SlideShare a Scribd company logo
Privacy & Security: The New Drivers of
Brand, Reputation and Action

Global Insights 2012
Data security and privacy have moved from
the backroom to the boardroom.
Data breaches, security incidents and      Edelman’s industry study shows, for the
privacy missteps are making headlines      first time, why managing data security
worldwide and have become a focal          and privacy impact business success.
point for social media discussions and     Our survey reveals:
legislation.
                                             The gap between consumer expectations
Managing data security and privacy           and what businesses are actually
effectively is essential to businesses       delivering.
today. The growing volume and                A relationship between effective data
sensitivity of information being shared,     protection and business success.
stored and used is driving demand for        That data security and privacy
greater transparency about how it is         considerations do impact purchasing
being managed and protected.                 decisions.
People care about the security of their
   personal information more than ever before.
   A majority of consumers are more concerned about data security and
   privacy than they were five years ago and sense they are powerless to
   exert control, leaving companies with the responsibility for protecting it.


                                                                      of global consumers are
                                                70%                  MORE CONCERNED
                                                                      than they were 5 years ago




                                                                      of global consumers feel they have
                                               68%                    LOST CONTROL
                                                                      over how their personal information
                                                                      is shared and used by companies




Base: All respondents (Global n=4,050)
Q12. Compared to five years ago, how has your level of concern regarding online data security and privacy changed?
Q15. Using a scale of 1 to 5, where 1 means “strongly disagree” and 5 means “strongly agree,” please indicate your level of agreement with the following
statements. (Summary of top 2 box scores shown)
These concerns present both a challenge and
  an opportunity for businesses.
  Consumers are fed up with the status quo and want companies to act,
  having seen either no change or a decline in the security of their data
  over the last five years.
                                                                                                   Security of Personal Information Online
                                                                                                    Compared to Five Years Ago (Global)

                            of global consumers feel their                                                               7%                       Much more secure

     32%                    online privacy is adequately
                            PROTECTED by business practices
                                                                                                                                                  Somewhat more secure
                                                                                                                                                  No Change
                                                                                                                        36%
                                                                                                                                                  Somewhat less secure
                                                                                                                                                  Much less secure
                            of global consumers feel companies
      85%                   need to take security & privacy                                                             23%
                                                                                                                                            57% of consumers report no
                            MORE SERIOUSLY                                                                                                   change or a decline in the
                                                                                                                                              security of their personal
                                                                                                                        25%                      information online

                                                                                                                         9%


Base: All respondents (Global n=4,050)
Q15. Using a scale of 1 to 5, where 1 means “strongly disagree” and 5 means “strongly agree,” please indicate your level of agreement with the following
statements. (Summary of top 2 box scores shown)
Q14. Compared to five years ago, how would you describe the security of your personal information online?
Adults are most concerned about information
   held by businesses they use most frequently.
   Online shopping and banking, which require the sharing of financial
   information, are the most common online activities. Understandably,
   consumers are most concerned about the security of their financial
   information.
  Most Common Online Activities                                                 Information of Greatest Concern Online (Global)
           (Global)
                                                                                                  Financial information                                           90%

                                                                                                  Personal information                                      78%

Online Shopping                              82%                                                                   Emails                           36%

                                                                                                     Health information                        28%

                                                                                 Frequent purchase / shopping data                            26%

                                                                          Content posted by you to social networks                       17%
Online Banking                               80%                       Content posted by others to social networks                     13%

                                                                                                       Browsing activity              12%

Base: All respondents (Global n=4,050)
Q1. Which of the following actions have you taken in the past three months?
Q3. What types of online personal information are you most concerned about? Please order the following types of information from least to most important.
Financial institutions and online retailers are
  not meeting the needs of their customers.
 A notable gap exists between the number of people who consider data
 security important in the finance and online retail industries and the
 number who actually trust them to protect personal information.

