Sunteți pe pagina 1din 10

This article appears in

the February 2010 issue of

The journal of
high-performance business

Information Technology

 ow secure is
H
your confidential data?
By Alastair MacWillson

 company’s approach to data protection and privacy should be


A
more than legally compliant. It must be a core part of both the
organization’s business value proposition and its culture, as well
as global in scope. Here’s how it’s done.
Data protection has quietly passed few years have shown, reputations
a tipping point. Although some and businesses can be ruined by
leading organizations—especially inadvertent disclosures of custom-
in Europe and North America—have er or other confidential data.
made significant strides in securing
sensitive data, many other enter- As the volume of data businesses
prises are slowly awakening to the collect, store and analyze increases
reality that they are lagging in their exponentially, many executive
data protection efforts. teams find themselves in a precari-
ous position: They can no longer
Confidential data—including custom- assure customers that their personal
er information, business plans and information is safe from misuse.
financials—has become one of every
organization’s most important assets. “No matter how good a company is
Yet technology advancements, new [at protecting data], there’s always a
business models and increasingly possibility that information will leak
sophisticated and globally intercon- out,” says Larry Ponemon, chairman
nected business processes have out- and founder of the Ponemon Insti-
paced not only regulations designed tute, a US privacy and information
to ensure the privacy and protection security research group. “Companies
of personal and other data but also can never say the data they collect
many organizations’ own ability to about you is perfectly secure. But
effectively secure sensitive business they can be good at managing or
information. mitigating the risk.”

The resulting shortcomings, in Intentions versus reality


critical areas ranging from em- Given the importance of the issue,
ployee training to technology Accenture set out to study the cur-
infrastructure, have made orga- rent state of corporate data protection
nizations in both the private and and privacy. In two separate global
public sectors extremely vulner- surveys, we polled 5,500 business
able to security breaches and the leaders and more than 15,000 adult
misuse of sensitive data, even as consumers in 19 countries. Our
awareness of data privacy and pro- objective was to understand how
tection issues has increased among perceptions about data protection and
business leaders, regulators and privacy—from both business leaders
consumers. And there’s more at and individuals—inform and influ-
stake for these organizations than ence data protection practices. Our
regulatory fines; as several high- research revealed important findings
profile data breaches over the past in five key areas.

1. Trust
There is a notable difference between organizations’ intentions regarding
data privacy and how they actually protect it. This discrepancy creates
an uneven trust landscape, which makes it particularly difficult for those
doing business to trust that their data is being used by their counterparties
in accordance with their expectations.

Although approximately 70 percent able steps to secure consumers’


of business respondents in our personal information, there were
2
Outlook 2010
survey agreed that organizations several inconsistencies in their
Number 1 have an obligation to take reason- stated obligations about doing so.
For example, 45 percent of the with inadequate privacy laws, and
business respondents were unsure prevent cyber crimes against con-
about or actively disagreed with sumers and data loss or theft.
granting customers the right to
control the type of information There are several possible expla-
that is collected about them, while nations for this inconsistency,
47 percent were unsure about or including industry differences
disagreed with customers having a in the approach to data protection,
right to control how this informa- cultural or regional differences,
tion is used. Nearly half did not the lack of organizational account-
believe it was important to limit the ability for security policy, and the
collection and sharing of sensitive fact that some companies focus
personal customer information, on meeting compliance targets
protect consumer privacy rights, rather than on orchestrating a
prevent cross-border transfers of comprehensive data protection and
personal information to countries privacy program.

2. Accountability
A majority of companies have lost sensitive personal information,
the biggest causes of which are internal errors and other things the
company could potentially control. This suggests that accountability
for and ownership of sensitive data are not being properly addressed
in many organizations.

