape   dave cunningham quoted sep 2008
The risk landscape dave cunningham quoted sep 2008David Cunningham
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatImperva
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
Deloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-surveyDeloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-surveyBluemap Consulting Group
 
A brief overview of operational risk
A brief overview of operational riskA brief overview of operational risk
A brief overview of operational riskDiane Christina
 
Riskpro Introduction
Riskpro IntroductionRiskpro Introduction
Riskpro IntroductionManoj Jain
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmDavid Sweigert
 
Risk neversleeps wps-016
Risk neversleeps wps-016Risk neversleeps wps-016
Risk neversleeps wps-016Jake Lepine
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalNicholas Cramer
 
Regulation raises the risk for global subsidiaries
Regulation raises the risk for global subsidiariesRegulation raises the risk for global subsidiaries
Regulation raises the risk for global subsidiariesNair and Co.
 

What's hot (20)

Risk Forum For Attendees
Risk Forum For AttendeesRisk Forum For Attendees
Risk Forum For Attendees
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021
 
The risk landscape dave cunningham quoted sep 2008
The risk landscape   dave cunningham quoted sep 2008The risk landscape   dave cunningham quoted sep 2008
The risk landscape dave cunningham quoted sep 2008
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider Threat
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Riskpro brief introduction
Riskpro brief introductionRiskpro brief introduction
Riskpro brief introduction
 
7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec
 
Ciso NYC
Ciso NYCCiso NYC
Ciso NYC
 
Deloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-surveyDeloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-survey
 
A brief overview of operational risk
A brief overview of operational riskA brief overview of operational risk
A brief overview of operational risk
 
Riskpro Introduction
Riskpro IntroductionRiskpro Introduction
Riskpro Introduction
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
 
PEO Risk Management Advisor 5/2011
PEO Risk Management Advisor 5/2011PEO Risk Management Advisor 5/2011
PEO Risk Management Advisor 5/2011
 
Risk neversleeps wps-016
Risk neversleeps wps-016Risk neversleeps wps-016
Risk neversleeps wps-016
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
 
Regulation raises the risk for global subsidiaries
Regulation raises the risk for global subsidiariesRegulation raises the risk for global subsidiaries
Regulation raises the risk for global subsidiaries
 

Viewers also liked

2013 edelman trust barometer germany deck
2013 edelman trust barometer germany deck2013 edelman trust barometer germany deck
2013 edelman trust barometer germany deckEdelman.ergo GmbH
 
Edelman UK Trust Barometer
Edelman UK Trust BarometerEdelman UK Trust Barometer
Edelman UK Trust BarometerEdelman_UK
 
www.5dollarsin5days.org Case Study
www.5dollarsin5days.org Case Studywww.5dollarsin5days.org Case Study
www.5dollarsin5days.org Case StudyJami Mullikin
 
Edelman Capital Staffers Index 2011
Edelman Capital Staffers Index 2011Edelman Capital Staffers Index 2011
Edelman Capital Staffers Index 2011Edelman.ergo GmbH
 
Strategy One Economy Powerpoint
Strategy One Economy PowerpointStrategy One Economy Powerpoint
Strategy One Economy PowerpointBradleyHonan
 
Global Deck: 2011 Capital Staffers Index
Global Deck: 2011 Capital Staffers IndexGlobal Deck: 2011 Capital Staffers Index
Global Deck: 2011 Capital Staffers IndexEdelman
 
Women entrepreneur
Women entrepreneurWomen entrepreneur
Women entrepreneurSunidhi Jain
 

Viewers also liked (7)

2013 edelman trust barometer germany deck
2013 edelman trust barometer germany deck2013 edelman trust barometer germany deck
2013 edelman trust barometer germany deck
 
Edelman UK Trust Barometer
Edelman UK Trust BarometerEdelman UK Trust Barometer
Edelman UK Trust Barometer
 
www.5dollarsin5days.org Case Study
www.5dollarsin5days.org Case Studywww.5dollarsin5days.org Case Study
www.5dollarsin5days.org Case Study
 
Edelman Capital Staffers Index 2011
Edelman Capital Staffers Index 2011Edelman Capital Staffers Index 2011
Edelman Capital Staffers Index 2011
 