      23-point gap in expectations

                      51-point gap in expectations
 92%                                                                                                        Importance of privacy and security in each industry (global)
                  84%
                                  78%             77%                                                       Trust in each industry to protect personal information (global)
       69%                                                         69%
                                                                                   63%
                                        51%                                                        50%             50%
                                                        48%
                                                                                                                                    43%
                                                                                                                                                     37%
                        33%
                                                                                         27%                                                                      23%
                                                                       12%                              12%              9%              11%
                                                                                                                                                        6%

 Finance          Online   Medical & Government   Social   Technology                               News &        Automotive        Food &           Gaming   Utilities*
                Shopping & Healthcare           Networking                                           Media                          Grocery
                  Retail

NOTE: Q7: summary of top 2 box scores shown; Q8: top three industries selected
Base: All respondents (Global n=4,050)
Q7. How important is your privacy and security when doing business with the following industries? *NOTE: Utilities not included as a response code
Q8. Which industry do you trust most to adequately protect your personal information? Please select the top three industries.
Concern over businesses’ ability to protect
   information impacts engagement in activities
   important to online retailers and banks.
   Consumers report abstaining from frequent shopping or loyalty card
   programs and online banking to protect their personal information.
                              Consumers Taking Action to Protect their Online Information




                      ONE in FIVE adults
              do not join a frequent shopping                                           ONE in TEN adults
               card or loyalty card program                                               do not bank online


Base: All respondents (Global n=4,050)
Q4. Which of the following actions have you taken to protect your online information?
Consumers consider data security and privacy
   features when purchasing tech products.
  Nearly half of consumers reported that data security is among the top
  three factors they consider when purchasing a smartphone.

                                               Top Three Most Important Factors Considered
                                                  When Purchasing Smartphones (Global)
               69%
                                            61%

                                                                         48%                         47%
                                                                                                                                  40%
                                                                                                                                                           35%




               Price                     Ease of Use         Data Security & Privacy           Style & Design             Product Warranty          Physical Dimensions
                                                                                                                                                       (size, weight)



Base: All respondents (Global n=4,050)
Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
Security considerations also impact other
  purchasing decisions.
  For personal computers and tablets, security considerations are on par with
  style, design and physical dimensions of the product.
                                        Top Three Most Important Factors Considered
                                   When Purchasing Tablets and Personal Computers (Global)

                                           Price                                                                                                          71%
                                                                                                                                                                75%


                                  Ease of Use                                                                                                       59%
                                                                                                                                         53%


                     Data Security & Privacy                                                                            42%
                                                                                                                                      51%


                               Style & Design                                                                           42%
                                                                                                           34%


                            Product Warranty                                                                                 45%
                                                                                                                                           54%


       Physical Dimensions (size, weight)                                                                                 43%
                                                                                                           34%

Base: All respondents (Global n=4,050)                                Tablets        Personal Computers
Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
Security considerations also impact other
  purchasing decisions.
  Even shoppers of traditional mobile phones and videogame consoles feel
  security is a key concern.


                                                                    of global consumers consider
                                                                    DATA SECURITY AND PRIVACY
                                               29%                   among the top 3 most important factors
                                                                     when purchasing standard mobile phones




                                                                    of global consumers consider
                                               22%                  DATA SECURITY AND PRIVACY
                                                                     among the top 3 most important factors
                                                                     when purchasing videogame consoles




Base: All respondents (Global n=4,050)
Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
Smartphones are suffering from a trust gap.
  More customers take security into account when purchasing a smartphone
  than say they trust the security of the devices. Comparatively, smartphones
  are considered the least secure devices.
             Consumers selecting Data Security and Privacy among Top Three Most Important
                             Factors vs. Trust in Security of Devices (Global)

                                                              14-point difference in consumers considering security
                  58%                                        important and those that trust security for smartphones
          51%
                                                                  48%
                                                                                                      44%
                                      42%
                                              37%                                                                                 37%
                                                                          34%
                                                                                              29%
                                                                                                                          22%
                                                                                                                                                         17%




    Personal Computers                   Tablets                 Smartphones               Standard Mobile           Videogame Console Digital Music Player*
                                                                                               Phones
          Consumers selecting Data Security & Privacy among Top Three Important Factors                                 Trust in Security of Device

Base: All respondents (Global n=4,050)
Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
Q6.Please indicate your level of trust in the security of the following types of products. *NOTE: Digital music player not included as a response code
The premium on security translates to adoption
   and retention of consumers.
  Consumers indicate willingness to leave online services if personal
  information was accessed without permission and are most concerned
  about services that involve financial information.
                     Consumers Likely to Switch Providers or Stop Using Services Entirely if Personal
                               Information was Accessed Without Permission (Global)
       80%          79%         77%          75%         75%
                                                                      67%         67%          65%         63%          59%         55%          55%         54%            50%