Fifty-eight percent of business In one case, a mobile phone opera-


respondents said their company tor lost a disk containing data on
had lost sensitive personal infor- 17 million customers; in another,
mation, and nearly 60 percent of a European government’s national
those who’d had a breach said that tax office mistakenly sent out CDs
data loss is a recurring problem. containing confidential information
Thirty-one percent of those busi- about nearly 4 million people to
nesses said they’d had three or the country’s newspapers, radio
more instances of data loss in the stations and television stations.
previous 24 months.
There are several contributing
Among these companies, the biggest factors to these internal vulner-
causes of data loss are internal— abilities, none of them outwardly
problems presumably well within malicious but all of them troubling.
their ability to detect and correct. They include insufficient training,
Business or system failure (57 per- inadequate controls and incomplete
cent) or employee negligence or errors mapping of internal data flows (see
(48 percent) were cited most often sidebar, page 5).
as the source of the breaches; cyber
crime was cited as a cause of only Ongoing innovation in areas such as
18 percent of the security breaches. data storage and mobility are com-
pounding the challenge. Portable
These findings belie common devices are getting smaller, can hold
assumptions that external forces more data, and can seamlessly con-
are the biggest threats to privacy nect to servers, networks and other
and security. But they are con- portable devices, literally putting
3
Outlook 2010
sistent with reports of major more power—and more data—into the
Number 1 breaches caused by employee error. hands of individual users.
“People expect absolute, almost many will try to avoid the delay.
immediate access to anything they The right data protection pro-
want at any time,” says privacy cesses, controls and technologies
expert Ponemon. “That requires can help prevent this situation in
security to be nearly invisible. the first place, providing effective
Anytime that security requires you security that enables business pro-
to wait is unacceptable to people; ductivity, rather than hampers it.”

3. Regulatory compliance
Many organizations believe complying with existing regulations is sufficient
to protect their data. However, such a mindset is dangerous given the fact
that regulations generally are not sophisticated enough for today’s business
environment. What’s more, the regulations are not consistently or equally
applied across industries and countries.

Although nearly 70 percent of nearly half of these companies have


respondents said they regularly had two or more such incidents.
monitor privacy and data protection
regulatory compliance requirements, These findings indicate that simply
data breaches have nonetheless complying with existing regulations
occurred in 58 percent of organiza- and laws is not enough to fully protect
tions polled. sensitive data. The current spectrum
of regulations clearly cannot account
Even more intriguing—or worrying— for all possible problems that could
is the fact that more than two-thirds emerge given the rapidly increasing
of businesses in Europe, where pri- volume of data that organizations
vacy regulations are most stringent, collect and the complexity inherent
admitted that they’d had a data breach in how such data is accessed and used
incident in the past 24 months, and by organizations.

4. Third parties
Companies should be careful about the company they keep. It is crucial
they understand the perspective on and approach to data protection and
privacy taken by their third-party partners.

Fifty-five percent of the companies own data protection and privacy


in our survey outsource the collec- program to ensure that it meets or—
tion and/or processing of personal better yet—exceeds their own efforts
information about customers. Because but also of its knowledge of and ex-
safeguarding client information is one perience with managing data within
of every company’s most fundamental and across national boundaries.
and important responsibilities, it is
essential to scrupulously maintain the For their part, outsourcing provid-
trust that forms the cornerstone of ers must operate a comprehensive
relationships between companies and global client data protection program
their outsourcing providers. that provides a standardized, con-
sistent approach to protecting their
4
Outlook 2010
Companies must conduct a thorough
Number 1 assessment not only of the provider’s (Continued on page 6)
Does your company have a data security problem?
Before you answer, consider this: Despite the popular perception that breaches in data
security usually have external causes, the most common culprits are internal, often the
result of business or system failure or employee negligence. Among them:

• Insufficient training programs. Internal education is crucial to set common


standards and practices employees can use to deal with sensitive data. Yet only 56
percent of companies surveyed said it was important or very important to even
have policies about privacy practices.

• Inadequate controls. Often, employees simply have too much access to sensitive
data. For instance, nearly half of the companies in our survey said limiting the
collection and sharing of sensitive personal information was not important, some-
times important or irrelevant. Most telling, just 19 percent of businesses said it
is never acceptable to sell personal information for profit.

• Incomplete mapping of data flow across the organization. As the amount of


sensitive data collected grows exponentially, it is often difficult to track all the
areas in which such data is generated, collected, stored and used. Nearly 30
percent of the companies in our surveys said they either did not know or were
unsure of where personal information about customers and employees resides
within the organization’s IT enterprise.

• Insufficient technology intervention. Human error is inevitable. Yet organizations


are not doing enough to implement technical tools that prevent employees from
taking an action that will compromise an organization’s data security.

Security breaches
Internal issues—rather than cyber crime or malicious intent—
are the most frequent causes of security breaches.

