SlideShare a Scribd company logo
1 of 15
Symantec State of European Data Privacy
Symantec EMEA PR
October 2016
SYMANTEC STATE OF EUROPEAN DATA PRIVACY
2
Copyright © 2016 Symantec Corporation
CONTENTS
---------------------------------------------------------------------------------------------------------------------------------------------------------
3 Methodology
---------------------------------------------------------------------------------------------------------------------------------------------------------
4 Regulatory Awareness
---------------------------------------------------------------------------------------------------------------------------------------------------------
7 A Consumer Disconnect
---------------------------------------------------------------------------------------------------------------------------------------------------------
10 Cultural preparedness
---------------------------------------------------------------------------------------------------------------------------------------------------------
13 Technical readiness & The Right to Be Forgotten
---------------------------------------------------------------------------------------------------------------------------------------------------------
METHODOLOGY
• Symantec commissioned independent research firm, Vanson Bourne, to interview 900 business
decision-makers and IT decision-makers in the UK, Germany and France during September 2016
• To qualify for the research the businesses decision makers and IT decision-makers organisations
had to have at least 50 employees
• Respondents were asked about the General Data Protection Regulation (GDPR) during interviews
conducted during September 2016
• Respondents were equally balanced between countries and were interviewed across all private
and public sectors
3
Copyright © 2014 Symantec Corporation
UK GERMANY FRANCE
300
Margin of Error =+/- 5%
margin
300
Margin of Error =+/- 5%
margin
300
Margin of Error =+/- 5%
margin
Copyright © 2016 Symantec Corporation
Regulatory Awareness
BUSINESSES ARE NOT ONLY UNDERPREPARED FOR THE
GDPR – THEY ARE UNDERPREPARING.
Copyright © 2014 Symantec Corporation
57%
53%
48%
43%
42%
42%
33%
28%
24%
2%
0%
Regulations applying to all EU member states
Gaining consent for data collection
Reporting data breaches
The requirement of a Data Protection Officer (DPO)
Protecting data in an ethical way
Providing information on retention time for personal
data
Using data in an ethical way
The right to be forgotten for citizens
The ability for individuals to easily transfer their data
files from one service provider to another
None of the above
*Other (please specify)
Elements respondents believe to be part of the GDPR
Have concerns about ability to
become compliant
9 in 10
Do not fully understand GDPR
96%
Believe their organization is fully
prepared for GDPR
26%
Consider compliance at top priority
in the next two years
22%
Copyright © 2016 Symantec Corporation
STARK LACK OF CONFIDENCE IN MEETING MAY 2018
DEADLINE REVEALED
Copyright © 2014 Symantec Corporation
6
21%
48%
20%
3%
7%
Confidence of compliance by May 2018
Yes, we are already compliant
Yes, we will be fully compliant by May 2018
Yes, we will be partly compliant by May 2018
No, not at all compliant
Don’t know
Believe it is even possible to
become fully compliant with the
GDPR
1 in 5
Said their organisation will not be
compliant at all, or only partly
compliant, by 2018
23%
Believe that while some company
departments will be able to comply
- others will not
49%
Copyright © 2016 Symantec Corporation
A Consumer Disconnect
ACCORDING TO BUSINESSES, CONSUMERS DON’T
CONSIDER DATA SECURITY & PRIVACY A TOP PRIORITY…
Copyright © 2014 Symantec Corporation
8
73%
60%
56%
29%
26%
23%
16%
13%
27%
40%
44%
71%
74%
77%
84%
87%
Quality of products
Good customer service
Cost of products
Track record of data security
Track record of data privacy
Organisation's ethical stance
The innovativeness of the organisation
Whether they have an existing relationship
Business perception of consumer priorities
Top three priority Not a top three priority
Admit customers ask about data
security during transactions
36%
Do not think an organisation’s
privacy track record is a top three
consideration for customers
74%
Do not believe their organisation
takes an ethical approach to
securing and protecting data
35%
Copyright © 2016 Symantec Corporation
Copyright © 2014 Symantec Corporation
9
Of respondents are not confident they
completely meet customers’ data
security expectations
55%
88% 86%
82%
69%
56%
47%
Symantec State of Privacy: Importance of
factors when choosing a company to shop with
or use
…YET CONSUMERS RANK IT #1, SHOWING BUSINESSES
ARE OUT OF TOUCH
Do not believe their organisation
takes an ethical approach to
securing and protecting data.
45%
Copyright © 2016 Symantec Corporation
Cultural preparedness
BUSINESSES ARE UNDERESTIMATING THE CULTURAL
CHANGES THEY NEED TO MAKE AHEAD OF MAY 2018
Copyright © 2014 Symantec Corporation
11
4%
9%
6%
7%
11%
13%
Employee personal information
Customer information (personal)
Customer information (including payment
details)
Company records
Information on competitors
Market data
Companies where all employees can access the
following information
Say all staff can access customers’
payment details
6%
Say all employees can access
customers’ personal information
1 in 10
Believe everyone in the
organisation has a responsibility to
ensure data is protected
14%
Copyright © 2016 Symantec Corporation
PARTICUARLY GIVEN THE WIDE REACHING ACCESS
EMPLOYEES HAVE TO PERSONAL INFORMATION
Copyright © 2014 Symantec Corporation
12
47%
42%
12%
39% 48%
13%
Yes, it is a top priority Yes, it is a priority No, it is not a priority
Respondents that believe managing and
using data in an ethical way is a priority
for their organisation
Managing data in an ethical way Using data in an ethical way
Said they would be increasing
security training
45%
Said managing data ethically is a
top priority for their organisation
47%
Are planning to completely
overhaul their approach to security
in response to the GDPR
27%
Copyright © 2016 Symantec Corporation
Technical readiness & The
Right to Be Forgotten
BUSINESSES ARE CONCERNED ABOUT THE COMPLEXITY
OF PROCESSING DATA CORRECTLY
Copyright © 2014 Symantec Corporation
14
Believe customers would exercise
their right for data to be deleted
81%
Say deleting customer data will be
a challenge
9 in 10
Have already received requests to
be forgotten
1 in 10
Currently do not have a system in
place to forget a customer
60%
45%
42%
34%
33% 32%
25%
0%
7%
3%
Challenges organisations face if customers ask to
have their data modified or deleted
Copyright © 2016 Symantec Corporation
Thank you!
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Copyright © 2014 Symantec Corporation
15
Copyright © 2016 Symantec Corporation
Copyright © 2016 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for the informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express
or implied, are disclaimed to the maximum extent allowed by law. The information is this document is subject to change without notice.

