SlideShare a Scribd company logo
1 of 1
Download to read offline
0
1
2
3
4
5
6
7
8
9
100
1
2
3
4
5
6
7
8
9
100
1
2
3
4
5
6
7
8
9
10 9.2
Companies COLLECTING & SHARING
my PERSONAL INFORMATION with
other companies38%
HAVE NOT CLICKED
on an online AD57%
WITHHELD PERSONAL INFO51%
have NOT DOWNLOADED
an APP/PRODUCT35%
STOPPED an online TRANSACTION25%
DELETED AN ONLINE ACCOUNT9%
86% have taken
STEPS TO PROTECT
their PRIVACY in
the last 12 months
DELETED COOKIES63%
CHANGED PRIVACY SETTINGS44%
READ PRIVACY POLICIES23%
OPTED OUT of behavioral ads10%
have TURNED OFF location TRACKING25%
SECURITY THREATS to
personal DATA ONLINE36%
GOVERNMENT SURVEILLANCE
e.g. NSA’s PRISM28%
Companies TRACKING
web-surfing BEHAVIOR22%
Social media SITES SHARING
DETAILS with advertisers19%
42% are more worried
about their online privacy
than one year ago
22%
DON’T TRUST
ANYONE to protect
their online privacy
77%
have MODERATED
their ONLINE
ACTIVITY in the
last year due
to privacy concerns
78%
BELIEVE that they
are PRIMARILY
RESPONSIBLE for
PROTECTING their
PRIVACY ONLINE
Six Ways to Lower Concern Six Ways to Increase Trust
Around HALF (49%)
say they still DON’T
think they DEDICATE
ENOUGH TIME.
45%think ONLINE
PRIVACY is MORE
IMPORTANT than
NATIONAL SECURITY
Due to privacy
concerns this year
Top causes of concern
42%
“How often do you worry
about your privacy online?”
Never Sometimes
Frequently Always
Strongly Disagree Somewhat Disagree
Somewhat Agree Strongly Agree
92%
WORRY
8%
48%26%
18%
“I trust most companies with
my personal information online.”
“I avoid doing business with
companies who I do not believe
protect my privacy online.”
55%
AGREE
11%
34%46%
9%
Strongly Disagree Somewhat Disagree
Somewhat Agree Strongly Agree
91%
AGREE
47%
44%
9.1
5.5
BUSINESS
IMPACT
CONSUMER
CONCERN
CONSUMER
TRUST
TRUSTe PRIVACY INDEX
2015 CONSUMER CONFIDENCE EDITION
Consumer Concern
Consumer concern remains high. 92% of
US internet users worry about their
privacy online the same as in January 2014,
compared with 89% in January 2013 and
90% in January 2012.
Consumer Trust
Consumer trust remains at a three year
low. 55% of US Internet users trust
businesses with their personal information
online, the same as in January 2014, down
from 57% in January 2013 and 59%
in January 2012.
Business Impact
Business impact increased. 91% of
US internet users say they avoid companies
that do not protect their privacy compared
with 89% for the previous two years
and 88% in January 2012.
Consumer Concern is Rising
Consumer Trust Remains Low
Business Impact is High
Consumers Taking Control
Consumers Want Transparency, Notice and
Choice in Exchange for Trust
4%
5%
US: 888 878 7830 www.truste.com | EU: +44 (0) 203 078 6495 www.truste.eu
© TRUSTe, Inc. 2014 All Rights Reserved
LEARN MORE
Data from surveys conducted by Ipsos on behalf of TRUSTe from
November 28 - December 5, 2014 and January 9-14 2015
COMPANIES being MORE TRANSPARENT ABOUT
how they are COLLECTING AND USING DATA37%
give CLEAR PROCEDURES for
REMOVING PERSONAL INFORMATION47%
ASK for PERMISSION before using cookies
31%
OFFER notice and ways to
OPT OUT of TARGETED ADS31%
give INFORMATION on how
PERSONAL INFORMATION is USED30%
easy opportunities to STOP
being contacted by THIRD PARTIES30%
privacy policies in EASY
to UNDERSTAND LANGUAGE21%
MORE ACTIVE in enforcement of
MEASURES to PROTECT PRIVACY ONLINE37%
indentify clearer ways to HOLD
COMPANIES ACCOUNTABLE for
PROTECTING PRIVACY ONLINE
34%
PASSING MORE LEGISLATION
27%
would like ONLINE PRIVACY
best practices TAUGHT IN SCHOOLS20%
GOVERNMENTS’ being MORE
TRANSPARENT ABOUT how they
are COLLECTING and USING DATA
22%

