SlideShare une entreprise Scribd logo
1  sur  15
Symantec State of European Data Privacy
Symantec EMEA PR
October 2016
SYMANTEC STATE OF EUROPEAN DATA PRIVACY
2
Copyright © 2016 Symantec Corporation
CONTENTS
---------------------------------------------------------------------------------------------------------------------------------------------------------
3 Methodology
---------------------------------------------------------------------------------------------------------------------------------------------------------
4 Regulatory Awareness
---------------------------------------------------------------------------------------------------------------------------------------------------------
7 A Consumer Disconnect
---------------------------------------------------------------------------------------------------------------------------------------------------------
10 Cultural preparedness
---------------------------------------------------------------------------------------------------------------------------------------------------------
13 Technical readiness & The Right to Be Forgotten
---------------------------------------------------------------------------------------------------------------------------------------------------------
METHODOLOGY
• Symantec commissioned independent research firm, Vanson Bourne, to interview 900 business
decision-makers and IT decision-makers in the UK, Germany and France during September 2016
• To qualify for the research the businesses decision makers and IT decision-makers organisations
had to have at least 50 employees
• Respondents were asked about the General Data Protection Regulation (GDPR) during interviews
conducted during September 2016
• Respondents were equally balanced between countries and were interviewed across all private
and public sectors
3
Copyright © 2014 Symantec Corporation
UK GERMANY FRANCE
300
Margin of Error =+/- 5%
margin
300
Margin of Error =+/- 5%
margin
300
Margin of Error =+/- 5%
margin
Copyright © 2016 Symantec Corporation
Regulatory Awareness
BUSINESSES ARE NOT ONLY UNDERPREPARED FOR THE
GDPR – THEY ARE UNDERPREPARING.
Copyright © 2014 Symantec Corporation
57%
53%
48%
43%
42%
42%
33%
28%
24%
2%
0%
Regulations applying to all EU member states
Gaining consent for data collection
Reporting data breaches
The requirement of a Data Protection Officer (DPO)
Protecting data in an ethical way
Providing information on retention time for personal
data
Using data in an ethical way
The right to be forgotten for citizens
The ability for individuals to easily transfer their data
files from one service provider to another
None of the above
*Other (please specify)
Elements respondents believe to be part of the GDPR
Have concerns about ability to
become compliant
9 in 10
Do not fully understand GDPR
96%
Believe their organization is fully
prepared for GDPR
26%
Consider compliance at top priority
in the next two years
22%
Copyright © 2016 Symantec Corporation
STARK LACK OF CONFIDENCE IN MEETING MAY 2018
DEADLINE REVEALED
Copyright © 2014 Symantec Corporation
6
21%
48%
20%
3%
7%
Confidence of compliance by May 2018
Yes, we are already compliant
Yes, we will be fully compliant by May 2018
Yes, we will be partly compliant by May 2018
No, not at all compliant
Don’t know
Believe it is even possible to
become fully compliant with the
GDPR
1 in 5
Said their organisation will not be
compliant at all, or only partly
compliant, by 2018
23%
Believe that while some company
departments will be able to comply
- others will not
49%
Copyright © 2016 Symantec Corporation
A Consumer Disconnect
ACCORDING TO BUSINESSES, CONSUMERS DON’T
CONSIDER DATA SECURITY & PRIVACY A TOP PRIORITY…
Copyright © 2014 Symantec Corporation
8
73%
60%
56%
29%
26%
23%
16%
13%
27%
40%
44%
71%
74%
77%
84%
87%
Quality of products
Good customer service
Cost of products
Track record of data security
Track record of data privacy
Organisation's ethical stance
The innovativeness of the organisation
Whether they have an existing relationship
Business perception of consumer priorities
Top three priority Not a top three priority
Admit customers ask about data
security during transactions
36%
Do not think an organisation’s
privacy track record is a top three
consideration for customers
74%
Do not believe their organisation
takes an ethical approach to
securing and protecting data
35%
Copyright © 2016 Symantec Corporation
Copyright © 2014 Symantec Corporation
9
Of respondents are not confident they
completely meet customers’ data
security expectations
55%
88% 86%
82%
69%
56%
47%
Symantec State of Privacy: Importance of
factors when choosing a company to shop with
or use
…YET CONSUMERS RANK IT #1, SHOWING BUSINESSES
ARE OUT OF TOUCH
Do not believe their organisation
takes an ethical approach to
securing and protecting data.
45%
Copyright © 2016 Symantec Corporation
Cultural preparedness
BUSINESSES ARE UNDERESTIMATING THE CULTURAL
CHANGES THEY NEED TO MAKE AHEAD OF MAY 2018
Copyright © 2014 Symantec Corporation
11
4%
9%
6%
7%
11%
13%
Employee personal information
Customer information (personal)
Customer information (including payment
details)
Company records
Information on competitors
Market data
Companies where all employees can access the
following information
Say all staff can access customers’
payment details
6%
Say all employees can access
customers’ personal information
1 in 10
Believe everyone in the
organisation has a responsibility to
ensure data is protected
14%
Copyright © 2016 Symantec Corporation
PARTICUARLY GIVEN THE WIDE REACHING ACCESS
EMPLOYEES HAVE TO PERSONAL INFORMATION
Copyright © 2014 Symantec Corporation
12
47%
42%
12%
39% 48%
13%
Yes, it is a top priority Yes, it is a priority No, it is not a priority
Respondents that believe managing and
using data in an ethical way is a priority
for their organisation
Managing data in an ethical way Using data in an ethical way
Said they would be increasing
security training
45%
Said managing data ethically is a
top priority for their organisation
47%
Are planning to completely
overhaul their approach to security
in response to the GDPR
27%
Copyright © 2016 Symantec Corporation
Technical readiness & The
Right to Be Forgotten
BUSINESSES ARE CONCERNED ABOUT THE COMPLEXITY
OF PROCESSING DATA CORRECTLY
Copyright © 2014 Symantec Corporation
14
Believe customers would exercise
their right for data to be deleted
81%
Say deleting customer data will be
a challenge
9 in 10
Have already received requests to
be forgotten
1 in 10
Currently do not have a system in
place to forget a customer
60%
45%
42%
34%
33% 32%
25%
0%
7%
3%
Challenges organisations face if customers ask to
have their data modified or deleted
Copyright © 2016 Symantec Corporation
Thank you!
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Copyright © 2014 Symantec Corporation
15
Copyright © 2016 Symantec Corporation
Copyright © 2016 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for the informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express
or implied, are disclaimed to the maximum extent allowed by law. The information is this document is subject to change without notice.