Base: All respondents (Global n=4,050)
Q9. For the following types of companies, if your personal information was accessed without your permission, how likely would you be to switch to a different provider or
stop using these services entirely, if they did have personal information on you? Please use a scale of 1-5, where 1 is “not at all likely” and 5 is “very likely.”
Businesses must manage security and
   privacy like a line of business and will lose
   customers if they do not.
  Data shows that inaction on issues of data security and privacy will put
  businesses are risk of losing their customer base.
                                         Consumers that have Left or Avoided Companies because of
                                                 Security Issues they have had in the Past
                                                                          58%
                                                     55%                                                53%     52%
           46%
                                41%
                                                                                                  36%
                                                                                                                        31%




          Global                 US                  Brazil               China              Germany    India   Korea   UK


Base: All respondents (Global n=4,050)
Q16. Have you ever left or avoided companies because they have had security issues in the past?
Consumers indicate they will act to protect their
    privacy if businesses don’t.
   In the wake of a data breach, individuals are even willing to abandon the
   companies they trust most. Data breaches may also impact reputation
   due to the strong tendency of victims to share their experiences.


  Americans proved most loyal to the                                                              Actions Taken following Data Breach Events
companies they do business with, yet
  ONE in TWO say they are likely to                                                                                                    of global consumers
   change brands after a data breach                                                                          39%                      TOLD A FRIEND
                                                                                                                                       about their experience

                                  of global consumers would

           71%                    SWITCH PROVIDERS                                                                                     of global consumers
                                  after a company they rarely
                                  used suffered a data breach
                                                                                                               29%                     POSTED ONLINE
                                                                                                                                       about their experience


 Base: All respondents (Global n=4,050)
 Q10. If the brand you trust most and use most loyally suffered a data breach, how likely would you be to switch brands?
 Q11. If a brand you rarely use (but still has your personal data) suffered a data breach, how likely would you be to switch brands?
 Q21. Did you take any action following these events?

More Related Content

What's hot

Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
Symantec
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
The Economist Media Businesses
 
The way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of Things
The Economist Media Businesses
 
Building Trust Through Social Media
Building Trust Through Social MediaBuilding Trust Through Social Media
Building Trust Through Social Media
Mandi Bishop
 
2016 Edelman Trust Barometer New Zealand
2016 Edelman Trust Barometer New Zealand2016 Edelman Trust Barometer New Zealand
2016 Edelman Trust Barometer New Zealand
David Brain
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
FinTech Belgium
 
Europe and the Internet: It’s complicated
Europe and the Internet: It’s complicatedEurope and the Internet: It’s complicated
Europe and the Internet: It’s complicated
Brunswick Group
 
Cloud complexity: the need for resilience
Cloud complexity: the need for resilienceCloud complexity: the need for resilience
Cloud complexity: the need for resilience
The Economist Media Businesses
 
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
Mandi Bishop
 
Improving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause AnalysisImproving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause Analysis
Cognizant
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
- Mark - Fullbright
 
Executive summary - App nations
Executive summary - App nationsExecutive summary - App nations
Executive summary - App nations
The Economist Media Businesses
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
Bee_Ware
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management Study
CheapSSLsecurity
 
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Driven Innovation
 
Smart Data Infographic
Smart Data InfographicSmart Data Infographic
Smart Data Infographic
Booz Allen Hamilton
 
Global insurers lack commitment to digital ambitions insurance networking news
Global insurers lack commitment to digital ambitions   insurance networking newsGlobal insurers lack commitment to digital ambitions   insurance networking news
Global insurers lack commitment to digital ambitions insurance networking newsDigital Insurance News
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do now
Grant Thornton LLP
 
A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry
The Digital Insurer
 

What's hot (20)

Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
The way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of Things
 
Building Trust Through Social Media
Building Trust Through Social MediaBuilding Trust Through Social Media
Building Trust Through Social Media
 
2016 Edelman Trust Barometer New Zealand
2016 Edelman Trust Barometer New Zealand2016 Edelman Trust Barometer New Zealand
2016 Edelman Trust Barometer New Zealand
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Europe and the Internet: It’s complicated
Europe and the Internet: It’s complicatedEurope and the Internet: It’s complicated
Europe and the Internet: It’s complicated
 
Cloud complexity: the need for resilience
Cloud complexity: the need for resilienceCloud complexity: the need for resilience
Cloud complexity: the need for resilience
 
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
 
Improving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause AnalysisImproving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause Analysis
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Executive summary - App nations
Executive summary - App nationsExecutive summary - App nations
Executive summary - App nations
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management Study
 
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
 
Smart Data Infographic
Smart Data InfographicSmart Data Infographic
Smart Data Infographic
 