More Related Content

What's hot

Privacy and Tracking Protection in Firefox
Privacy and Tracking Protection in FirefoxPrivacy and Tracking Protection in Firefox
Privacy and Tracking Protection in FirefoxFrancois Marier
 
Digiday Programmatic Media Summit. Glen Straub. Factual
Digiday Programmatic Media Summit. Glen Straub. FactualDigiday Programmatic Media Summit. Glen Straub. Factual
Digiday Programmatic Media Summit. Glen Straub. FactualDigiday
 
Digiday Programmatic Media Summit. Eric Shih. Teads.
Digiday Programmatic Media Summit. Eric Shih. Teads.Digiday Programmatic Media Summit. Eric Shih. Teads.
Digiday Programmatic Media Summit. Eric Shih. Teads.Digiday
 
Digital dependency and privacy2
Digital dependency and privacy2Digital dependency and privacy2
Digital dependency and privacy2Ashley Marty
 
Digiday Marketing Summit. Clementine Berlioz. Hello Fresh
Digiday Marketing Summit. Clementine Berlioz. Hello FreshDigiday Marketing Summit. Clementine Berlioz. Hello Fresh
Digiday Marketing Summit. Clementine Berlioz. Hello FreshDigiday
 
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityNaughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityTenable Network Security
 
The Third Wave of Enterprise Communications by Bryan Martin, 8x8
The Third Wave of Enterprise Communications by Bryan Martin, 8x8The Third Wave of Enterprise Communications by Bryan Martin, 8x8
The Third Wave of Enterprise Communications by Bryan Martin, 8x88x8
 
mHealth Technologies that are Working and Obstacles to Innovation by Jim Bloe...
mHealth Technologies that are Working and Obstacles to Innovation by Jim Bloe...mHealth Technologies that are Working and Obstacles to Innovation by Jim Bloe...
mHealth Technologies that are Working and Obstacles to Innovation by Jim Bloe...HIMSS
 
Investment Management Digital Survey 2016
Investment Management Digital Survey 2016Investment Management Digital Survey 2016
Investment Management Digital Survey 2016Kurtosys Systems
 
Chris Babel Presentation
Chris Babel PresentationChris Babel Presentation
Chris Babel PresentationMediabistro
 
6 Ways to Ease Consumer Privacy Consumer
6 Ways to Ease Consumer Privacy Consumer6 Ways to Ease Consumer Privacy Consumer
6 Ways to Ease Consumer Privacy ConsumerGintent
 
Sharifah Amirah
Sharifah AmirahSharifah Amirah
Sharifah Amirahevensys
 
Uga marketing Social Media and Marketing
Uga marketing Social Media and MarketingUga marketing Social Media and Marketing
Uga marketing Social Media and MarketingJamil "Jim" Elayan
 
Sofia azam-most-imperative-finding-is-that
Sofia azam-most-imperative-finding-is-thatSofia azam-most-imperative-finding-is-that
Sofia azam-most-imperative-finding-is-thatDigital Marketing
 
October Webinar Slides - Social Media for Business
October Webinar Slides - Social Media for BusinessOctober Webinar Slides - Social Media for Business
October Webinar Slides - Social Media for BusinessTonick Media
 
State of the Digital Union by Overdrive Interactive
State of the Digital Union by Overdrive InteractiveState of the Digital Union by Overdrive Interactive
State of the Digital Union by Overdrive InteractiveOverdrive Interactive
 

What's hot (18)

