SlideShare ist ein Scribd-Unternehmen logo
1 von 38
93% of adults say that
being in control of who
can get information
about them is
important
90% say that
controlling what
information is
collected about them
is important
Consumers don’t seem to care
90% of Americans want privacy, less than 10% believe they can
get it
91 percent had not made any changes to their internet or cell
phone use to avoid having their activities tracked or noticed
www.geekwire.com/
57%
You’d Need 76 Work Days to Read All
Your Privacy Policies Each Year
Types of Identity Theft
Malware
Bots
Malicious
Software
Viruses
Worms
Trojan
Horses
Spyware
Rootkits
Keystroke
logging
Hackers
Dumpster Diving
Stolen Wallet
Change of address
Mail Theft
Shoulder surfing
ATM skimmers
/Handheld
skimmers
Overlays
Data Breaches
50%
2 a
day
 In the U.S. there are about 50,000 sources
of data for reaching individuals
 a total of about 70 billion records
 about 200 records per individual
The next highest you'll find worldwide is only
about six or seven per person, and that's the
U.K. and Japan
According to Gartner, 26 billion connected
devices will populate the world by 2020
Dark Web
The Dark Web is one place where stolen information is offered for sale.
Accessible through the Tor network, the underground comprises of stores and
websites entrenched in illegal activities ranging from the sale of data to hacking
tools to drugs and weaponry.
• A Russian crime ring has amassed the largest known collection of stolen
Internet credentials, including 1.2 billion user name and password
combinations and more than 500 million email addresses, security
researchers say.
• And in October 2013, federal prosecutors said an identity theft service in
Vietnam managed to obtain as many as 200 million personal records,
including Social Security numbers, credit card data and bank account
information from Court Ventures, a company now owned by the data
brokerage firm Experian.
The price for a simple Social Security number has fallen
to as little as $1.
The price for a medical identity in the US is $20.
One US credit card with a date of birth and Social
Security number: $25
According to BlackOps Partners, a firm providing
counterintelligence and trade secret protection,
corporate espionage costs US companies $500 billion
every year.
© 2014, Forrester Research, Inc.
Direct And Hidden Costs Of A
Data Breach
Source: Forrester Research, Inc.
✔
✔
✔
What’s it Cost
The average cost of a computer breach at
large companies in the U.S. was $6.5
million.
The average cost per lost or stolen record
in the United States was $217
Ponemon Institute
Highest Global Fraud Nations
 35% - Indonesia (all Transactions)
 33% - Venezuela
 25% - South Africa
 11% - Brazil
 10% - Romania
Forter
On a Personal note:
When (not if) your identity is stolen
①Place an Initial Fraud Alert
②Order your Credit Reports
③Create an Identity Theft
Report
④Change Your Passwords
https://www.consumer.ftc.gov/articles/pdf-0009-taking-charge.pdf
Self-governance has been effective in forestalling privacy
judgments. Will it continue to hold the line against class-
action lawyers, privacy activists, and rampaging
technology?
 Telemarketing Sales Rule
 FTC’s Privacy Report: Balancing Privacy and Innovation
 The Do Not Track Option: Giving Consumers a choice
 Making Sure Companies Keep Their Privacy Promises to
Consumers
 Protecting Consumers’ Financial Privacy
 The Children’s Online Privacy Protection Act (COPPA): What
Parents Should Know
Protecting Consumer Privacy
No comprehensive national privacy laws exist outside
ones like COPPA for child privacy rights, HIPAA for
health information, and FRCA for financial data.
Will the New Consumer Privacy Bill Protect You?
Bob Sullivan / Credit.com May 1, 2015
A proposed law would beef up your rights when your data is
leaked or stolen.
Leahy has repeatedly proposed legislation since 2005 that would establish a
nationwide notification standard called the Personal Data Privacy and Security Act; it
has not passed.
https://www.whitehouse.gov/the-press-office/2015/02/13/executive-order-
promoting-private-sector-cybersecurity-information-shari
I think that right now is a dangerous time to be a direct
marketer,” says Jay Edelson. He should know. The
Chicago-based attorney makes his living filing class-
action suits against companies that skirt privacy laws.
Stu Ingis of the Venable law firm in Washington, DC—
ranked by several legal guides as one of the top privacy
attorneys in the United States—brands lawyers like
Edelson as bottom-feeders able to convince courts to
see things in laws that are not there.
Get Compliant or…
 Massive AT&T Consumer Privacy Violation
Results in $25 M FCC Penalty (2015)
 $10 M Fine Proposed Against TerraCom and
YourTel for Privacy Breaches (2014)
 For Do Not Call violations, Sprint will pay FCC
$7.5 M (2014)
 Verizon Fined $7.4 M by FCC For Customer
Privacy Violations (2014)
Groups or individuals with expertise in
the area of security or privacy are
invited to register their interest at
iot@truste.com
Takeaways
There is a business opportunity here
Consumers believe business and the government
is not doing enough to protect their privacy
Consumers are not willing to change their current
habits
Stealing customer information is very profitable
Be aware of the laws and penalties
Businesses need help once a breach has been
identified
No dominant player