Contenu connexe

En vedette

The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Enhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseEnhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseSymantec
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...Eric Wu
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldElastica Inc.
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxElastica Inc.
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365Symantec
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google AppsElastica Inc.
 
By the Power of Metrics - Lean Kanban North America 2015
By the Power of Metrics - Lean Kanban North America 2015By the Power of Metrics - Lean Kanban North America 2015
By the Power of Metrics - Lean Kanban North America 2015Wolfgang Wiedenroth
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365Elastica Inc.
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionBlue Coat
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"AWS Chicago
 

En vedette (18)

The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Enhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseEnhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open Enterprise
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
By the Power of Metrics - Lean Kanban North America 2015
By the Power of Metrics - Lean Kanban North America 2015By the Power of Metrics - Lean Kanban North America 2015
By the Power of Metrics - Lean Kanban North America 2015
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"
 
Learning in a Multi-device World
Learning in a Multi-device World Learning in a Multi-device World
Learning in a Multi-device World
 

Similaire à Symantec - State of European Data Privacy

Symantec investor presentation march 2016
Symantec investor presentation march 2016Symantec investor presentation march 2016
Symantec investor presentation march 2016InvestorSymantec
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016 Symantec investor presentation march 2016
Symantec investor presentation march 2016 InvestorSymantec
 
Symantec investor presentation february 2016 final
Symantec investor presentation february 2016 finalSymantec investor presentation february 2016 final
Symantec investor presentation february 2016 finalInvestorSymantec
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation surveyBrunswick Group
 
Customer Experience in Insurance: Insurer Strategies, Plans and Progress
Customer Experience in Insurance: Insurer Strategies, Plans and ProgressCustomer Experience in Insurance: Insurer Strategies, Plans and Progress
Customer Experience in Insurance: Insurer Strategies, Plans and ProgresseSignLive by VASCO
 
Supplier Risk: What You Don’t See Can Hurt You
Supplier Risk: What You Don’t See Can Hurt YouSupplier Risk: What You Don’t See Can Hurt You
Supplier Risk: What You Don’t See Can Hurt YouSAP Ariba
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALWayne Anderson
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today Ghostery, Inc.
 
Sap presentation unleash the power of big data with the sap hana platform
Sap presentation   unleash the power of big data with the sap hana platformSap presentation   unleash the power of big data with the sap hana platform
Sap presentation unleash the power of big data with the sap hana platformDr. Wilfred Lin (Ph.D.)
 