Privacy and Tracking Protection in Firefox
Privacy and Tracking Protection in FirefoxPrivacy and Tracking Protection in Firefox
Privacy and Tracking Protection in Firefox
 
Infographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPRInfographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPR
 
Digiday Programmatic Media Summit. Glen Straub. Factual
Digiday Programmatic Media Summit. Glen Straub. FactualDigiday Programmatic Media Summit. Glen Straub. Factual
Digiday Programmatic Media Summit. Glen Straub. Factual
 
Digiday Programmatic Media Summit. Eric Shih. Teads.
Digiday Programmatic Media Summit. Eric Shih. Teads.Digiday Programmatic Media Summit. Eric Shih. Teads.
Digiday Programmatic Media Summit. Eric Shih. Teads.
 
Digital dependency and privacy2
Digital dependency and privacy2Digital dependency and privacy2
Digital dependency and privacy2
 
Digiday Marketing Summit. Clementine Berlioz. Hello Fresh
Digiday Marketing Summit. Clementine Berlioz. Hello FreshDigiday Marketing Summit. Clementine Berlioz. Hello Fresh
Digiday Marketing Summit. Clementine Berlioz. Hello Fresh
 
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityNaughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
 
The consumerization of it
The consumerization of itThe consumerization of it
The consumerization of it
 
The Third Wave of Enterprise Communications by Bryan Martin, 8x8
The Third Wave of Enterprise Communications by Bryan Martin, 8x8The Third Wave of Enterprise Communications by Bryan Martin, 8x8
The Third Wave of Enterprise Communications by Bryan Martin, 8x8
 
mHealth Technologies that are Working and Obstacles to Innovation by Jim Bloe...
mHealth Technologies that are Working and Obstacles to Innovation by Jim Bloe...mHealth Technologies that are Working and Obstacles to Innovation by Jim Bloe...
mHealth Technologies that are Working and Obstacles to Innovation by Jim Bloe...
 
Investment Management Digital Survey 2016
Investment Management Digital Survey 2016Investment Management Digital Survey 2016
Investment Management Digital Survey 2016
 
Chris Babel Presentation
Chris Babel PresentationChris Babel Presentation
Chris Babel Presentation
 
6 Ways to Ease Consumer Privacy Consumer
6 Ways to Ease Consumer Privacy Consumer6 Ways to Ease Consumer Privacy Consumer
6 Ways to Ease Consumer Privacy Consumer
 
Sharifah Amirah
Sharifah AmirahSharifah Amirah
Sharifah Amirah
 
Uga marketing Social Media and Marketing
Uga marketing Social Media and MarketingUga marketing Social Media and Marketing
Uga marketing Social Media and Marketing
 
Sofia azam-most-imperative-finding-is-that
Sofia azam-most-imperative-finding-is-thatSofia azam-most-imperative-finding-is-that
Sofia azam-most-imperative-finding-is-that
 
October Webinar Slides - Social Media for Business
October Webinar Slides - Social Media for BusinessOctober Webinar Slides - Social Media for Business
October Webinar Slides - Social Media for Business
 
State of the Digital Union by Overdrive Interactive
State of the Digital Union by Overdrive InteractiveState of the Digital Union by Overdrive Interactive
State of the Digital Union by Overdrive Interactive
 

Viewers also liked

The Physical Interface
The Physical InterfaceThe Physical Interface
The Physical InterfaceJosh Clark
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to KnowTrustArc
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with DataSeth Familian
 
2016 Holiday Spending Survey
2016 Holiday Spending Survey2016 Holiday Spending Survey
2016 Holiday Spending SurveyExperian_US
 
ISDC_2013_Referat_Reto Gurtner_Weisse Arena
ISDC_2013_Referat_Reto Gurtner_Weisse ArenaISDC_2013_Referat_Reto Gurtner_Weisse Arena
ISDC_2013_Referat_Reto Gurtner_Weisse ArenaIBM Switzerland
 
Apache Ambari - What's New in 2.2
 Apache Ambari - What's New in 2.2 Apache Ambari - What's New in 2.2
Apache Ambari - What's New in 2.2Hortonworks
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeTrustArc
 