Strategy One Economy Powerpoint
Strategy One Economy PowerpointStrategy One Economy Powerpoint
Strategy One Economy Powerpoint
 
Global Deck: 2011 Capital Staffers Index
Global Deck: 2011 Capital Staffers IndexGlobal Deck: 2011 Capital Staffers Index
Global Deck: 2011 Capital Staffers Index
 
Women entrepreneur
Women entrepreneurWomen entrepreneur
Women entrepreneur
 

Similar to Edelman Privacy Risk Index 2012

To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsElizabeth Dimit
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...IDology, Inc
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudWynyard Group
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk ManagementManoj Jain
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
ERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSMichel Rochette
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?IBM Security
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Satyanandan Atyam
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Prepare For Breaches Like a Pro
Prepare For Breaches Like a ProPrepare For Breaches Like a Pro
Prepare For Breaches Like a ProResilient Systems
 

Similar to Edelman Privacy Risk Index 2012 (20)

To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk Management
 
Riskpro information risk management
Riskpro information risk managementRiskpro information risk management
Riskpro information risk management
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk Management
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk Management
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
ERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORS
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
Riskpro information risk management 2013
Riskpro information risk management 2013Riskpro information risk management 2013
Riskpro information risk management 2013
 
Riskpro information risk management 2013
Riskpro information risk management 2013Riskpro information risk management 2013
Riskpro information risk management 2013
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Prepare For Breaches Like a Pro
Prepare For Breaches Like a ProPrepare For Breaches Like a Pro
Prepare For Breaches Like a Pro
 

More from Edelman.ergo GmbH

Edelman Trust Barometer 2016: Vertrauen in Lebensmittelwirtschaft
Edelman Trust Barometer 2016: Vertrauen in LebensmittelwirtschaftEdelman Trust Barometer 2016: Vertrauen in Lebensmittelwirtschaft
Edelman Trust Barometer 2016: Vertrauen in LebensmittelwirtschaftEdelman.ergo GmbH
 
Edelman Trust Barometer 2016: Ergebnisse Financial Services
Edelman Trust Barometer 2016: Ergebnisse Financial ServicesEdelman Trust Barometer 2016: Ergebnisse Financial Services
Edelman Trust Barometer 2016: Ergebnisse Financial ServicesEdelman.ergo GmbH
 
ergo ETF-Monitor 2014 - powered by finanzen.net
ergo ETF-Monitor 2014 - powered by finanzen.netergo ETF-Monitor 2014 - powered by finanzen.net
ergo ETF-Monitor 2014 - powered by finanzen.netEdelman.ergo GmbH
 
ergo Umfrage zur Rolle der GKV-Reform bei gesetzlichen Krankenversicherungen
ergo Umfrage zur Rolle der GKV-Reform bei gesetzlichen Krankenversicherungenergo Umfrage zur Rolle der GKV-Reform bei gesetzlichen Krankenversicherungen
ergo Umfrage zur Rolle der GKV-Reform bei gesetzlichen KrankenversicherungenEdelman.ergo GmbH
 
ergo Immotalk auf der exporeal 2015
ergo Immotalk auf der exporeal 2015ergo Immotalk auf der exporeal 2015
ergo Immotalk auf der exporeal 2015Edelman.ergo GmbH
 
Bürgerbeteiligung und Energiewende
Bürgerbeteiligung und EnergiewendeBürgerbeteiligung und Energiewende
Bürgerbeteiligung und EnergiewendeEdelman.ergo GmbH
 
ergo ETF Monitor powered by finanzen.net - Ergebnisse 2013
ergo ETF Monitor powered by finanzen.net - Ergebnisse 2013ergo ETF Monitor powered by finanzen.net - Ergebnisse 2013
ergo ETF Monitor powered by finanzen.net - Ergebnisse 2013Edelman.ergo GmbH
 
Folgen der Medienkrise für die Kommunikation in der Finanzbranche
Folgen der Medienkrise für die Kommunikation in der FinanzbrancheFolgen der Medienkrise für die Kommunikation in der Finanzbranche
Folgen der Medienkrise für die Kommunikation in der FinanzbrancheEdelman.ergo GmbH
 