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessPre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessCA Technologies
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and GovernanceSAP Analytics
 
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...Mark Fenna
 
The FinTech Moment
The FinTech MomentThe FinTech Moment
The FinTech Momentgurugaonkar
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataKayla Catron
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataBluelock
 
Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2Baraa Arksousi
 
Strategic Sourcing in the Digital Economy
Strategic Sourcing in the Digital EconomyStrategic Sourcing in the Digital Economy
Strategic Sourcing in the Digital EconomySAP Ariba
 
Big Data Industry Insights 2015
Big Data Industry Insights 2015 Big Data Industry Insights 2015
Big Data Industry Insights 2015 Den Reymer
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013InvestorSymantec
 
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?Executive Leaders Network
 

Similaire à Symantec - State of European Data Privacy (20)

Symantec investor presentation march 2016
Symantec investor presentation march 2016Symantec investor presentation march 2016
Symantec investor presentation march 2016
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016 Symantec investor presentation march 2016
Symantec investor presentation march 2016
 
Symantec investor presentation february 2016 final
Symantec investor presentation february 2016 finalSymantec investor presentation february 2016 final
Symantec investor presentation february 2016 final
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation survey
 
Customer Experience in Insurance: Insurer Strategies, Plans and Progress
Customer Experience in Insurance: Insurer Strategies, Plans and ProgressCustomer Experience in Insurance: Insurer Strategies, Plans and Progress
Customer Experience in Insurance: Insurer Strategies, Plans and Progress
 
Supplier Risk: What You Don’t See Can Hurt You
Supplier Risk: What You Don’t See Can Hurt YouSupplier Risk: What You Don’t See Can Hurt You
Supplier Risk: What You Don’t See Can Hurt You
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today
 
Sap presentation unleash the power of big data with the sap hana platform
Sap presentation   unleash the power of big data with the sap hana platformSap presentation   unleash the power of big data with the sap hana platform
Sap presentation unleash the power of big data with the sap hana platform
 
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessPre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
 
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...
eGain Digital Day 2016 - Keynote 1: Digital Customer Experience—Big Trends an...
 
The FinTech Moment
The FinTech MomentThe FinTech Moment
The FinTech Moment
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2
 
Strategic Sourcing in the Digital Economy
Strategic Sourcing in the Digital EconomyStrategic Sourcing in the Digital Economy
Strategic Sourcing in the Digital Economy
 
Big Data Industry Insights 2015
Big Data Industry Insights 2015 Big Data Industry Insights 2015
Big Data Industry Insights 2015
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013
 
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
 

Plus de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Plus de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Dernier

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Dernier (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Symantec - State of European Data Privacy