Global insurers lack commitment to digital ambitions insurance networking news
Global insurers lack commitment to digital ambitions   insurance networking newsGlobal insurers lack commitment to digital ambitions   insurance networking news
Global insurers lack commitment to digital ambitions insurance networking news
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do now
 
A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry
 

Similar to Privacy & Security: The New Drivers of Brand, Reputation and Action

2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
Ping Identity
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
CynergisTek, Inc.
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
FigLeaf
 
Mis tue sponsored breakfast trus te
Mis tue sponsored breakfast   trus teMis tue sponsored breakfast   trus te
Mis tue sponsored breakfast trus teMediaPost
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
Capgemini
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
TrustArc
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALPeggy Lawless
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
4iQ
 
2012 12, asparna report - online privacy in 2012 - highlights
2012 12, asparna report - online privacy in 2012 - highlights2012 12, asparna report - online privacy in 2012 - highlights
2012 12, asparna report - online privacy in 2012 - highlightsEtamar Laron
 
State of Security
State of SecurityState of Security
State of Security
- Mark - Fullbright
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
Ipsos UK
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security compliance
FindWhitePapers
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
Echoworx
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
Lorena Magee
 
Presentation bip sidibe group
Presentation bip sidibe groupPresentation bip sidibe group
Presentation bip sidibe group
Charles-Aboubacar SIDIBE, CISSP, CISM
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
Experian_US
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
Ping Identity
 
2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report
Hewlett Packard Enterprise Business Value Exchange
 
Survey results: The age of unbounded data
Survey results: The age of unbounded dataSurvey results: The age of unbounded data
Survey results: The age of unbounded dataMoxie Insight
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
Carbonite
 

Similar to Privacy & Security: The New Drivers of Brand, Reputation and Action (20)

2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
 
Mis tue sponsored breakfast trus te
Mis tue sponsored breakfast   trus teMis tue sponsored breakfast   trus te
Mis tue sponsored breakfast trus te
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
 
2012 12, asparna report - online privacy in 2012 - highlights
2012 12, asparna report - online privacy in 2012 - highlights2012 12, asparna report - online privacy in 2012 - highlights
2012 12, asparna report - online privacy in 2012 - highlights
 
State of Security
State of SecurityState of Security
State of Security
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security compliance
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
Presentation bip sidibe group
Presentation bip sidibe groupPresentation bip sidibe group
Presentation bip sidibe group
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
 
2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report
 
Survey results: The age of unbounded data
Survey results: The age of unbounded dataSurvey results: The age of unbounded data
Survey results: The age of unbounded data
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
 

More from Edelman

2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
Edelman
 
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
Edelman
 
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
Edelman
 
2018 Federal Cabinet Shuffle
2018 Federal Cabinet Shuffle2018 Federal Cabinet Shuffle
2018 Federal Cabinet Shuffle
Edelman
 
The Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet ShuffleThe Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet Shuffle
Edelman
 
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World 2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
Edelman
 
Edelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry PerceptionsEdelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman
 
2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional Investors2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional Investors
Edelman
 
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
Edelman
 
8 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 20188 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 2018
Edelman
 
The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018
Edelman
 
2018 Edelman Trust Barometer Special Report: Trust in Brand China
2018 Edelman Trust Barometer Special Report:  Trust in Brand China2018 Edelman Trust Barometer Special Report:  Trust in Brand China
2018 Edelman Trust Barometer Special Report: Trust in Brand China
Edelman
 
2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report 2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report
Edelman
 
Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018
Edelman
 
2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAE2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAE
Edelman
 
2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia Report2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia Report
Edelman
 
2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia Results2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia Results
Edelman
 
2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa Report2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa Report
Edelman
 
2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil Report2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil Report
Edelman
 
Edelman 2018 Federal Budget Update
Edelman 2018 Federal Budget UpdateEdelman 2018 Federal Budget Update
Edelman 2018 Federal Budget Update
Edelman
 

More from Edelman (20)

2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
 
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
 
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
 
2018 Federal Cabinet Shuffle
2018 Federal Cabinet Shuffle2018 Federal Cabinet Shuffle
2018 Federal Cabinet Shuffle
 
The Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet ShuffleThe Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet Shuffle
 
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World 2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
 
Edelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry PerceptionsEdelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry Perceptions
 
2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional Investors2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional Investors
 
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
 
8 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 20188 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 2018
 