System or technical glitches 35%

Negligent or incompetent employees 24

Business process failures 22

Cyber crime 18

Malicious employees 13

Negligent or incompetent
11
temporary employees or contractors

Source: Accenture analysis

5
Outlook 2010
Number 1
Gone missing
More than half of the 5,500 company executives surveyed
report that their company had lost sensitive information.

Did your organization ever lose sensitive


personal information?

Yes
11
No
Can’t recall

31

58%

Source: Accenture analysis

(Continued from page 4) in case of a breach, enforcement


and discipline for inappropriate
clients’ data. This program should actions, and strong preventive
cover all critical elements of data measures to stop breaches. It must
protection and privacy, including understand and comply with both
employee training, regular moni- industry regulations and data
toring and auditing, oversight, privacy laws in the countries in
appropriate and timely responses which it and its client operates.

5. Culture
Companies that exhibit a “culture of caring” with respect to data protection
and privacy are far less likely to experience security breaches.

The 31 percent of business respon- In general, our analysis indicates


dents who said their company had that those companies with no
not experienced even one security breaches seem to exhibit an overall
breach in the past two years dem- “culture of caring” with regard to
onstrated some substantial differ- sensitive data and a conviction that
ences from the companies that did they are not owners of such data
lose data, in terms of their attitudes but, rather, stewards whose respon-
and policies regarding data privacy sibility is to protect and safeguard
and protection, as well as in what that data. These companies tend to
6
Outlook 2010
they considered acceptable uses of believe that consumers have sub-
Number 1 personal data. stantial rights to manage, correct
Consumer protection
More than half of the 15,000 adult consumers surveyed believe that customers
have a right to control the information companies collect about them.

Consumers have a right to control information


collected about them and their family.

Strongly agree
9
Agree
23 Unsure

17
Disagree
Strongly disagree

18

34%

Source: Accenture analysis

and control information collected nizations to more effectively protect


about them and to understand how data across the enterprise.
such information is being used.
It is clear that organizations today
Additionally, the “no breach” group have an urgent need to take a more
was more likely to feel a stronger ob- proactive approach to data protection
ligation to maintain data protection and privacy, not only to minimize the
and privacy—for instance, by taking risk of major fines for non-compliance
reasonable steps to secure consum- but also to avoid breaches of sensitive
ers’ personal information, control personal data that can alienate cus-
who has access to such information, tomers and destroy brand credibility.
disclose to consumers how their
personal information is used, and A global standard
help consumers if the enterprise loses Government and corporate leaders
their personal information. should work together to create a
global standard that is based on a
In addition, companies with no thorough understanding of the data
breaches tend to have policies that privacy and protection ecosystem
value the protection of sensitive and that assigns accountability ap-
data and how such data is used. For propriately across key stakeholders:
instance, no-breach companies are organizations, individuals and regu-
more likely than companies that lators. The standard should provide
have had breaches to know where prescriptive guidance on what data
personal information on customers must be protected, who should be
and employees resides within the provided access to the sensitive data
organization’s IT enterprise (75 under what circumstances, and how
7
Outlook 2010
percent versus 66 percent). This to protect the data based on sensi-
Number 1 understanding enables these orga- tivity and classification levels.
At an individual organization level, that the necessary level of protection
enterprises should create a “culture is being provided. Because today’s
of caring” with regard to data pro- computer incident-response technolo-
tection and privacy. Companies have gies often do not generate adequate
shown that this approach is not just insights from prior breaches—thus
good for compliance; it’s good for impairing proactive risk manage-
business. “We’ve seen organizations ment—companies should reevaluate
that have made privacy and data their installed base of such tools and
protection a strategic initiative,” consider enhancing or replacing them.
says Ponemon. “They view privacy Importantly, because technology
as a way to engage consumers and alone does not prevent potential infor-
increase their reputation and brand mation loss, it must work in concert
in the marketplace.” with a data governance framework
and standards.
There are six tangible steps com-
panies can take to begin creating 4. Build a consistent level of
such a culture. awareness of the importance of
data protection and privacy among
1. Assign ownership of and the workforce. It is increasingly
accountability for data protection important for organizations to cre-
and privacy. Diffusing responsibility ate more comprehensive and robust
for data protection and privacy across workforce education and training
multiple functions contributes to an programs that give all employees a
environment conducive to failures consistent and common understand-
and breaches. Organizations that want ing of the organization’s established
to become good stewards of sensitive data protection and privacy policies
data should bring the people or func- and procedures and specific guidance
tions responsible for specific aspects on how to adhere to them.
of protection and privacy—technology,
policies, procedures, regulations and 5. Reexamine data protection
laws—together to ensure that the orga- and privacy investments. Few
nization approaches these issues in a organizations have a true enterprise
comprehensive and coordinated way. view of their security investments.
This not only prevents them from
In some cases, it may make sense understanding the “true cost”
to establish a data protection and of security, but it also keeps them
privacy council, comprising stake- from being able to reallocate in-
holders from across the business, to vestments as necessary to areas of
oversee how sensitive data is man- high priority. An organization should
aged and used and to ensure contin- have a balanced investment in data
uous improvement of the enterprise’s protection and privacy, considering
security posture. all key aspects of the issue: people,
process and technology.
2. Develop a more effective and
comprehensive governance program 6. Choose business partners
for data privacy and protection. A with care. Partner with companies
robust and comprehensive data pro- that take equal or greater care
tection and privacy governance pro- with data. Rigorously assess their
gram can help an organization clearly knowledge, practices and experi-
delineate how data is collected, stored, ence in managing sensitive data
managed and used, as well as who is across organizational and national
allowed to access and use which data. boundaries in accordance with local
privacy laws and industry regula-
8
Outlook 2010
3. Evaluate current data protection tions. Remember: You are judged by
Number 1 and privacy technologies to confirm the company you keep.
Tallying the true cost of security breaches
In the United States alone, more than 339 million records containing sensitive personal
information have been involved in security breaches since January 2005. Such
breaches can have serious implications.