Die wichtigsten digitalen Trends für Finanzdienstleister
Die wichtigsten digitalen Trends für FinanzdienstleisterDie wichtigsten digitalen Trends für Finanzdienstleister
Die wichtigsten digitalen Trends für FinanzdienstleisterEdelman.ergo GmbH
 
Edelman Trust Barometer 2016: Ergebnisse Deutschland
Edelman Trust Barometer 2016: Ergebnisse DeutschlandEdelman Trust Barometer 2016: Ergebnisse Deutschland
Edelman Trust Barometer 2016: Ergebnisse DeutschlandEdelman.ergo GmbH
 
Edelman: Globale Lebensmitteltrends 2016
Edelman: Globale Lebensmitteltrends 2016Edelman: Globale Lebensmitteltrends 2016
Edelman: Globale Lebensmitteltrends 2016Edelman.ergo GmbH
 
Präsentation Edelman Markenstudie Innovation and the Earned Brand 2015
Präsentation Edelman Markenstudie Innovation and the Earned Brand 2015Präsentation Edelman Markenstudie Innovation and the Earned Brand 2015
Präsentation Edelman Markenstudie Innovation and the Earned Brand 2015Edelman.ergo GmbH
 
2015 Edelman Food Trust Germany
2015 Edelman Food Trust Germany2015 Edelman Food Trust Germany
2015 Edelman Food Trust GermanyEdelman.ergo GmbH
 
Edelman Food Trends 2015 Deutschland
Edelman Food Trends 2015 DeutschlandEdelman Food Trends 2015 Deutschland
Edelman Food Trends 2015 DeutschlandEdelman.ergo GmbH
 
Edelman Food Trends 2015 Deutschland
Edelman Food Trends 2015 DeutschlandEdelman Food Trends 2015 Deutschland
Edelman Food Trends 2015 DeutschlandEdelman.ergo GmbH
 
Die Deutschen haben Angst vor Innovationen - Edelman Trust Barometer 2015 Erg...
Die Deutschen haben Angst vor Innovationen - Edelman Trust Barometer 2015 Erg...Die Deutschen haben Angst vor Innovationen - Edelman Trust Barometer 2015 Erg...
Die Deutschen haben Angst vor Innovationen - Edelman Trust Barometer 2015 Erg...Edelman.ergo GmbH
 
EDELMAN MARKENSTUDIE BRANDSHARE 2014: Bindungswilliger Konsument sucht Marke,...
EDELMAN MARKENSTUDIE BRANDSHARE 2014: Bindungswilliger Konsument sucht Marke,...EDELMAN MARKENSTUDIE BRANDSHARE 2014: Bindungswilliger Konsument sucht Marke,...
EDELMAN MARKENSTUDIE BRANDSHARE 2014: Bindungswilliger Konsument sucht Marke,...Edelman.ergo GmbH
 
Edelman Trust Barometer 2014 Sonderausgabe Familienunternehmen
Edelman Trust Barometer 2014 Sonderausgabe FamilienunternehmenEdelman Trust Barometer 2014 Sonderausgabe Familienunternehmen
Edelman Trust Barometer 2014 Sonderausgabe FamilienunternehmenEdelman.ergo GmbH
 

More from Edelman.ergo GmbH (20)

Edelman Trust Barometer 2016: Vertrauen in Lebensmittelwirtschaft
Edelman Trust Barometer 2016: Vertrauen in LebensmittelwirtschaftEdelman Trust Barometer 2016: Vertrauen in Lebensmittelwirtschaft
Edelman Trust Barometer 2016: Vertrauen in Lebensmittelwirtschaft
 
Edelman Trust Barometer 2016: Ergebnisse Financial Services
Edelman Trust Barometer 2016: Ergebnisse Financial ServicesEdelman Trust Barometer 2016: Ergebnisse Financial Services
Edelman Trust Barometer 2016: Ergebnisse Financial Services
 
ergo ETF-Monitor 2014 - powered by finanzen.net
ergo ETF-Monitor 2014 - powered by finanzen.netergo ETF-Monitor 2014 - powered by finanzen.net
ergo ETF-Monitor 2014 - powered by finanzen.net
 
ergo Umfrage zur Rolle der GKV-Reform bei gesetzlichen Krankenversicherungen
ergo Umfrage zur Rolle der GKV-Reform bei gesetzlichen Krankenversicherungenergo Umfrage zur Rolle der GKV-Reform bei gesetzlichen Krankenversicherungen
ergo Umfrage zur Rolle der GKV-Reform bei gesetzlichen Krankenversicherungen
 
ergo Immotalk auf der exporeal 2015
ergo Immotalk auf der exporeal 2015ergo Immotalk auf der exporeal 2015
ergo Immotalk auf der exporeal 2015
 
ergo Fonds-Monitor 2014
ergo Fonds-Monitor 2014ergo Fonds-Monitor 2014
ergo Fonds-Monitor 2014
 
