Nearly three-quarters of organizations believe they have adequate policies in place to protect sensitive, personal information, yet more than half have lost sensitive data within the past two years — and nearly 60% of those organizations acknowledge data loss as a recurring problem, according to findings of a global study released by Accenture.
The study — which surveyed more than 5,500 business leaders in 19 countries (28% came from Asia Pacific) — reveals a startling difference between organizations’ intentions regarding data privacy and how they actually protect sensitive personal information, such as name, address, date of birth, race, National ID/social security number and medical history. The study was conducted in conjunction with the Ponemon Institute, an independent privacy, protection and information security research firm.
“The volume of sensitive personal information being collected and shared by organizations has grown exponentially in recent years, making data protection a critical business issue and not just a technology concern,” said Alastair MacWillson, managing director of Accenture’s Security practice. “Our study underscores the importance of taking a comprehensive approach to data privacy and protection, one that closes the gaps between business strategy, risk management, compliance reporting and IT security.”
Fifty-eight% of business respondents have experienced at least one data security breach over the past two years, yet 73% said their organization has adequate policies to protect the personally identifiable information it maintains.
While 70% agreed that organizations have an obligation to take reasonable steps to secure consumers’ personal information, there are discrepancies in their commitments for doing so. For instance, 45% of respondents were unsure about or actively disagreed with granting customers the right to control the type of information that is collected about them.
The study also found that 47% were unsure about or disagreed with customers having a right to control how this information is used. Nearly half also did not believe it was important or very important to: limit the collection (47%) or sharing (46%) of sensitive personal customer information; protect consumer privacy rights (47%); prevent cross-border transfers of personal information to countries with inadequate privacy laws (47%); prevent cyber crimes against consumers (48%); or prevent data loss or theft (47%).
It’s a wireless world, of course, and one only likely to get less dependent on physical connectivity in the future – but what that future looks like will depend a lot on the companies exerting the strongest influence on the industry. We...
Your contact lenses or a sensor implanted in your brain could some day send health updates to your smartphone and even your doctor. A new technology called interscatter communication that's being developed at the University of Washington...
There is now a practical, relatively fast attack on 64-bit block ciphers that lets attackers recover authentication cookies and other credentials from HTTPS-protected sessions, a pair of French researchers said. Legacy ciphers Triple-DES and...
After a company has been hacked and the hack has been discovered to be a harmful one, top executives and IT leaders normally huddle in a room to assess the loss. It's usually not a pretty scene. It's not as if heads are exploding. It...
Earlier this year, Adobe took the wraps off its new Adobe Marketing Cloud, touting new data science capabilities like Adobe Analytics' Segment IQ, which uses machine learning to help marketers gain deep insight into audience segments....
Avaya has introduced its concept of Digital Transformation-as-a-Service – SmartDXaaS – for the Asia-Pacific region. Speaking at the start of the annual Avaya Technology Forum in Bangkok, the first in a series of events that will also be...
When David Giambruno was interviewing for the CIO role at Shutterstock earlier this year CEO Jon Oringer, an entrepreneur and software programmer, asked him how he felt having a tech-savvy CEO. "I was like 'Oh my God, I won’t have...
As Malcolm Turnbull will no doubt attest following seven days of intense ‘Census-Gate’ scrutiny, a week is a long time in politics. Likewise in the world of technology, when markets can flip overnight as new trends take over...