Password manažeři detailněji – 1Password, LastPass, 2FA, sdílení
Password manažeři detailněji – 1Password, LastPass, 2FA, sdíleníPassword manažeři detailněji – 1Password, LastPass, 2FA, sdílení
Password manažeři detailněji – 1Password, LastPass, 2FA, sdíleníMichal Špaček
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe TrustArc
 
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTeWebinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTeTrustArc
 

Viewers also liked (10)

The Physical Interface
The Physical InterfaceThe Physical Interface
The Physical Interface
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 
2016 Holiday Spending Survey
2016 Holiday Spending Survey2016 Holiday Spending Survey
2016 Holiday Spending Survey
 
ISDC_2013_Referat_Reto Gurtner_Weisse Arena
ISDC_2013_Referat_Reto Gurtner_Weisse ArenaISDC_2013_Referat_Reto Gurtner_Weisse Arena
ISDC_2013_Referat_Reto Gurtner_Weisse Arena
 
Apache Ambari - What's New in 2.2
 Apache Ambari - What's New in 2.2 Apache Ambari - What's New in 2.2
Apache Ambari - What's New in 2.2
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
 
Password manažeři detailněji – 1Password, LastPass, 2FA, sdílení
Password manažeři detailněji – 1Password, LastPass, 2FA, sdíleníPassword manažeři detailněji – 1Password, LastPass, 2FA, sdílení
Password manažeři detailněji – 1Password, LastPass, 2FA, sdílení
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTeWebinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
 

Similar to Consumer Concern for Online Privacy Remains High

Retain Social Presentation 2015
Retain Social Presentation 2015Retain Social Presentation 2015
Retain Social Presentation 2015GWAVA Man
 
TFOE - Social | A importância dos cookies e 1st party data para o e-commerce
TFOE - Social | A importância dos cookies e 1st party data para o e-commerceTFOE - Social | A importância dos cookies e 1st party data para o e-commerce
TFOE - Social | A importância dos cookies e 1st party data para o e-commerceE-Commerce Brasil
 
Privitar Privacy Pulse 2019
Privitar Privacy Pulse 2019Privitar Privacy Pulse 2019
Privitar Privacy Pulse 2019Privitar
 
2021 Digital Media Landscape in Myanmar
2021 Digital Media Landscape in Myanmar2021 Digital Media Landscape in Myanmar
2021 Digital Media Landscape in MyanmarKyaw Ye Paing
 
The Intersection of Trust, Data Security and the Financial Industry
The Intersection of Trust, Data Security and the Financial IndustryThe Intersection of Trust, Data Security and the Financial Industry
The Intersection of Trust, Data Security and the Financial IndustryEdelman
 
Glossy Forum: Age of E-Commerce | Awin
Glossy Forum: Age of E-Commerce | AwinGlossy Forum: Age of E-Commerce | Awin
Glossy Forum: Age of E-Commerce | AwinDigiday
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research Druva
 
Thinking_Beyond_the_Third_Party_Cookie_Guide_Refresh_Offer.pdf
Thinking_Beyond_the_Third_Party_Cookie_Guide_Refresh_Offer.pdfThinking_Beyond_the_Third_Party_Cookie_Guide_Refresh_Offer.pdf
Thinking_Beyond_the_Third_Party_Cookie_Guide_Refresh_Offer.pdfPrasadraoBucche
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarMerlien Institute
 
White Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationWhite Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationGigya
 
cisco-privacy-benchmark-study-2023.pdf
cisco-privacy-benchmark-study-2023.pdfcisco-privacy-benchmark-study-2023.pdf
cisco-privacy-benchmark-study-2023.pdfAproximacionAlFuturo
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
Google Think Mobile - Accelerating the Mobile Wave
Google Think Mobile - Accelerating the Mobile WaveGoogle Think Mobile - Accelerating the Mobile Wave
Google Think Mobile - Accelerating the Mobile WavePraveen Rajan
 
Data opportunities mini whitepaper
Data opportunities mini whitepaperData opportunities mini whitepaper
Data opportunities mini whitepaperRobert Bowstead
 