More Related Content

Viewers also liked

The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Enhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseEnhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseSymantec
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...Eric Wu
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldElastica Inc.
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxElastica Inc.
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365Symantec
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google AppsElastica Inc.
 
By the Power of Metrics - Lean Kanban North America 2015
By the Power of Metrics - Lean Kanban North America 2015By the Power of Metrics - Lean Kanban North America 2015
By the Power of Metrics - Lean Kanban North America 2015Wolfgang Wiedenroth
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365Elastica Inc.
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionBlue Coat
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"AWS Chicago
 

Viewers also liked (18)

The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Enhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseEnhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open Enterprise
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
By the Power of Metrics - Lean Kanban North America 2015
By the Power of Metrics - Lean Kanban North America 2015By the Power of Metrics - Lean Kanban North America 2015
By the Power of Metrics - Lean Kanban North America 2015
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"
 
Learning in a Multi-device World
Learning in a Multi-device World Learning in a Multi-device World
Learning in a Multi-device World
 

Similar to Symantec - State of European Data Privacy

Symantec investor presentation march 2016
Symantec investor presentation march 2016 Symantec investor presentation march 2016
Symantec investor presentation march 2016 InvestorSymantec
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016Symantec investor presentation march 2016
Symantec investor presentation march 2016InvestorSymantec
 
Symantec investor presentation february 2016 final
Symantec investor presentation february 2016 finalSymantec investor presentation february 2016 final
Symantec investor presentation february 2016 finalInvestorSymantec
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation surveyBrunswick Group
 
Customer Experience in Insurance: Insurer Strategies, Plans and Progress
Customer Experience in Insurance: Insurer Strategies, Plans and ProgressCustomer Experience in Insurance: Insurer Strategies, Plans and Progress
Customer Experience in Insurance: Insurer Strategies, Plans and ProgresseSignLive by VASCO
 
Supplier Risk: What You Don’t See Can Hurt You
Supplier Risk: What You Don’t See Can Hurt YouSupplier Risk: What You Don’t See Can Hurt You
Supplier Risk: What You Don’t See Can Hurt YouSAP Ariba
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALWayne Anderson
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today Ghostery, Inc.
 