Bürgerbeteiligung und Energiewende
Bürgerbeteiligung und EnergiewendeBürgerbeteiligung und Energiewende
Bürgerbeteiligung und Energiewende
 
ergo ETF Monitor powered by finanzen.net - Ergebnisse 2013
ergo ETF Monitor powered by finanzen.net - Ergebnisse 2013ergo ETF Monitor powered by finanzen.net - Ergebnisse 2013
ergo ETF Monitor powered by finanzen.net - Ergebnisse 2013
 
Folgen der Medienkrise für die Kommunikation in der Finanzbranche
Folgen der Medienkrise für die Kommunikation in der FinanzbrancheFolgen der Medienkrise für die Kommunikation in der Finanzbranche
Folgen der Medienkrise für die Kommunikation in der Finanzbranche
 
Immo talk umfrage_2014
Immo talk umfrage_2014Immo talk umfrage_2014
Immo talk umfrage_2014
 
Die wichtigsten digitalen Trends für Finanzdienstleister
Die wichtigsten digitalen Trends für FinanzdienstleisterDie wichtigsten digitalen Trends für Finanzdienstleister
Die wichtigsten digitalen Trends für Finanzdienstleister
 
Edelman Trust Barometer 2016: Ergebnisse Deutschland
Edelman Trust Barometer 2016: Ergebnisse DeutschlandEdelman Trust Barometer 2016: Ergebnisse Deutschland
Edelman Trust Barometer 2016: Ergebnisse Deutschland
 
Edelman: Globale Lebensmitteltrends 2016
Edelman: Globale Lebensmitteltrends 2016Edelman: Globale Lebensmitteltrends 2016
Edelman: Globale Lebensmitteltrends 2016
 
Präsentation Edelman Markenstudie Innovation and the Earned Brand 2015
Präsentation Edelman Markenstudie Innovation and the Earned Brand 2015Präsentation Edelman Markenstudie Innovation and the Earned Brand 2015
Präsentation Edelman Markenstudie Innovation and the Earned Brand 2015
 
2015 Edelman Food Trust Germany
2015 Edelman Food Trust Germany2015 Edelman Food Trust Germany
2015 Edelman Food Trust Germany
 
Edelman Food Trends 2015 Deutschland
Edelman Food Trends 2015 DeutschlandEdelman Food Trends 2015 Deutschland
Edelman Food Trends 2015 Deutschland
 
Edelman Food Trends 2015 Deutschland
Edelman Food Trends 2015 DeutschlandEdelman Food Trends 2015 Deutschland
Edelman Food Trends 2015 Deutschland
 
Die Deutschen haben Angst vor Innovationen - Edelman Trust Barometer 2015 Erg...
Die Deutschen haben Angst vor Innovationen - Edelman Trust Barometer 2015 Erg...Die Deutschen haben Angst vor Innovationen - Edelman Trust Barometer 2015 Erg...
Die Deutschen haben Angst vor Innovationen - Edelman Trust Barometer 2015 Erg...
 
EDELMAN MARKENSTUDIE BRANDSHARE 2014: Bindungswilliger Konsument sucht Marke,...
EDELMAN MARKENSTUDIE BRANDSHARE 2014: Bindungswilliger Konsument sucht Marke,...EDELMAN MARKENSTUDIE BRANDSHARE 2014: Bindungswilliger Konsument sucht Marke,...
EDELMAN MARKENSTUDIE BRANDSHARE 2014: Bindungswilliger Konsument sucht Marke,...
 