Erosion of shareholder value. Research has found that a stock price typically
drops by approximately 5 percent after a breach of confidential information is
made public. A separate study showed that companies announcing an Internet
security breach lost approximately 2.1 percent of their market value in the two
days following the announcement of the events—an average loss of $1.65 billion
in market capitalization per incident.

Loss of trust. The Ponemon Institute, a US privacy and information security research
firm, estimates that approximately 3.6 percent of a company’s customers stop doing
business with the company after a security breach. The churn rate is even higher in
certain industries, including health care and financial services.

Organizations are becoming more reliant than ever on data to run their busi-
ness. But as the amount of data grows, policies and approaches for ensuring
the safety and confidentiality of that information are falling behind. Compa-
nies need a more comprehensive approach to data privacy and protection, one
that closes the gaps between business strategy, risk management, compliance
reporting and IT security.

A company’s approach to data protection and privacy should be more than


legally compliant—it should be a core part of both the organization’s business
value proposition and its culture. It should also be global in scope. All
employees must understand this “culture of caring” and that they are
accountable for safeguarding information. And as organizations innovate
around new business models and technology to gain or maintain competitive
edge, they must be equally aggressive in innovating around the data security
issues that these advancements introduce.

9
Outlook 2010
Number 1
About the author

Alastair MacWillson is the global managing director of Accenture’s Security group


and works with clients worldwide on issues relating to enterprise security, data and
information security, cyber security, risk management and privacy. He has 18 years
of experience in security and technology consulting and has advised major companies
and governments worldwide on strategy, standards practices and technology. Dr.
MacWillson, who has written many articles and papers on security, is a regular
presenter on security and risk at major industry conferences. Prior to moving into
consulting, Dr. MacWillson spent 16 years with the UK Foreign Service and enjoyed
postings in the Middle East, Moscow and Washington, DC. He is based in London.

alastair.macwillson@accenture.com

Outlook is published by Accenture.


© 2010 Accenture.
All rights reserved.

The views and opinions in this article


should not be viewed as professional
advice with respect to your business.

Accenture, its logo, and


High Performance Delivered
are trademarks of Accenture.

The use herein of trademarks that may


be owned by others is not an assertion
of ownership of such trademarks by
Accenture nor intended to imply an
association between Accenture and the
lawful owners of such trademarks.

For more information about Accenture,


please visit www.accenture.com

10
Outlook 2010
Number 1

S-ar putea să vă placă și