Sap presentation unleash the power of big data with the sap hana platform
Sap presentation   unleash the power of big data with the sap hana platformSap presentation   unleash the power of big data with the sap hana platform
Sap presentation unleash the power of big data with the sap hana platformDr. Wilfred Lin (Ph.D.)
 
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessPre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessCA Technologies
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and GovernanceSAP Analytics
 
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...Mark Fenna
 
The FinTech Moment
The FinTech MomentThe FinTech Moment
The FinTech Momentgurugaonkar
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataBluelock
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataKayla Catron
 
Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2Baraa Arksousi
 
Strategic Sourcing in the Digital Economy
Strategic Sourcing in the Digital EconomyStrategic Sourcing in the Digital Economy
Strategic Sourcing in the Digital EconomySAP Ariba
 
Big Data Industry Insights 2015
Big Data Industry Insights 2015 Big Data Industry Insights 2015
Big Data Industry Insights 2015 Den Reymer
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013InvestorSymantec
 
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?Executive Leaders Network
 

Similar to Symantec - State of European Data Privacy (20)

Symantec investor presentation march 2016
Symantec investor presentation march 2016 Symantec investor presentation march 2016
Symantec investor presentation march 2016
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016Symantec investor presentation march 2016
Symantec investor presentation march 2016
 
Symantec investor presentation february 2016 final
Symantec investor presentation february 2016 finalSymantec investor presentation february 2016 final
Symantec investor presentation february 2016 final
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation survey
 
Customer Experience in Insurance: Insurer Strategies, Plans and Progress
Customer Experience in Insurance: Insurer Strategies, Plans and ProgressCustomer Experience in Insurance: Insurer Strategies, Plans and Progress
Customer Experience in Insurance: Insurer Strategies, Plans and Progress
 
Supplier Risk: What You Don’t See Can Hurt You
Supplier Risk: What You Don’t See Can Hurt YouSupplier Risk: What You Don’t See Can Hurt You
Supplier Risk: What You Don’t See Can Hurt You
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today
 
Sap presentation unleash the power of big data with the sap hana platform
Sap presentation   unleash the power of big data with the sap hana platformSap presentation   unleash the power of big data with the sap hana platform
Sap presentation unleash the power of big data with the sap hana platform
 
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessPre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
 
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...
 
The FinTech Moment
The FinTech MomentThe FinTech Moment
The FinTech Moment
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2
 
Strategic Sourcing in the Digital Economy
Strategic Sourcing in the Digital EconomyStrategic Sourcing in the Digital Economy
Strategic Sourcing in the Digital Economy
 
Big Data Industry Insights 2015
Big Data Industry Insights 2015 Big Data Industry Insights 2015
Big Data Industry Insights 2015
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013
 
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 

Recently uploaded (20)

WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 

Symantec - State of European Data Privacy

  • 1. Symantec State of European Data Privacy Symantec EMEA PR October 2016
  • 2. SYMANTEC STATE OF EUROPEAN DATA PRIVACY 2 Copyright © 2016 Symantec Corporation CONTENTS --------------------------------------------------------------------------------------------------------------------------------------------------------- 3 Methodology --------------------------------------------------------------------------------------------------------------------------------------------------------- 4 Regulatory Awareness --------------------------------------------------------------------------------------------------------------------------------------------------------- 7 A Consumer Disconnect --------------------------------------------------------------------------------------------------------------------------------------------------------- 10 Cultural preparedness --------------------------------------------------------------------------------------------------------------------------------------------------------- 13 Technical readiness & The Right to Be Forgotten ---------------------------------------------------------------------------------------------------------------------------------------------------------
  • 3. METHODOLOGY • Symantec commissioned independent research firm, Vanson Bourne, to interview 900 business decision-makers and IT decision-makers in the UK, Germany and France during September 2016 • To qualify for the research the businesses decision makers and IT decision-makers organisations had to have at least 50 employees • Respondents were asked about the General Data Protection Regulation (GDPR) during interviews conducted during September 2016 • Respondents were equally balanced between countries and were interviewed across all private and public sectors 3 Copyright © 2014 Symantec Corporation UK GERMANY FRANCE 300 Margin of Error =+/- 5% margin 300 Margin of Error =+/- 5% margin 300 Margin of Error =+/- 5% margin Copyright © 2016 Symantec Corporation
  • 5. BUSINESSES ARE NOT ONLY UNDERPREPARED FOR THE GDPR – THEY ARE UNDERPREPARING. Copyright © 2014 Symantec Corporation 57% 53% 48% 43% 42% 42% 33% 28% 24% 2% 0% Regulations applying to all EU member states Gaining consent for data collection Reporting data breaches The requirement of a Data Protection Officer (DPO) Protecting data in an ethical way Providing information on retention time for personal data Using data in an ethical way The right to be forgotten for citizens The ability for individuals to easily transfer their data files from one service provider to another None of the above *Other (please specify) Elements respondents believe to be part of the GDPR Have concerns about ability to become compliant 9 in 10 Do not fully understand GDPR 96% Believe their organization is fully prepared for GDPR 26% Consider compliance at top priority in the next two years 22% Copyright © 2016 Symantec Corporation
  • 6. STARK LACK OF CONFIDENCE IN MEETING MAY 2018 DEADLINE REVEALED Copyright © 2014 Symantec Corporation 6 21% 48% 20% 3% 7% Confidence of compliance by May 2018 Yes, we are already compliant Yes, we will be fully compliant by May 2018 Yes, we will be partly compliant by May 2018 No, not at all compliant Don’t know Believe it is even possible to become fully compliant with the GDPR 1 in 5 Said their organisation will not be compliant at all, or only partly compliant, by 2018 23% Believe that while some company departments will be able to comply - others will not 49% Copyright © 2016 Symantec Corporation
  • 8. ACCORDING TO BUSINESSES, CONSUMERS DON’T CONSIDER DATA SECURITY & PRIVACY A TOP PRIORITY… Copyright © 2014 Symantec Corporation 8 73% 60% 56% 29% 26% 23% 16% 13% 27% 40% 44% 71% 74% 77% 84% 87% Quality of products Good customer service Cost of products Track record of data security Track record of data privacy Organisation's ethical stance The innovativeness of the organisation Whether they have an existing relationship Business perception of consumer priorities Top three priority Not a top three priority Admit customers ask about data security during transactions 36% Do not think an organisation’s privacy track record is a top three consideration for customers 74% Do not believe their organisation takes an ethical approach to securing and protecting data 35% Copyright © 2016 Symantec Corporation
  • 9. Copyright © 2014 Symantec Corporation 9 Of respondents are not confident they completely meet customers’ data security expectations 55% 88% 86% 82% 69% 56% 47% Symantec State of Privacy: Importance of factors when choosing a company to shop with or use …YET CONSUMERS RANK IT #1, SHOWING BUSINESSES ARE OUT OF TOUCH Do not believe their organisation takes an ethical approach to securing and protecting data. 45% Copyright © 2016 Symantec Corporation
  • 11. BUSINESSES ARE UNDERESTIMATING THE CULTURAL CHANGES THEY NEED TO MAKE AHEAD OF MAY 2018 Copyright © 2014 Symantec Corporation 11 4% 9% 6% 7% 11% 13% Employee personal information Customer information (personal) Customer information (including payment details) Company records Information on competitors Market data Companies where all employees can access the following information Say all staff can access customers’ payment details 6% Say all employees can access customers’ personal information 1 in 10 Believe everyone in the organisation has a responsibility to ensure data is protected 14% Copyright © 2016 Symantec Corporation
  • 12. PARTICUARLY GIVEN THE WIDE REACHING ACCESS EMPLOYEES HAVE TO PERSONAL INFORMATION Copyright © 2014 Symantec Corporation 12 47% 42% 12% 39% 48% 13% Yes, it is a top priority Yes, it is a priority No, it is not a priority Respondents that believe managing and using data in an ethical way is a priority for their organisation Managing data in an ethical way Using data in an ethical way Said they would be increasing security training 45% Said managing data ethically is a top priority for their organisation 47% Are planning to completely overhaul their approach to security in response to the GDPR 27% Copyright © 2016 Symantec Corporation
  • 13. Technical readiness & The Right to Be Forgotten
  • 14. BUSINESSES ARE CONCERNED ABOUT THE COMPLEXITY OF PROCESSING DATA CORRECTLY Copyright © 2014 Symantec Corporation 14 Believe customers would exercise their right for data to be deleted 81% Say deleting customer data will be a challenge 9 in 10 Have already received requests to be forgotten 1 in 10 Currently do not have a system in place to forget a customer 60% 45% 42% 34% 33% 32% 25% 0% 7% 3% Challenges organisations face if customers ask to have their data modified or deleted Copyright © 2016 Symantec Corporation
  • 15. Thank you! Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Copyright © 2014 Symantec Corporation 15 Copyright © 2016 Symantec Corporation Copyright © 2016 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for the informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information is this document is subject to change without notice.