Edelman Trust Barometer 2014 Sonderausgabe Familienunternehmen
Edelman Trust Barometer 2014 Sonderausgabe FamilienunternehmenEdelman Trust Barometer 2014 Sonderausgabe Familienunternehmen
Edelman Trust Barometer 2014 Sonderausgabe Familienunternehmen
 

Recently uploaded

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Recently uploaded (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Edelman Privacy Risk Index 2012

  • 1. EDELMAN PRIVACY RISK INDEX POWERED BY PONEMON
  • 2. BUSINESS LEFT VULNERABLE TO PRIVACY RISK Privacy risks can have a substantial impact on business operations and corporate reputation. Edelman’s privacy research shows, for the Companies face increasing regulation and first time, the main drivers of privacy risk. potential fines for the misuse and loss of The survey reveals: sensitive information. If regulatory pressure isn’t enough, not a week goes by without a company Privacy risks are at an all-time high, presenting or an entire industry in the news for an alleged a significant challenge for businesses. privacy violation, causing significant harm to corporate reputation. Businesses are struggling to manage the privacy practices that most contribute to risk. Managing data security and privacy effectively is essential to businesses today. The growing Operating globally and in financial services volume and sensitivity of information being and health industries significantly contributes shared, stored and used is driving demand for to risk. greater transparency about how it is being managed and protected.
  • 3. PRIVACY RISK AT AN ALL-TIME HIGH
  • 4. THE CONSEQUENCES OF PRIVACY RISK The costs are high. Businesses are losing customers and money, reputations suffer. As a result, license to operate hangs in the balance. CUSTOMERS CORPORATE REPUTATION MONEY BUSINESS DISRUPTION
  • 5. DRIVERS OF PRIVACY RISK AND LIABILITY CONSUMER CONCERN REGULATORY ENFORCEMENT Three quarters of consumers will stop using an online FTC levels $22.5 million for privacy violation shop if information was accessed without permission Proposed EU legislation may include fines up to 2% of annual turnover Less than half of consumers trust healthcare organizations to protect information Edelman DSP Group Study LITIGATION MEDIA SCRUTINY Average settlement $2,500 per plaintiff, and mean attorneys’ fees of $1.2 million Temple University Beasley School of Law
  • 6.
  • 7. INTRODUCING THE EDELMAN PRIVACY RISK INDEX The Edelman Privacy Risk Index (ePRI) is a global benchmarking study and tool that measures the top drivers of privacy risk for businesses. The ePRI explores how companies are managing privacy risk caused by business practices and operations. • Based on analysis of research from the Ponemon Institute over the last three years • Analysis of 6,400 individual responses by risk managers, privacy professionals and IT Pros • 29 countries included in benchmarking and tools • The research serves as the baseline for an online tool that allows companies to access their privacy risk against the benchmark • Intended to be directional NOT diagnostic
  • 8. ELEMENTS OF PRIVACY RISK The Edelman Privacy Risk Index reveals a lack of preparedness in managing the potential financial and reputational damage relating to the loss or misuse of personal information. Our survey found companies face significant risk due to business profile and failing to implement strong privacy practices. BUSINESS PRIVACY PROFILE: PRACTICES: WHAT DEFINES HOW YOU Overall YOUR BUSINESS OPERATE RISK
  • 10. BUSINESS PROFILE Companies must understand how their business profile contributes to their privacy risk. Those operating in high risk environments are particularly vulnerable to incidents if they don’t properly manage privacy practices. Industry Headcount/ Geography Size RISK Info Collected/ Managed Footprint
  • 11. BUSINESS PROFILE RISK AT A GLANCE Geography Footprint Industry Headcount/ Info Collected Size HIGHEST RISK HIGHEST RISK HIGHEST RISK HIGHEST RISK HIGHEST RISK • Belgium • Global and Super • Financial • Small- and • Sensitive • Italy Regional Services Medium-sized Customer • Spain • Health/Pharma Businesses Information • Communications LOWEST RISK LOWEST RISK LOWEST RISK LOWER RISK LOWER RISK • China • Local • Industrial • Enterprise • Only Employee • India Automotive • Brazil • Manufacturing See appendix for full findings
