SlideShare ist ein Scribd-Unternehmen logo
1 von 11
The Privacy Dividend Business case "Privacy protection is not a cost of doing business, it is part of doing business"
The business case  Protecting personal privacy makes good business sense. It should bring real and significant benefits that far outweigh the effort privacy protection requires. The alternative, of ignoring privacy and leaving personal information inadequately protected, has significant downsides
Compliance Requirements
ROI 85% of private organisations believe that the DPA improves information management. [92% for public organisations] Annual Track 2008 – Organisations Report31, ICO Return on investment for enterprise data protection, where that has been assessed, can be as high as 4 to 1
Board Level Attention Create an attitude for the enterprise Create cultural leadership Drives business as usual activities Removes organisational barriers Delivers funding Ensure long term and ongoing support Google, Schmidt (CEO) says (on Data gathering and privacy), is kept in check by its customers and by the competition: And the reason that you should trust us is that if we were to violate that trust people would move immediately to someone else. We're very non-sticky so we have a very high interest in maintaining the trust of those users."
Benefits of Proactive Protection Organisational success Achieving business objectives Asset to organisation Efficiencies Productivity Change agility New opportunities Public awareness Reduced costs of data collection Increased accuracy of data improves reputation Services more attractive Rapid response to requests Risks Wrongly delivered services Delivery out of time Impact to strategic decisions Costs to business
Benefits of Proactive Protection Assets to the Individual Trust = increased profit Respect Better data collection Loyal employees Minimise privacy violation costs Assets to 3rd Parties Cost of privacy failure are substantial Competitive disadvantage Assets to society Do the right thing Compliance (costs could include loss of operating licenses) Confidence Loyalty Brand Legislations costs
Privacy in the supply chain Privacy should be designed into organisation system and processes Comprehensive vs. minimalist approach DPA is a minimum requirement More comprehensive the proactive approach the better market differentiation to competitors and peers Equates to efficiencies and control Reduce “whole life costs” e.g. less external audits Privacy is good information management
The virtuous circle in the supply chain of information assets Information assets are transacted to create a shared ownership and responsibility with the assumption that all assets are backed with relevant layers of security and privacy protection. The virtuous circle requires that all stakeholders are able to demonstrate a privacy dividend to each other on an on-going basis and build trust. What keeps this circle in check are the pressures from market forces and international legislation.
Protecting the supply chain of information assets IT/Helpdesk Services Systems Lifecycle Management Endpoint Protection Individual Data Server Monitoring Compliance Management Alerts Abuse/Threat Management Hardware Theft Alert Data Leakage / Loss Forensics Software Misuse/Piracy Alerts Modular Protection Prevention Services
The Privacy Dividend Security as an Asset not a Cost Yusuf Hassan Yusuf.hassan@cryptic.co.uk Twitter: @privacytalks http://uk.linkedin.com/in/yusufhassan Cryptic Ltd

Weitere ähnliche Inhalte

Was ist angesagt?

BCI Zurich Webinar Report Launch Nov 16 2016
BCI  Zurich Webinar Report Launch Nov 16 2016BCI  Zurich Webinar Report Launch Nov 16 2016
BCI Zurich Webinar Report Launch Nov 16 2016
Nick Wildgoose
 
Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?
boldonjames
 
February 2009 Working the IT/RIM Relationship Presentation by Helen Streck
February 2009 Working the IT/RIM Relationship Presentation by Helen StreckFebruary 2009 Working the IT/RIM Relationship Presentation by Helen Streck
February 2009 Working the IT/RIM Relationship Presentation by Helen Streck
John Wang
 
Legal risk advisory services 2013
Legal risk advisory services 2013Legal risk advisory services 2013
Legal risk advisory services 2013
Nidhi Gupta
 

Was ist angesagt? (19)

Avoid the Audit Trap
Avoid the Audit TrapAvoid the Audit Trap
Avoid the Audit Trap
 
Governance, Risk, Compliance & Trust (OCEG graphics removed)
Governance, Risk, Compliance & Trust (OCEG graphics removed)Governance, Risk, Compliance & Trust (OCEG graphics removed)
Governance, Risk, Compliance & Trust (OCEG graphics removed)
 
DOL Fiduciary Rule Infographic
DOL Fiduciary Rule InfographicDOL Fiduciary Rule Infographic
DOL Fiduciary Rule Infographic
 
Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You Up
 
The Future of Effective Governance
The Future of Effective GovernanceThe Future of Effective Governance
The Future of Effective Governance
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security Solutions
 
Why does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-programWhy does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-program
 
Legal Governance, Risk Management and Compliance
Legal Governance, Risk Management and ComplianceLegal Governance, Risk Management and Compliance
Legal Governance, Risk Management and Compliance
 
JS Favs - COBIT5
JS Favs - COBIT5JS Favs - COBIT5
JS Favs - COBIT5
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-management
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
 
BCI Zurich Webinar Report Launch Nov 16 2016
BCI  Zurich Webinar Report Launch Nov 16 2016BCI  Zurich Webinar Report Launch Nov 16 2016
BCI Zurich Webinar Report Launch Nov 16 2016
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Corporate Compliance Report 2 A
Corporate Compliance Report 2 ACorporate Compliance Report 2 A
Corporate Compliance Report 2 A
 
Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?
 
