Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
The Privacy Dividend Business case<br />"Privacy protection is not a cost of doing business, it is part of doing business"...
The business case <br />Protecting personal privacy makes good business sense.<br />It should bring real and significant b...
Compliance Requirements<br />
ROI<br />85% of private organisations believe that the DPA improves information management.<br />[92% for public organisat...
Board Level Attention<br />Create an attitude for the enterprise<br />Create cultural leadership<br />Drives business as u...
Benefits of Proactive Protection<br />Organisational success<br />Achieving business objectives<br />Asset to organisation...
Benefits of Proactive Protection<br />Assets to the Individual<br />Trust = increased profit<br />Respect<br />Better data...
Privacy in the supply chain<br />Privacy should be designed into organisation system and processes<br />Comprehensive vs. ...
The virtuous circle in the supply chain of information assets<br />Information assets are transacted to create a shared ow...
Protecting the supply chain of information assets<br />IT/Helpdesk Services<br />Systems Lifecycle Management<br />Endpoin...
The Privacy Dividend<br />Security as an Asset not a Cost<br />Yusuf Hassan<br />Yusuf.hassan@cryptic.co.uk<br />Twitter: ...
Upcoming SlideShare
Loading in …5
×

The Privacy Dividend Business Case

883 views

Published on

A Board level presentation to proactively build a privacy dividend within your supply chain.

  • Be the first to comment

  • Be the first to like this

The Privacy Dividend Business Case

  1. 1. The Privacy Dividend Business case<br />"Privacy protection is not a cost of doing business, it is part of doing business"<br />
  2. 2. The business case <br />Protecting personal privacy makes good business sense.<br />It should bring real and significant benefits that far outweigh the effort privacy protection requires.<br />The alternative, of ignoring privacy and leaving personal information inadequately protected, has significant downsides<br />
  3. 3. Compliance Requirements<br />
  4. 4. ROI<br />85% of private organisations believe that the DPA improves information management.<br />[92% for public organisations]<br />Annual Track 2008 – Organisations Report31, ICO<br />Return on investment for enterprise data protection, where that has been assessed, can be as high as 4 to 1<br />
  5. 5. Board Level Attention<br />Create an attitude for the enterprise<br />Create cultural leadership<br />Drives business as usual activities<br />Removes organisational barriers<br />Delivers funding<br />Ensure long term and ongoing support<br />Google, Schmidt (CEO) says (on Data gathering and privacy), is kept in check by its customers and by the competition: And the reason that you should trust us is that if we were to violate that trust people would move immediately to someone else. We're very non-sticky so we have a very high interest in maintaining the trust of those users." <br />
  6. 6. Benefits of Proactive Protection<br />Organisational success<br />Achieving business objectives<br />Asset to organisation<br />Efficiencies<br />Productivity<br />Change agility<br />New opportunities<br />Public awareness<br />Reduced costs of data collection<br />Increased accuracy of data improves reputation<br />Services more attractive<br />Rapid response to requests<br />Risks<br />Wrongly delivered services<br />Delivery out of time<br />Impact to strategic decisions<br />Costs to business<br />
  7. 7. Benefits of Proactive Protection<br />Assets to the Individual<br />Trust = increased profit<br />Respect<br />Better data collection<br />Loyal employees<br />Minimise privacy violation costs<br />Assets to 3rd Parties<br />Cost of privacy failure are substantial<br />Competitive disadvantage<br />Assets to society<br />Do the right thing<br />Compliance (costs could include loss of operating licenses)<br />Confidence<br />Loyalty<br />Brand<br />Legislations costs<br />
  8. 8. Privacy in the supply chain<br />Privacy should be designed into organisation system and processes<br />Comprehensive vs. minimalist approach<br />DPA is a minimum requirement<br />More comprehensive the proactive approach the better market differentiation to competitors and peers<br />Equates to efficiencies and control<br />Reduce “whole life costs” e.g. less external audits<br />Privacy is good information management<br />
  9. 9. The virtuous circle in the supply chain of information assets<br />Information assets are transacted to create a shared ownership and responsibility with the assumption that all assets are backed with relevant layers of security and privacy protection.<br />The virtuous circle requires that all stakeholders are able to demonstrate a privacy dividend to each other on an on-going basis and build trust.<br />What keeps this circle in check are the pressures from market forces and international legislation.<br />
  10. 10. Protecting the supply chain of information assets<br />IT/Helpdesk Services<br />Systems Lifecycle Management<br />Endpoint Protection<br />Individual Data<br />Server Monitoring<br />Compliance Management<br />Alerts<br />Abuse/Threat Management<br />Hardware Theft Alert<br />Data Leakage / Loss<br />Forensics<br />Software Misuse/Piracy Alerts<br />Modular Protection<br />Prevention Services<br />
  11. 11. The Privacy Dividend<br />Security as an Asset not a Cost<br />Yusuf Hassan<br />Yusuf.hassan@cryptic.co.uk<br />Twitter: @privacytalks<br />http://uk.linkedin.com/in/yusufhassan<br />Cryptic Ltd<br />

×