  • 12. COMPANIES HAVE DIFFERENT STARTING RISKS Companies in different industries, markets and sizes have different starting points for operational risk. It’s essential that businesses understand where they stand and take action if they are at high risk. Company w/ Low Company w/ High Risk Profile Risk Profile VS. Brazil Italy Manufacturing Health Local Global Large Enterprise SMB Collects employee info Collects health and sensitive customer information
  • 14. PRACTICES THAT DETERMINE RISK The ePRI identified three pillars and twelve practices that are key indicators of businesses ability to mitigate risk of a data breach, privacy lawsuit or regulatory action. • My organization is transparent about what it does with employee and customer information. My organization is quick to respond to privacy complaints or questions from customers and regulators. Communications • My organization makes a substantial effort to educate employees about privacy and data security. & Engagement • Employees in my organization understand the importance of privacy and how to protect personal and/or sensitive information. • My organization considers privacy and the protection of personal information a corporate priority. • A high-level executive leads my organization's privacy program and is empowered to make decisions. • My organization understands global privacy cultural differences. Business • My organization strictly enforces all levels of non-compliance with laws and regulations. Operations • My organization believes a data breach would adversely affect our reputation and financial position. • My organization has ample resources to protect employee and customer information. • My organization is able to prevent and quickly detect the theft or misuse of personal information. Data Protection • My organization has the expertise and technology to protect personal information.
  • 15. BUSINESSES FALLING SHORT Fewer than half of those surveyed agreed they effectively manage risk, leaving them highly susceptible (or exposed) to a privacy incident. They are failing to: • Make privacy a priority and devote resources • Engage their employees • Embrace transparency • Manage regulatory concerns
  • 16. COMPANIES LACK RESOURCES AND EXPERTISE Approximately 2 out of 3 companies do NOT have the expertise and technology to protect personal information Over half do not have the resources needed to protect the information they collect
  • 17. COMPANIES FAIL TO PRIORITIZE Believe a data breach would not adversely 53% impact company reputation Do not consider privacy and protection of personal 60% information a corporate priority Don't have a high level executive managing privacy 61% programs
  • 18. COMPANIES FAIL TO ENGAGE EMPLOYEES Privacy incidents often originate when employees improperly use or accidently expose information. The ePRI found a majority or companies fail to address the potential risk presented by poor employee education. Over half (57%) of companies think their employees do not understand the importance of security and privacy 2 out of 3 companies surveyed do not proactively educate employees on privacy and security issues
  • 19. COMPANIES ARE NOT TRANSPARENT OR RESPONSIVE Despite new laws around the world calling for greater notice and consent before collecting consumer information and increased media scrutiny, companies struggle to be transparent and respond to complaints. Over half of the organizations surveyed (57%) are not transparent about what they do with personal information collected And 61% say they are not quick to respond to customer privacy complaints
  • 20. COMPANIES ARE LAX ON REGULATORY COMPLIANCE Many companies struggle to comply with increasing and evolving regulatory requirements around the globe. 6 out of 10 companies (61%) do not strictly enforce compliance regulations
  • 22. WHERE TO START 1 UNDERSTAND: Use the ePRI tool to better understand your company’s privacy risk. Share results with key stakeholders in legal, communications and technology to get consensus of risk. 2 PRIORITIZE: Armed with understanding, an enterprise now has a powerful directional lens to evaluate its privacy program. Smart organizations will prioritize the weakest elements of their privacy DNA (under- performing practices) with consideration for their potential impact on enterprise effectiveness. 3 ACTIVATE: Work cross-company on programs to improve at-risk privacy practices. Consider how communications, legal/risk and technology leaders can collaborate on solutions.
  • 23. UNDERSTAND YOUR RISK: ePRI TOOL Leverage the ePRI Tool to better understand your risk and how your practices relate to the benchmark.