Editor's Notes

  1. Demographics Overview 900 IT decision makers and business decision makers were interviewed in September 2016: - Surveyed in the UK (300), France (300) and Germany (300) - To qualify for the research, respondents' organisations had to have at least 50 employees - Respondents were interviewed across all private and public sectors
  2. 96 per cent of companies still do not fully understand the European General Data Protection Regulation - every option presented in the survey is part of the GDPR, so when businesses did not tick all answers they showed that they do not understand the GDPR fully. 96 per cent of businesses did not tick all the options Nine in Ten (91 per cent) of respondents have concerns about their ability to become compliant Only 22 per cent of businesses consider compliance a top priority in the next two years Only 26 per cent of respondents believing their organisation is fully prepared for the GDPR
  3. There is a stark lack of confidence in meeting the May 2018 deadline which leaves businesses at risk of incurring significant fines Nearly a quarter (23 per cent) said their organisation will not be compliant at all, or only partly compliant, by 2018 Of this group, only a fifth (20 per cent) believe it is even possible to become fully compliant with the GDPR Nearly half (49 per cent) believe that while some company departments will be able to comply - others will not
  4. There is a stark lack of confidence in meeting the May 2018 deadline which leaves businesses at risk of incurring significant fines Nearly three quarters (74 per cent) of businesses do not think an organisation’s privacy track record is a top three consideration for customers when choosing who to do business Respondents admit customers ask about data security in more than a third (36 per cent) of transactions 35 per cent of respondents do not believe their organisation takes an ethical approach to securing and protecting data
  5. While businesses grapple to become compliant, they remain out of touch with consumer expectations when it comes to data privacy and security. Nearly three quarters (74 per cent) of businesses do not think an organisation’s privacy track record is a top three consideration for customers when choosing who to do business, despite customers asking about data security in more than a third (36 per cent) of transactions.   Equally concerning is the finding that 45 per cent of respondents do not believe their organisation takes an ethical approach to securing and protecting data.   These results show there is a significant disconnect with consumer priorities. Symantec’s State of Privacy Report, found 88 per cent of European consumers see data security as the most important factor when choosing a company to do business with. In fact, 86 per cent see it as more important than product quality.   Perhaps unsurprisingly then, the State of European Data Privacy found 55 per cent of businesses are not confident they completely meet customers’ data security expectations.
  6. Many businesses have not started working out the necessary organisation and cultural changes they need to make ahead of May 2018 Almost one in 10 (9 per cent) say all employees can access customers’ personal information Six per cent say all staff can access customers’ payment details Only 14 per cent believe everyone in the organisation has a responsibility to ensure data is protected
  7. With such wide reaching access to people’s personal information, businesses are underestimating the challenges they will face in managing this in line with the GDPR Less than half of those surveyed (47 per cent) said managing data ethically is a top priority for their organisation less than half again (45 per cent) said they would be increasing security training Only 27 per cent of businesses are planning to completely overhaul their approach to security in response to the GDPR
  8. The results show businesses will struggle when it comes to The Right To Be Forgotten Only 28 percent of IT and business decision makers realise the right to be forgotten is part of GDPR (see slide 4) 90 per cent of businesses say customers requesting their data be deleted will be a challenge for their organisation 81 per cent of respondents believe their customers would exercise their right for data to be deleted However, 60 per cent of businesses do not currently have a system in place that enables them to respond to these requests Only nine per cent of respondents have already received requests to be forgotten