Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Do Your Privacy Practices Line Up With Your Privacy Expectations?

Do Your Privacy Practices Line Up With Your Privacy Expectations?

How concerned are you about your data privacy, as a consumer, particularly when you entrust it to another business? If you answered “very”, you aren’t alone… 87 percent of Americans consider their data privacy to be a human right. Having said that, most don’t pay near enough attention to their own security precautions. Let’s take a few moments and examine this trend.

How Consumers View Business Data Practices

A recently released report presented the results of a survey of American consumers to chart their attitudes and expectations regarding corporations and their data privacy. This report—which was compiled by advisory firm KPMG and is available for download on their website—outlined the primary privacy concerns of the everyday user and discusses the statistics around the issue.

Overall, the results showed varying levels of awareness amongst these users and made a few shared concerns very clear. For instance:

  • 86 percent of respondents to the survey felt that their data privacy was a rising concern.
  • 70 percent claimed to be “generally familiar” with how companies collect their personal data, while 64 percent were familiar with how it was used and stored, 63 percent say they understand how it is protected, and 57 percent say they know how it is sold.
  • Having said that, 68 percent don’t trust these companies to sell this data ethically, 54 percent don’t trust it will be used ethically, 53 percent don’t feel it will be collected ethically, and 50 percent don’t trust these companies to protect their data sufficiently.
  • Most consumers are concerned about the theft of their social security number, with 83 percent of respondents identifying this concern. Following closely behind come the 69 percent worried about their credit card numbers.
  • Surprisingly, only 16 percent are concerned about the theft of their medical records.

How Consumers Treat Their Own Data Practices

Now, while this sounds promising (if not quite at optimal numbers), this concern isn’t reflected in consumers when their own actions are considered. While many—in fact, the majority—of users stated that they would consider it risky to engage in many online behaviors, like repeating passwords across accounts, using public Wi-Fi, and saving a credit card to a website, over 40 percent did these things regardless.

This study also took note of the fact that many users neglected their own security options… 61 percent, in fact.

What This Should Tell Us, as People and Business Owners

Whether you’re considering your own personal data, or you’re thinking about the data you’ve collected as you’ve done business, security needs to be your highest priority. Harvard Business Review Analytic Services conducted a study of their own, and the results were quite telling.

46 percent, essentially half of surveyed consumers, said that they had stopped doing business with a retailer due to discomfort with their privacy statement.

That’s huge. As a consumer, it only shows how much power can potentially be wielded to help improve security for everybody… and how much responsibility that power gives us. As a business, it’s a wakeup call to how important securing data really is. While comprehensive data and information security isn’t a simple process and will ultimately make some of your internal processes more time-consuming, it is better than alienating half of your market.

Fortunately, 415 IT can help make the adoption of improved security solutions and procedures far simpler. To learn more about what we have to offer to help ensure your data security, give us a call at (415) 295-4898 today.