  • 24. PRIORITZE: RISKY PRACTICES My organization considers privacy and the protection of personal information a corporate priority. Priority #1 Determine and explore deficient My organization has the expertise and technology to protect personal information. privacy practices Priority #2 most contributing to corporate risk. My organization is transparent about what it does with employee and customer information. My organization is quick to respond to consumers’ and regulators’ privacy complaints. Priority #3
  • 25. ACTIVATE CROSS-ORGANIZATION PRIVACY TEAM BUSINESS: Proper collection, use and storage of information. Embrace Privacy by Design. Invest in privacy LEGAL/GOV AFFAIRS: Compliance with local laws practices and in all the geographies of operation. programming to improve INFORMATION TECHNOLOGY: Technology systems to prevent and recover from a data incident. performance. COMMUNICATIONS: Employee engagement, stakeholder engagement, data breach communications.
  • 26. FIRST STEP: CONVENE PRIVACY WORKSHOP WITH EDELMAN OUTCOMES Customized Edelman and our Privacy Risk Privacy partners can meet with Snapshot Program you to help explore and Roadmaps prioritize areas of privacy risk. Internal Privacy Integration Playbooks
  • 27. EDELMAN SERVICES EDELMAN AND OUR PRIVACY PARTNERS CAN HELP WITH SYSTEMS INTEGRATION COMMUNICATIONS AUDIT POLICY/LEGAL • Security and privacy • Reputation and • Policy analysis and message development communications audit navigation • Internal • Privacy risk • Active regulatory and communications and assessment policymaker employee engagement • Communications team engagement integration • Litigation • Influencer and communications competitive mapping • Customer and market research • Influence policy • Privacy and security outcomes response management • Crisis protocols • Coalition building and • Data breach training grassroots support and simulations • Thought leadership and executive positioning
  • 28. CONTACT WEB: Datasecurity.edelman.com Edelman.com/expertise/practices/data security & privacy TWITTER: @EdelmanDSP CONTACT: Pete Pedersen, Global Chair, Technology Ben Boyd, Global Chair, Corporate Pete.Pedersen@edelman.com Ben.Boyd@edelman.com
  • 30. GAP IN CONSUMER TRUST Our survey, Privacy & Security: The New Drivers of Brand, Reputation and Action, shows a significant gap between the importance of privacy to consumers and the amount they trust companies to protect it. 92% Importance of privacy and security in each industry (global) 84% Trust in each industry to protect personal information (global) 78% 77% 69% 69% 63% 51% 50% 50% 48% 43% 37% 33% 27% 23% 12% 12% 11% 9% 6% Finance Online Medical & Government Social Technology News & Media Automotive Food & Gaming Utilities* Shopping & Healthcare Networking Grocery Retail Q7. How important is your privacy and security when doing business with the following industries? *NOTE: Utilities not included as a response code Q8. Which industry do you trust most to adequately protect your personal information? Please select the top three industries.
  • 31. CONSUMERS ATTRITION DUE TO PRIVACY Consumers will leave services if personal information was accessed without permission, costing negligent companies significantly in potential business. Consumers Likely to Switch Providers or Stop Using Services Entirely if Personal Information was Accessed Without Permission (Global) 80% 79% 77% 75% 75% 67% 67% 65% 63% 59% 55% 55% 54% 50% Base: All respondents (Global n=4,050) Q9. For the following types of companies, if your personal information was accessed without your permission, how likely would you be to switch to a different provider or stop using these services entirely, if they did have personal information on you? Please use a scale of 1-5, where 1 is “not at all likely” and 5 is “very likely.”
  • 32. REGULATORY ACTION IN UNITED STATES All Federal agencies with jurisdiction over privacy are significantly increasing enforcement and rhetoric about privacy violations by companies. Google pays $22.5 million to settle FTC charges it misrepresented privacy assurances. BlueCross BlueShield of Tennessee (BCBST) fined $1.5 million for 2009 data breach. SEC requires publicly traded companies to disclose data breaches citing the issue is a substantial business risk.
  • 33. A NEW REGIME IN THE EU EU institutions are currently discussing far-ranging proposals to modify and substantially overhaul the Union’s patchwork of 27 data protection regimes to create a new, single Europe-wide regime. If approved in the current format, the new regime would radically change the obligations of data controllers, strengthen competences of Data Protection Authorities (DPAs) and increase the rights of individuals. The current regulation draft foresees fines for non-compliance of up to 2% of annual turnover. The impact of this would be global.