February 2009 Working the IT/RIM Relationship Presentation by Helen Streck
February 2009 Working the IT/RIM Relationship Presentation by Helen StreckFebruary 2009 Working the IT/RIM Relationship Presentation by Helen Streck
February 2009 Working the IT/RIM Relationship Presentation by Helen Streck
 
Regulatory relationship-management
Regulatory relationship-managementRegulatory relationship-management
Regulatory relationship-management
 
Human resources protecting confidentiality
Human resources protecting confidentialityHuman resources protecting confidentiality
Human resources protecting confidentiality
 
Legal risk advisory services 2013
Legal risk advisory services 2013Legal risk advisory services 2013
Legal risk advisory services 2013
 

Ähnlich wie The Privacy Dividend Business Case

Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentiality
Prithvi Ghag
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
NA Putra
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 

Ähnlich wie The Privacy Dividend Business Case (20)

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentiality
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity CurveAsset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
Security, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it rightSecurity, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it right
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the New
 
Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...
 
Privacy Operations (PrivacyOps) Framework - Feroot Privacy
Privacy Operations (PrivacyOps) Framework - Feroot PrivacyPrivacy Operations (PrivacyOps) Framework - Feroot Privacy
Privacy Operations (PrivacyOps) Framework - Feroot Privacy
 
PrivacyOps Framework
PrivacyOps FrameworkPrivacyOps Framework
PrivacyOps Framework
 
Legal challenges of big data
Legal challenges of big dataLegal challenges of big data
Legal challenges of big data
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Testing
TestingTesting
Testing
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
 
10 Key Data Privacy Checklists for B2B 1.pdf
10 Key Data Privacy Checklists for B2B 1.pdf10 Key Data Privacy Checklists for B2B 1.pdf
10 Key Data Privacy Checklists for B2B 1.pdf
 
value and implications of master data management.pptx
value and implications of master data management.pptxvalue and implications of master data management.pptx
value and implications of master data management.pptx
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 

The Privacy Dividend Business Case

  • 1. The Privacy Dividend Business case "Privacy protection is not a cost of doing business, it is part of doing business"
  • 2. The business case Protecting personal privacy makes good business sense. It should bring real and significant benefits that far outweigh the effort privacy protection requires. The alternative, of ignoring privacy and leaving personal information inadequately protected, has significant downsides
  • 4. ROI 85% of private organisations believe that the DPA improves information management. [92% for public organisations] Annual Track 2008 – Organisations Report31, ICO Return on investment for enterprise data protection, where that has been assessed, can be as high as 4 to 1
  • 5. Board Level Attention Create an attitude for the enterprise Create cultural leadership Drives business as usual activities Removes organisational barriers Delivers funding Ensure long term and ongoing support Google, Schmidt (CEO) says (on Data gathering and privacy), is kept in check by its customers and by the competition: And the reason that you should trust us is that if we were to violate that trust people would move immediately to someone else. We're very non-sticky so we have a very high interest in maintaining the trust of those users."
  • 6. Benefits of Proactive Protection Organisational success Achieving business objectives Asset to organisation Efficiencies Productivity Change agility New opportunities Public awareness Reduced costs of data collection Increased accuracy of data improves reputation Services more attractive Rapid response to requests Risks Wrongly delivered services Delivery out of time Impact to strategic decisions Costs to business
  • 7. Benefits of Proactive Protection Assets to the Individual Trust = increased profit Respect Better data collection Loyal employees Minimise privacy violation costs Assets to 3rd Parties Cost of privacy failure are substantial Competitive disadvantage Assets to society Do the right thing Compliance (costs could include loss of operating licenses) Confidence Loyalty Brand Legislations costs
  • 8. Privacy in the supply chain Privacy should be designed into organisation system and processes Comprehensive vs. minimalist approach DPA is a minimum requirement More comprehensive the proactive approach the better market differentiation to competitors and peers Equates to efficiencies and control Reduce “whole life costs” e.g. less external audits Privacy is good information management
  • 9. The virtuous circle in the supply chain of information assets Information assets are transacted to create a shared ownership and responsibility with the assumption that all assets are backed with relevant layers of security and privacy protection. The virtuous circle requires that all stakeholders are able to demonstrate a privacy dividend to each other on an on-going basis and build trust. What keeps this circle in check are the pressures from market forces and international legislation.
  • 10. Protecting the supply chain of information assets IT/Helpdesk Services Systems Lifecycle Management Endpoint Protection Individual Data Server Monitoring Compliance Management Alerts Abuse/Threat Management Hardware Theft Alert Data Leakage / Loss Forensics Software Misuse/Piracy Alerts Modular Protection Prevention Services
  • 11. The Privacy Dividend Security as an Asset not a Cost Yusuf Hassan Yusuf.hassan@cryptic.co.uk Twitter: @privacytalks http://uk.linkedin.com/in/yusufhassan Cryptic Ltd