The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018
 
2018 Edelman Trust Barometer Special Report: Trust in Brand China
2018 Edelman Trust Barometer Special Report:  Trust in Brand China2018 Edelman Trust Barometer Special Report:  Trust in Brand China
2018 Edelman Trust Barometer Special Report: Trust in Brand China
 
2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report 2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report
 
Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018
 
2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAE2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAE
 
2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia Report2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia Report
 
2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia Results2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia Results
 
2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa Report2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa Report
 
2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil Report2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil Report
 
Edelman 2018 Federal Budget Update
Edelman 2018 Federal Budget UpdateEdelman 2018 Federal Budget Update
Edelman 2018 Federal Budget Update
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Privacy & Security: The New Drivers of Brand, Reputation and Action

  • 1. Privacy & Security: The New Drivers of Brand, Reputation and Action Global Insights 2012
  • 2. Data security and privacy have moved from the backroom to the boardroom. Data breaches, security incidents and Edelman’s industry study shows, for the privacy missteps are making headlines first time, why managing data security worldwide and have become a focal and privacy impact business success. point for social media discussions and Our survey reveals: legislation. The gap between consumer expectations Managing data security and privacy and what businesses are actually effectively is essential to businesses delivering. today. The growing volume and A relationship between effective data sensitivity of information being shared, protection and business success. stored and used is driving demand for That data security and privacy greater transparency about how it is considerations do impact purchasing being managed and protected. decisions.
  • 3. People care about the security of their personal information more than ever before. A majority of consumers are more concerned about data security and privacy than they were five years ago and sense they are powerless to exert control, leaving companies with the responsibility for protecting it. of global consumers are 70% MORE CONCERNED than they were 5 years ago of global consumers feel they have 68% LOST CONTROL over how their personal information is shared and used by companies Base: All respondents (Global n=4,050) Q12. Compared to five years ago, how has your level of concern regarding online data security and privacy changed? Q15. Using a scale of 1 to 5, where 1 means “strongly disagree” and 5 means “strongly agree,” please indicate your level of agreement with the following statements. (Summary of top 2 box scores shown)
  • 4. These concerns present both a challenge and an opportunity for businesses. Consumers are fed up with the status quo and want companies to act, having seen either no change or a decline in the security of their data over the last five years. Security of Personal Information Online Compared to Five Years Ago (Global) of global consumers feel their 7% Much more secure 32% online privacy is adequately PROTECTED by business practices Somewhat more secure No Change 36% Somewhat less secure Much less secure of global consumers feel companies 85% need to take security & privacy 23% 57% of consumers report no MORE SERIOUSLY change or a decline in the security of their personal 25% information online 9% Base: All respondents (Global n=4,050) Q15. Using a scale of 1 to 5, where 1 means “strongly disagree” and 5 means “strongly agree,” please indicate your level of agreement with the following statements. (Summary of top 2 box scores shown) Q14. Compared to five years ago, how would you describe the security of your personal information online?
  • 5. Adults are most concerned about information held by businesses they use most frequently. Online shopping and banking, which require the sharing of financial information, are the most common online activities. Understandably, consumers are most concerned about the security of their financial information. Most Common Online Activities Information of Greatest Concern Online (Global) (Global) Financial information 90% Personal information 78% Online Shopping 82% Emails 36% Health information 28% Frequent purchase / shopping data 26% Content posted by you to social networks 17% Online Banking 80% Content posted by others to social networks 13% Browsing activity 12% Base: All respondents (Global n=4,050) Q1. Which of the following actions have you taken in the past three months? Q3. What types of online personal information are you most concerned about? Please order the following types of information from least to most important.
  • 6. Financial institutions and online retailers are not meeting the needs of their customers. A notable gap exists between the number of people who consider data security important in the finance and online retail industries and the number who actually trust them to protect personal information. 23-point gap in expectations 51-point gap in expectations 92% Importance of privacy and security in each industry (global) 84% 78% 77% Trust in each industry to protect personal information (global) 69% 69% 63% 51% 50% 50% 48% 43% 37% 33% 27% 23% 12% 12% 9% 11% 6% Finance Online Medical & Government Social Technology News & Automotive Food & Gaming Utilities* Shopping & Healthcare Networking Media Grocery Retail NOTE: Q7: summary of top 2 box scores shown; Q8: top three industries selected Base: All respondents (Global n=4,050) Q7. How important is your privacy and security when doing business with the following industries? *NOTE: Utilities not included as a response code Q8. Which industry do you trust most to adequately protect your personal information? Please select the top three industries.