Weitere ähnliche Inhalte

Was ist angesagt?

The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach ColumnMichael Sexton
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Gradytomo006
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
How secure are you?
How secure are you?How secure are you?
How secure are you?Joe Morris
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftSteve Meek
 
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONSDATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONSSprintzeal
 
15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss IncidentsDatto
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital PiracyErick Prajogo
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Kevin Duffey
 
Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014nationalconsumersleague
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentationmisecho
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 

Was ist angesagt? (20)

The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach Column
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity Theft
 
Facebook
FacebookFacebook
Facebook
 
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONSDATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report 2012 Data Breach Investigations Report
2012 Data Breach Investigations Report
 
Id theft handout individual june 2011
Id theft handout individual june 2011Id theft handout individual june 2011
Id theft handout individual june 2011
 

Ähnlich wie Americans Want Privacy but Struggle to Protect Their Data

wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data BreachShawn Tuma
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agendanationalconsumersleague
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSGreg Ewers
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Cyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryCyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryFerrariT1
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
 

Ähnlich wie Americans Want Privacy but Struggle to Protect Their Data (20)

wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Cyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryCyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care Industry
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
 

Mehr von Gary Kazmer

Supporting the Digital Consumer
Supporting the Digital ConsumerSupporting the Digital Consumer
Supporting the Digital ConsumerGary Kazmer
 
Where is e-Commerce Headed in 2016
Where is e-Commerce Headed in 2016Where is e-Commerce Headed in 2016
Where is e-Commerce Headed in 2016Gary Kazmer
 
etail east 2015 Crayola
etail east 2015 Crayolaetail east 2015 Crayola
etail east 2015 CrayolaGary Kazmer
 
NYPG presentation Q1 2013
NYPG presentation Q1 2013NYPG presentation Q1 2013
NYPG presentation Q1 2013Gary Kazmer
 
Gs lifestyle summary 2013
Gs lifestyle summary 2013Gs lifestyle summary 2013
Gs lifestyle summary 2013Gary Kazmer
 
The revolution of sales
The revolution of salesThe revolution of sales
The revolution of salesGary Kazmer
 

Mehr von Gary Kazmer (6)

Supporting the Digital Consumer
Supporting the Digital ConsumerSupporting the Digital Consumer
Supporting the Digital Consumer
 
Where is e-Commerce Headed in 2016
Where is e-Commerce Headed in 2016Where is e-Commerce Headed in 2016
Where is e-Commerce Headed in 2016
 
etail east 2015 Crayola
etail east 2015 Crayolaetail east 2015 Crayola
etail east 2015 Crayola
 
NYPG presentation Q1 2013
NYPG presentation Q1 2013NYPG presentation Q1 2013
NYPG presentation Q1 2013
 
Gs lifestyle summary 2013
Gs lifestyle summary 2013Gs lifestyle summary 2013
Gs lifestyle summary 2013
 
The revolution of sales
The revolution of salesThe revolution of sales
The revolution of sales
 

