Welcome!

News Feed Item

Canadian Companies at Risk of Financial and Reputational Damage Resulting from Mismanaged Personal Information

Most firms are unable to adequately protect their customers against data breaches.

TORONTO, Nov. 23, 2012 /CNW/ - Recent studies indicate major discrepancies between the perception of privacy protection in Canada and the reality behind the ability of companies to protect personal information. A recent report from Advertising Standards Canada and MacLaren McCann indicates widespread willingness among Canadians to share personal information, with up to 79% exchanging their data to obtain a benefit. Trust in companies is increasing as up to 80% of Canadians believe their personal data is adequately protected. Unfortunately, the privacy landscape in Canada may suffer as a result of a false sense of privacy, according to a privacy professional and author of "Managing Personal Information: Insights on Corporate Risk and Opportunity for Privacy-Savvy Leaders" (Carswell, 2012).

The President and principal Risk Advisor of Toronto-based Informatica Corporation, Claudiu Popa says "we have been watching these studies come in and individually, they offer significant insight into the state of privacy but a cross-sectional analysis reveals a barometric predictor of the impact of personal information breaches over the short to medium term. The picture that emerges is anything but rosy. That's why we felt it was important to write this book" he added. According to the Edelman Privacy Risk Index, 62% of companies say their organization does not possess the expertise or technology to effectively protect personal information. The severity of these implications is underlined by a reported 15% annual increase in the number of companies that suffer from external privacy and security breaches (according to Ernst & Young).

While 73% of Canadians appear to show a surprising lack of concern over the information they submit online, they also indicate that they are aware that their Internet activities are tracked for marketing purposes. The majority are willing to share location data, shopping data and other information used for promotional purposes. The critical factor for Canadian companies is that 72 percent of respondents said they worry about the erosion of personal privacy even as they continue to share information online. In fact, the majority of Canadians do not want companies to share personal information with third parties and would prefer to have control over the shared data. The current study's findings independently support the book's perspectives as it offers solutions to prevent privacy breaches and their costly outcomes.

According to Claudiu Popa "89 percent of Canadians believe that they're already sharing too much information online and they're not hypocrites, they realize that they need to share information to get things done. Three quarters of consumers will abandon a company if information was accessed without permission. It's simply the way the economy, and the world as a whole, work. Unfortunately organizations that haven't yet read the book misinterpret the need of individuals to share information as a willingness to surrender personal details or even a weakness to be capitalized on. This is a dangerous conclusion to draw, and 57% of companies appear to support this view, because they said they do not consider privacy and the protection of personal information to be a corporate priority while 53 percent mistakenly believe that a data breach would not tarnish their reputation. 61% do not even enforce full compliance with laws and regulations."

At an approximate cost of $200 per compromised record, the average per-incident cost to companies has often exceeded $7 million over the past few years and will continue to climb with changes in legislation surrounding mandatory breach notification and anti-spam provisions. Between consumer concern, regulatory enforcement and litigation carving deeply into Canadian privacy operations, there should be no question that companies of all sizes need to place an absolute priority on compliance and enforcement, but it is often the damaging reputational impact and media scrutiny that convince firms to get serious about personal information protection. "Managing Personal Information" offers actionable guidance to enable the proper implementation of privacy programs within Canadian organizations.

"Managing Personal Information" is a uniquely Canadian collaborative effort to improve privacy and security practices at the higher levels of public and private leadership. The book's notable authors provide exclusive new content along with a foreword by the Ontario Information and Privacy Commissioner, Ann Cavoukian.

SOURCE Informatica Corporation - Information Security Management

Video with caption: "Video: Managing Personal Information: Insights on Corporate Risk and Opportunity for Privacy-Savvy Leaders. Carswell, Thomson Reuters 2012. Available from www.PrivacyRisk.ca". Video available at: http://stream1.newswire.ca/cgi-bin/playback.cgi?file=20121123_C2992_VIDEO_EN_21103.mp4&posterurl=http://photos.newswire.ca/images/20121123_C2992_PHOTO_EN_21103.jpg&clientName=Informatica%20Corporation%20%2D%20Information%20Security%20Management&caption=Video%3A%20Managing%20Personal%20Information%3A%20Insights%20on%20Corporate%20Risk%20and%20Opportunity%20for%20Privacy%2DSavvy%20Leaders%2E%20Carswell%2C%20Thomson%20Reuters%202012%2E%20Available%20from%20www%2EPrivacyRisk%2Eca&title=INFORMATICA%20CORPORATION%20%2D%20INFORMATION%20SECURITY%20MANAGEMENT%20%2D%20Canadian%20Companies%20at%20Risk%20of%20Financial%20and%20Reputational%20Damage%20Resulting%20from%20Mismanaged%20Personal%20Information&headline=Canadian%20Companies%20at%20Risk%20of%20Financial%20and%20Reputational%20Damage%20Resulting%20from%20Mismanaged%20Personal%20Information

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...