Technology Making it Possible to Go Back to School...
Business Analytics 101
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 21 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Data Backup IT Support Network Security Privacy Hosted Solutions Cloud IT Services Data Recovery Efficiency Internet Email Software Business Managed IT Services Malware Outsourced IT Innovation Small Business Hackers Tech Term Business Management Cybersecurity Collaboration Google Cloud Computing Hardware Upgrade Phishing User Tips Computer Business Continuity Windows 10 Microsoft Smartphone Mobile Devices Managed Service Workplace Tips Mobile Device VoIp Communication Quick Tips Android Managed Service Provider Disaster Recovery Paperless Office Ransomware Backup Communications Smartphones Encryption Covid-19 Saving Money Remote Work Office 365 Business Technology Data Management Server Browser Remote Monitoring Network BDR Managed IT Social Media Holiday Artificial Intelligence Vulnerability Healthcare Wi-Fi Internet of Things Document Management Passwords Windows 7 Compliance Users Facebook Help Desk Chrome Miscellaneous Save Money Laptops Government Managed IT services Applications Blockchain Microsoft Office Data Security Processor Project Management Analytics Office Two-factor Authentication Redundancy Bandwidth Scam Tip of the week Automation Vendor Management Avoiding Downtime Information Virtualization Antivirus Health Employer-Employee Relationship Router Storage Meetings Machine Learning Data Loss Maintenance Website VPN Employee-Employer Relationship Mobility Company Culture Training BYOD OneDrive Apps Regulations Gadgets IoT IT Management Files Access Control Virtual Private Network RMM Customer Relationship Management Mobile Office Infrastructure Hard Drive Software as a Service Windows Proactive Co-Managed IT Tablet Monitoring Word Patch Management Data Breach Bring Your Own Device Dark Web Augmented Reality HIPAA Utility Computing Remote Worker Internet Exlporer Smart Technology Financial Time Management Remote Monitoring and Management Computing Operating System File Management Payment Cards Alert Electronic Health Records Unified Threat Management Employees Consulting Downtime Instant Messaging Recycling Mobile Security Flexibility Information Technology Data Storage Unified Communications Managed Services Provider Professional Services Server Management Networking Managed Services Social Network Remote Workers Search Gmail The Internet of Things Assessment Cooperation Risk Management Management File Sharing Money Network Management Net Neutrality Consultation Password Computing Infrastructure Mail Merge User Error Electronic Medical Records Geography Outsource IT Microsoft Excel Superfish Cache CIO applications OneNote Social Networking Permission Employer/Employee Relationships Apple Outsourcing Windows Server Touchscreen Hacking Remote Sensors IT Downloads Features Screen Reader Database Peripheral Google Calendar Fraud Identity Authorization Hard Disk Drives Optimization Alerts Address WiFi Modem Notes High-Speed Internet Heating/Cooling Laptop Remote Computing Politics How To Test G Suite Proactive Maintenance Solid State Drive Video Conferencing Virtual Reality Tech Support Private Cloud User Management Trending Banking Travel Solid State Drives Business Telephone Firewall Smart Tech Procurement Voice over Internet Protocol Projects Statistics PCI DSS Techology WPA3 Mobile Virtual Machines Comparison Licensing PowerPoint Development Display Servers Remote Working Value of Managed Services Technology Tips Technology Laws Motherboard Chromebook Cybercrime Cyber security Biometric Data Warehousing IT Technicians Bookmarks Cost Management ROI Teamwork Zero-Day Threat Options Telephone Recovery IT Assessment Distributed Denial of Service Emergency Multi-Factor Security Cyberattacks Connectivity Social Return on Investment Bluetooth Legislation Outlook Disaster Resistance Fleet Tracking Credit Cards Specifications Printer Cookies Mobile Device Management Cables Budget Migration Customer Service eWaste Digital Payment Hotspot Unified Threat Management Wireless Vulnerabilities Database Management Gamification Operations Favorites Shared resources Going Green Asset Tracking Backup and Disaster Recovery Managing Stress 5G Mobile VoIP Digitize Managed IT Service Read Only Security Cameras Settings Personal Information CRM Shortcut Proactive IT Computers Black Friday Point of Sale Nanotechnology Tech Terms Virtual Assistant Wires Bitcoin Websites MSP Chatbots Finance Manufacturing Vendor Windows Server 2008 Mouse Language Mobile Computing GDPR Lenovo Mirgation Conferencing Batteries IT Consulting Spam Human Error Enterprise Content Management Wireless Internet Big Data Shadow IT Break Fix Samsung Wearable Technology Star Wars Printing Transportation Active Directory Content Filtering Holidays Cyber Monday Staff SharePoint E-Commerce App Theft Wasting Time Current Events SaaS Permissions Identity Theft Authentication Enterprise Resource Planning Smart Devices Education CEO Students Regulation Daniel Stevens Marketing Twitter Printers

Latest Blog

Did you know that, as of July 2020, 69 percent of global desktop Internet users utilized Google Chrome as their browser of choice? With such a large market share, the security associated with Google Chrome is important to keep in mind. To help increase some of this awareness...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...