  • 34. ASIA NOT FAR BEHIND Many countries in Asia are creating new privacy laws similar to those in place in Europe and the United States, imposing fines for data breaches and more stringent privacy standards. India: Passed Information Technology Rules (2011) Singapore: Personal Data Protection Act (2012) Hong Kong: Amended Personal Data Ordinance (2012) APEC Region: APEC Privacy Framework
  • 35. LITIGATION ON THE RISE “NebuAd Settles Lawsuit Over Behavioral “Lawsuit Claims Microsoft, McDonald’s, Targeting Test” – MediaPost Mazda & CBS Used Ads as Cover for Data Mining” – Network World Average settlement $2,500 per plaintiff, and mean attorneys’ fees of $1.2 million – Temple University Beasley School of Law “Facebook sued for $15 billion over alleged privacy infractions” – CNET
  • 36. CRITICAL MEDIA Companies face an increasingly critical and vocal media environment, creating a significant potential for reputational damage. GM's Boneheaded Security Tops Privacy Mistake With Boardroom OnStar Agendas Facebook Complies with EU Data Protection Law, Apple moves to quell Dumps Facial Path privacy gaffe Recognition Privacy Concerns Affect Purchase Questions for Amazon on Decisions Privacy and the Kindle Fire
  • 38. BY GEOGRAPHY The ePRI found operating in Europe presents the most privacy risk, likely due to recent policy developments and a significant cultural expectation of privacy. 50.9 58.7 NORTH EUROPE AMERICA 41.1 MIDDLE EAST 42.7 ASIA- PACIFIC 40.2 LATIN AMERICA
  • 39. RISK IN SPECIFIC MARKETS There are significant differences between the most and least risky countries. The eleven countries with the highest privacy risk are located in the European Union with many developing nations presenting lower risk. Belgium 68,6 Italy 65,2 Netherlands 64,1 Spain 62,5 France 59,2 Germany 59,1 Sweden 58,7 Poland 56,5 Denmark 56,3 Norway 55,0 Ireland 54,8 New Zealand 54,7 Australia 54,2 Canada 53,8 Argentina 53,3 United Kingdom 53,0 Russian Federation 50,4 Hong Kong 50,0 United States 48,1 Japan 43,2 Israel 42,2 United Arab Emirates 41,2 Saudi Arabia 39,7 Singapore 38,7 Mexico 37,9 Korea 37,2 China (PRC) 32,0 India 31,3 Brazil 29,3 - 10,0 20,0 30,0 40,0 50,0 60,0 70,0 80,0
  • 40. CORPORATE FOOTPRINT INTRODUCES RISK Adding significant complexity to geographic concerns is the risk presented by operating in multiple markets. Local 80,0 The company primarily operates in one country 70,0 66,8 58,3 Regional 60,0 The company operates in two or more countries primarily 50,0 in one region 39,0 40,0 36,0 Super regional 30,0 The company operates in multiple countries in two or 20,0 more regions 10,0 Global - The company operates in all regions around the world Local Regional Super regional Global
  • 41. INDUSTRY BENCHMARK DRIVEN BY DATA Industries that collect the most sensitive information about customers present the most significant privacy risk. There is a significant drop off in privacy risk for organizations that don’t collect significant amounts of information online. Financial services 79,3 Health & pharma 78,3 Communications 66,0 Airlines 62,8 Professional services 61,0 Public sector 58,8 Education & research 56,5 Transportation 56,3 Hospitality 55,0 Energy & utilities 55,0 Technology & software 53,8 Retail (Internet) 52,0 Retail (conventional) 44,5 Consumer products 44,3 Services 39,5 Entertainment & media 32,8 Agriculture 32,3 Industrial 27,5 Automotive 24,0 Manufacturing 20,8 - 10,0 20,0 30,0 40,0 50,0 60,0 70,0 80,0 90,0
  • 42. BY COMPANY SIZE Smaller organizations have substantially higher privacy risk than larger organizations. This can potentially be explained by larger organizations typically having more resources to devote to managing privacy risk. However, large organizations still face risks, often due to having a significant amounts of information and increased regulatory attention. 501 to 1,000 59,5 Less than 500 57,5 1.001 to 5,000 50,3 5,001 to 10,000 46,5 More than 75,000 45,8 25,001 to 75,000 45,8 10,001 to 25,000 44,8 - 10,0 20,0 30,0 40,0 50,0 60,0 70,0
  • 43. BY INFORMATION COLLECTED The volume and sensitivity of data collected significantly influences privacy risk. Types of personal information stored:  Customer with PII  Customer without PII  Employee  Consumer (targeted customer)  Citizen (government use)  Patient (health records)  Student  Shareholder/investor