BDVe Webinar Series - Helping SMEs and Startups comply with GDPR
BDVe Webinar Series - Helping SMEs and Startups comply with GDPRBDVe Webinar Series - Helping SMEs and Startups comply with GDPR
BDVe Webinar Series - Helping SMEs and Startups comply with GDPRBig Data Value Association
 

Similar to Consumer Concern for Online Privacy Remains High (20)

Retain Social Presentation 2015
Retain Social Presentation 2015Retain Social Presentation 2015
Retain Social Presentation 2015
 
TFOE - Social | A importância dos cookies e 1st party data para o e-commerce
TFOE - Social | A importância dos cookies e 1st party data para o e-commerceTFOE - Social | A importância dos cookies e 1st party data para o e-commerce
TFOE - Social | A importância dos cookies e 1st party data para o e-commerce
 
Privitar Privacy Pulse 2019
Privitar Privacy Pulse 2019Privitar Privacy Pulse 2019
Privitar Privacy Pulse 2019
 
Mobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in LoyaltyMobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in Loyalty
 
2021 Digital Media Landscape in Myanmar
2021 Digital Media Landscape in Myanmar2021 Digital Media Landscape in Myanmar
2021 Digital Media Landscape in Myanmar
 
The Intersection of Trust, Data Security and the Financial Industry
The Intersection of Trust, Data Security and the Financial IndustryThe Intersection of Trust, Data Security and the Financial Industry
The Intersection of Trust, Data Security and the Financial Industry
 
Glossy Forum: Age of E-Commerce | Awin
Glossy Forum: Age of E-Commerce | AwinGlossy Forum: Age of E-Commerce | Awin
Glossy Forum: Age of E-Commerce | Awin
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
Thinking_Beyond_the_Third_Party_Cookie_Guide_Refresh_Offer.pdf
Thinking_Beyond_the_Third_Party_Cookie_Guide_Refresh_Offer.pdfThinking_Beyond_the_Third_Party_Cookie_Guide_Refresh_Offer.pdf
Thinking_Beyond_the_Third_Party_Cookie_Guide_Refresh_Offer.pdf
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
White Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationWhite Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & Personalization
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
The Rise of the ‘Deletist’ Consumer
The Rise of the ‘Deletist’ ConsumerThe Rise of the ‘Deletist’ Consumer
The Rise of the ‘Deletist’ Consumer
 
Panel - Digital Marketing in the New Era of Privacy & Data Governance - Ashle...
Panel - Digital Marketing in the New Era of Privacy & Data Governance - Ashle...Panel - Digital Marketing in the New Era of Privacy & Data Governance - Ashle...
Panel - Digital Marketing in the New Era of Privacy & Data Governance - Ashle...
 
cisco-privacy-benchmark-study-2023.pdf
cisco-privacy-benchmark-study-2023.pdfcisco-privacy-benchmark-study-2023.pdf
cisco-privacy-benchmark-study-2023.pdf
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Google Think Mobile - Accelerating the Mobile Wave
Google Think Mobile - Accelerating the Mobile WaveGoogle Think Mobile - Accelerating the Mobile Wave
Google Think Mobile - Accelerating the Mobile Wave
 
10 Incredible BYOD Facts
10 Incredible BYOD Facts10 Incredible BYOD Facts
10 Incredible BYOD Facts
 
Data opportunities mini whitepaper
Data opportunities mini whitepaperData opportunities mini whitepaper
Data opportunities mini whitepaper
 
BDVe Webinar Series - Helping SMEs and Startups comply with GDPR
BDVe Webinar Series - Helping SMEs and Startups comply with GDPRBDVe Webinar Series - Helping SMEs and Startups comply with GDPR
BDVe Webinar Series - Helping SMEs and Startups comply with GDPR
 

More from TrustArc

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc
 

More from TrustArc (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Consumer Concern for Online Privacy Remains High