  • 7. Concern over businesses’ ability to protect information impacts engagement in activities important to online retailers and banks. Consumers report abstaining from frequent shopping or loyalty card programs and online banking to protect their personal information. Consumers Taking Action to Protect their Online Information ONE in FIVE adults do not join a frequent shopping ONE in TEN adults card or loyalty card program do not bank online Base: All respondents (Global n=4,050) Q4. Which of the following actions have you taken to protect your online information?
  • 8. Consumers consider data security and privacy features when purchasing tech products. Nearly half of consumers reported that data security is among the top three factors they consider when purchasing a smartphone. Top Three Most Important Factors Considered When Purchasing Smartphones (Global) 69% 61% 48% 47% 40% 35% Price Ease of Use Data Security & Privacy Style & Design Product Warranty Physical Dimensions (size, weight) Base: All respondents (Global n=4,050) Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
  • 9. Security considerations also impact other purchasing decisions. For personal computers and tablets, security considerations are on par with style, design and physical dimensions of the product. Top Three Most Important Factors Considered When Purchasing Tablets and Personal Computers (Global) Price 71% 75% Ease of Use 59% 53% Data Security & Privacy 42% 51% Style & Design 42% 34% Product Warranty 45% 54% Physical Dimensions (size, weight) 43% 34% Base: All respondents (Global n=4,050) Tablets Personal Computers Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
  • 10. Security considerations also impact other purchasing decisions. Even shoppers of traditional mobile phones and videogame consoles feel security is a key concern. of global consumers consider DATA SECURITY AND PRIVACY 29% among the top 3 most important factors when purchasing standard mobile phones of global consumers consider 22% DATA SECURITY AND PRIVACY among the top 3 most important factors when purchasing videogame consoles Base: All respondents (Global n=4,050) Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
  • 11. Smartphones are suffering from a trust gap. More customers take security into account when purchasing a smartphone than say they trust the security of the devices. Comparatively, smartphones are considered the least secure devices. Consumers selecting Data Security and Privacy among Top Three Most Important Factors vs. Trust in Security of Devices (Global) 14-point difference in consumers considering security 58% important and those that trust security for smartphones 51% 48% 44% 42% 37% 37% 34% 29% 22% 17% Personal Computers Tablets Smartphones Standard Mobile Videogame Console Digital Music Player* Phones Consumers selecting Data Security & Privacy among Top Three Important Factors Trust in Security of Device Base: All respondents (Global n=4,050) Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices. Q6.Please indicate your level of trust in the security of the following types of products. *NOTE: Digital music player not included as a response code
  • 12. The premium on security translates to adoption and retention of consumers. Consumers indicate willingness to leave online services if personal information was accessed without permission and are most concerned about services that involve financial information. Consumers Likely to Switch Providers or Stop Using Services Entirely if Personal Information was Accessed Without Permission (Global) 80% 79% 77% 75% 75% 67% 67% 65% 63% 59% 55% 55% 54% 50% Base: All respondents (Global n=4,050) Q9. For the following types of companies, if your personal information was accessed without your permission, how likely would you be to switch to a different provider or stop using these services entirely, if they did have personal information on you? Please use a scale of 1-5, where 1 is “not at all likely” and 5 is “very likely.”
  • 13. Businesses must manage security and privacy like a line of business and will lose customers if they do not. Data shows that inaction on issues of data security and privacy will put businesses are risk of losing their customer base. Consumers that have Left or Avoided Companies because of Security Issues they have had in the Past 58% 55% 53% 52% 46% 41% 36% 31% Global US Brazil China Germany India Korea UK Base: All respondents (Global n=4,050) Q16. Have you ever left or avoided companies because they have had security issues in the past?
  • 14. Consumers indicate they will act to protect their privacy if businesses don’t. In the wake of a data breach, individuals are even willing to abandon the companies they trust most. Data breaches may also impact reputation due to the strong tendency of victims to share their experiences. Americans proved most loyal to the Actions Taken following Data Breach Events companies they do business with, yet ONE in TWO say they are likely to of global consumers change brands after a data breach 39% TOLD A FRIEND about their experience of global consumers would 71% SWITCH PROVIDERS of global consumers after a company they rarely used suffered a data breach 29% POSTED ONLINE about their experience Base: All respondents (Global n=4,050) Q10. If the brand you trust most and use most loyally suffered a data breach, how likely would you be to switch brands? Q11. If a brand you rarely use (but still has your personal data) suffered a data breach, how likely would you be to switch brands? Q21. Did you take any action following these events?