Americans Want Privacy but Struggle to Protect Their Data

  • 1.
  • 2.
  • 3. 93% of adults say that being in control of who can get information about them is important 90% say that controlling what information is collected about them is important
  • 4. Consumers don’t seem to care 90% of Americans want privacy, less than 10% believe they can get it 91 percent had not made any changes to their internet or cell phone use to avoid having their activities tracked or noticed www.geekwire.com/
  • 5.
  • 6. 57%
  • 7. You’d Need 76 Work Days to Read All Your Privacy Policies Each Year
  • 8. Types of Identity Theft Malware Bots Malicious Software Viruses Worms Trojan Horses Spyware Rootkits Keystroke logging Hackers Dumpster Diving Stolen Wallet Change of address Mail Theft Shoulder surfing ATM skimmers /Handheld skimmers Overlays Data Breaches
  • 9. 50%
  • 11.  In the U.S. there are about 50,000 sources of data for reaching individuals  a total of about 70 billion records  about 200 records per individual The next highest you'll find worldwide is only about six or seven per person, and that's the U.K. and Japan
  • 12. According to Gartner, 26 billion connected devices will populate the world by 2020
  • 13.
  • 14. Dark Web The Dark Web is one place where stolen information is offered for sale. Accessible through the Tor network, the underground comprises of stores and websites entrenched in illegal activities ranging from the sale of data to hacking tools to drugs and weaponry. • A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses, security researchers say. • And in October 2013, federal prosecutors said an identity theft service in Vietnam managed to obtain as many as 200 million personal records, including Social Security numbers, credit card data and bank account information from Court Ventures, a company now owned by the data brokerage firm Experian.
  • 15. The price for a simple Social Security number has fallen to as little as $1. The price for a medical identity in the US is $20. One US credit card with a date of birth and Social Security number: $25 According to BlackOps Partners, a firm providing counterintelligence and trade secret protection, corporate espionage costs US companies $500 billion every year. © 2014, Forrester Research, Inc.
  • 16. Direct And Hidden Costs Of A Data Breach Source: Forrester Research, Inc. ✔ ✔ ✔
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. What’s it Cost The average cost of a computer breach at large companies in the U.S. was $6.5 million. The average cost per lost or stolen record in the United States was $217 Ponemon Institute
  • 24.
  • 25.
  • 26. Highest Global Fraud Nations  35% - Indonesia (all Transactions)  33% - Venezuela  25% - South Africa  11% - Brazil  10% - Romania Forter
  • 27.
  • 28. On a Personal note: When (not if) your identity is stolen ①Place an Initial Fraud Alert ②Order your Credit Reports ③Create an Identity Theft Report ④Change Your Passwords https://www.consumer.ftc.gov/articles/pdf-0009-taking-charge.pdf
  • 29.
  • 30. Self-governance has been effective in forestalling privacy judgments. Will it continue to hold the line against class- action lawyers, privacy activists, and rampaging technology?
  • 31.  Telemarketing Sales Rule  FTC’s Privacy Report: Balancing Privacy and Innovation  The Do Not Track Option: Giving Consumers a choice  Making Sure Companies Keep Their Privacy Promises to Consumers  Protecting Consumers’ Financial Privacy  The Children’s Online Privacy Protection Act (COPPA): What Parents Should Know Protecting Consumer Privacy No comprehensive national privacy laws exist outside ones like COPPA for child privacy rights, HIPAA for health information, and FRCA for financial data.
  • 32. Will the New Consumer Privacy Bill Protect You? Bob Sullivan / Credit.com May 1, 2015 A proposed law would beef up your rights when your data is leaked or stolen. Leahy has repeatedly proposed legislation since 2005 that would establish a nationwide notification standard called the Personal Data Privacy and Security Act; it has not passed.
  • 34. I think that right now is a dangerous time to be a direct marketer,” says Jay Edelson. He should know. The Chicago-based attorney makes his living filing class- action suits against companies that skirt privacy laws. Stu Ingis of the Venable law firm in Washington, DC— ranked by several legal guides as one of the top privacy attorneys in the United States—brands lawyers like Edelson as bottom-feeders able to convince courts to see things in laws that are not there.
  • 35. Get Compliant or…  Massive AT&T Consumer Privacy Violation Results in $25 M FCC Penalty (2015)  $10 M Fine Proposed Against TerraCom and YourTel for Privacy Breaches (2014)  For Do Not Call violations, Sprint will pay FCC $7.5 M (2014)  Verizon Fined $7.4 M by FCC For Customer Privacy Violations (2014)
  • 36. Groups or individuals with expertise in the area of security or privacy are invited to register their interest at iot@truste.com
  • 37.
  • 38. Takeaways There is a business opportunity here Consumers believe business and the government is not doing enough to protect their privacy Consumers are not willing to change their current habits Stealing customer information is very profitable Be aware of the laws and penalties Businesses need help once a breach has been identified No dominant player

Hinweis der Redaktion

  1. At least 70 lawsuits were brought against Target within two months of notification.20 By March 2014, this figure grew to more than 90 lawsuits.21 Common reasons cited for damages include actual loss from identity theft, emotional distress, cost of preventing future losses, and the increased risk of future harm