  • 1. 0 1 2 3 4 5 6 7 8 9 100 1 2 3 4 5 6 7 8 9 100 1 2 3 4 5 6 7 8 9 10 9.2 Companies COLLECTING & SHARING my PERSONAL INFORMATION with other companies38% HAVE NOT CLICKED on an online AD57% WITHHELD PERSONAL INFO51% have NOT DOWNLOADED an APP/PRODUCT35% STOPPED an online TRANSACTION25% DELETED AN ONLINE ACCOUNT9% 86% have taken STEPS TO PROTECT their PRIVACY in the last 12 months DELETED COOKIES63% CHANGED PRIVACY SETTINGS44% READ PRIVACY POLICIES23% OPTED OUT of behavioral ads10% have TURNED OFF location TRACKING25% SECURITY THREATS to personal DATA ONLINE36% GOVERNMENT SURVEILLANCE e.g. NSA’s PRISM28% Companies TRACKING web-surfing BEHAVIOR22% Social media SITES SHARING DETAILS with advertisers19% 42% are more worried about their online privacy than one year ago 22% DON’T TRUST ANYONE to protect their online privacy 77% have MODERATED their ONLINE ACTIVITY in the last year due to privacy concerns 78% BELIEVE that they are PRIMARILY RESPONSIBLE for PROTECTING their PRIVACY ONLINE Six Ways to Lower Concern Six Ways to Increase Trust Around HALF (49%) say they still DON’T think they DEDICATE ENOUGH TIME. 45%think ONLINE PRIVACY is MORE IMPORTANT than NATIONAL SECURITY Due to privacy concerns this year Top causes of concern 42% “How often do you worry about your privacy online?” Never Sometimes Frequently Always Strongly Disagree Somewhat Disagree Somewhat Agree Strongly Agree 92% WORRY 8% 48%26% 18% “I trust most companies with my personal information online.” “I avoid doing business with companies who I do not believe protect my privacy online.” 55% AGREE 11% 34%46% 9% Strongly Disagree Somewhat Disagree Somewhat Agree Strongly Agree 91% AGREE 47% 44% 9.1 5.5 BUSINESS IMPACT CONSUMER CONCERN CONSUMER TRUST TRUSTe PRIVACY INDEX 2015 CONSUMER CONFIDENCE EDITION Consumer Concern Consumer concern remains high. 92% of US internet users worry about their privacy online the same as in January 2014, compared with 89% in January 2013 and 90% in January 2012. Consumer Trust Consumer trust remains at a three year low. 55% of US Internet users trust businesses with their personal information online, the same as in January 2014, down from 57% in January 2013 and 59% in January 2012. Business Impact Business impact increased. 91% of US internet users say they avoid companies that do not protect their privacy compared with 89% for the previous two years and 88% in January 2012. Consumer Concern is Rising Consumer Trust Remains Low Business Impact is High Consumers Taking Control Consumers Want Transparency, Notice and Choice in Exchange for Trust 4% 5% US: 888 878 7830 www.truste.com | EU: +44 (0) 203 078 6495 www.truste.eu © TRUSTe, Inc. 2014 All Rights Reserved LEARN MORE Data from surveys conducted by Ipsos on behalf of TRUSTe from November 28 - December 5, 2014 and January 9-14 2015 COMPANIES being MORE TRANSPARENT ABOUT how they are COLLECTING AND USING DATA37% give CLEAR PROCEDURES for REMOVING PERSONAL INFORMATION47% ASK for PERMISSION before using cookies 31% OFFER notice and ways to OPT OUT of TARGETED ADS31% give INFORMATION on how PERSONAL INFORMATION is USED30% easy opportunities to STOP being contacted by THIRD PARTIES30% privacy policies in EASY to UNDERSTAND LANGUAGE21% MORE ACTIVE in enforcement of MEASURES to PROTECT PRIVACY ONLINE37% indentify clearer ways to HOLD COMPANIES ACCOUNTABLE for PROTECTING PRIVACY ONLINE 34% PASSING MORE LEGISLATION 27% would like ONLINE PRIVACY best practices TAUGHT IN SCHOOLS20% GOVERNMENTS’ being MORE TRANSPARENT ABOUT how they are COLLECTING and USING DATA 22%