  • 1. Symantec State of European Data Privacy Symantec EMEA PR October 2016
  • 2. SYMANTEC STATE OF EUROPEAN DATA PRIVACY 2 Copyright © 2016 Symantec Corporation CONTENTS --------------------------------------------------------------------------------------------------------------------------------------------------------- 3 Methodology --------------------------------------------------------------------------------------------------------------------------------------------------------- 4 Regulatory Awareness --------------------------------------------------------------------------------------------------------------------------------------------------------- 7 A Consumer Disconnect --------------------------------------------------------------------------------------------------------------------------------------------------------- 10 Cultural preparedness --------------------------------------------------------------------------------------------------------------------------------------------------------- 13 Technical readiness & The Right to Be Forgotten ---------------------------------------------------------------------------------------------------------------------------------------------------------
  • 3. METHODOLOGY • Symantec commissioned independent research firm, Vanson Bourne, to interview 900 business decision-makers and IT decision-makers in the UK, Germany and France during September 2016 • To qualify for the research the businesses decision makers and IT decision-makers organisations had to have at least 50 employees • Respondents were asked about the General Data Protection Regulation (GDPR) during interviews conducted during September 2016 • Respondents were equally balanced between countries and were interviewed across all private and public sectors 3 Copyright © 2014 Symantec Corporation UK GERMANY FRANCE 300 Margin of Error =+/- 5% margin 300 Margin of Error =+/- 5% margin 300 Margin of Error =+/- 5% margin Copyright © 2016 Symantec Corporation
  • 5. BUSINESSES ARE NOT ONLY UNDERPREPARED FOR THE GDPR – THEY ARE UNDERPREPARING. Copyright © 2014 Symantec Corporation 57% 53% 48% 43% 42% 42% 33% 28% 24% 2% 0% Regulations applying to all EU member states Gaining consent for data collection Reporting data breaches The requirement of a Data Protection Officer (DPO) Protecting data in an ethical way Providing information on retention time for personal data Using data in an ethical way The right to be forgotten for citizens The ability for individuals to easily transfer their data files from one service provider to another None of the above *Other (please specify) Elements respondents believe to be part of the GDPR Have concerns about ability to become compliant 9 in 10 Do not fully understand GDPR 96% Believe their organization is fully prepared for GDPR 26% Consider compliance at top priority in the next two years 22% Copyright © 2016 Symantec Corporation
  • 6. STARK LACK OF CONFIDENCE IN MEETING MAY 2018 DEADLINE REVEALED Copyright © 2014 Symantec Corporation 6 21% 48% 20% 3% 7% Confidence of compliance by May 2018 Yes, we are already compliant Yes, we will be fully compliant by May 2018 Yes, we will be partly compliant by May 2018 No, not at all compliant Don’t know Believe it is even possible to become fully compliant with the GDPR 1 in 5 Said their organisation will not be compliant at all, or only partly compliant, by 2018 23% Believe that while some company departments will be able to comply - others will not 49% Copyright © 2016 Symantec Corporation
  • 8. ACCORDING TO BUSINESSES, CONSUMERS DON’T CONSIDER DATA SECURITY & PRIVACY A TOP PRIORITY… Copyright © 2014 Symantec Corporation 8 73% 60% 56% 29% 26% 23% 16% 13% 27% 40% 44% 71% 74% 77% 84% 87% Quality of products Good customer service Cost of products Track record of data security Track record of data privacy Organisation's ethical stance The innovativeness of the organisation Whether they have an existing relationship Business perception of consumer priorities Top three priority Not a top three priority Admit customers ask about data security during transactions 36% Do not think an organisation’s privacy track record is a top three consideration for customers 74% Do not believe their organisation takes an ethical approach to securing and protecting data 35% Copyright © 2016 Symantec Corporation
  • 9. Copyright © 2014 Symantec Corporation 9 Of respondents are not confident they completely meet customers’ data security expectations 55% 88% 86% 82% 69% 56% 47% Symantec State of Privacy: Importance of factors when choosing a company to shop with or use …YET CONSUMERS RANK IT #1, SHOWING BUSINESSES ARE OUT OF TOUCH Do not believe their organisation takes an ethical approach to securing and protecting data. 45% Copyright © 2016 Symantec Corporation
  • 11. BUSINESSES ARE UNDERESTIMATING THE CULTURAL CHANGES THEY NEED TO MAKE AHEAD OF MAY 2018 Copyright © 2014 Symantec Corporation 11 4% 9% 6% 7% 11% 13% Employee personal information Customer information (personal) Customer information (including payment details) Company records Information on competitors Market data Companies where all employees can access the following information Say all staff can access customers’ payment details 6% Say all employees can access customers’ personal information 1 in 10 Believe everyone in the organisation has a responsibility to ensure data is protected 14% Copyright © 2016 Symantec Corporation
  • 12. PARTICUARLY GIVEN THE WIDE REACHING ACCESS EMPLOYEES HAVE TO PERSONAL INFORMATION Copyright © 2014 Symantec Corporation 12 47% 42% 12% 39% 48% 13% Yes, it is a top priority Yes, it is a priority No, it is not a priority Respondents that believe managing and using data in an ethical way is a priority for their organisation Managing data in an ethical way Using data in an ethical way Said they would be increasing security training 45% Said managing data ethically is a top priority for their organisation 47% Are planning to completely overhaul their approach to security in response to the GDPR 27% Copyright © 2016 Symantec Corporation
  • 13. Technical readiness & The Right to Be Forgotten
  • 14. BUSINESSES ARE CONCERNED ABOUT THE COMPLEXITY OF PROCESSING DATA CORRECTLY Copyright © 2014 Symantec Corporation 14 Believe customers would exercise their right for data to be deleted 81% Say deleting customer data will be a challenge 9 in 10 Have already received requests to be forgotten 1 in 10 Currently do not have a system in place to forget a customer 60% 45% 42% 34% 33% 32% 25% 0% 7% 3% Challenges organisations face if customers ask to have their data modified or deleted Copyright © 2016 Symantec Corporation
  • 15. Thank you! Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Copyright © 2014 Symantec Corporation 15 Copyright © 2016 Symantec Corporation Copyright © 2016 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for the informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information is this document is subject to change without notice.

Notes de l'éditeur

  1. Demographics Overview 900 IT decision makers and business decision makers were interviewed in September 2016: - Surveyed in the UK (300), France (300) and Germany (300) - To qualify for the research, respondents' organisations had to have at least 50 employees - Respondents were interviewed across all private and public sectors
  2. 96 per cent of companies still do not fully understand the European General Data Protection Regulation - every option presented in the survey is part of the GDPR, so when businesses did not tick all answers they showed that they do not understand the GDPR fully. 96 per cent of businesses did not tick all the options Nine in Ten (91 per cent) of respondents have concerns about their ability to become compliant Only 22 per cent of businesses consider compliance a top priority in the next two years Only 26 per cent of respondents believing their organisation is fully prepared for the GDPR
  3. There is a stark lack of confidence in meeting the May 2018 deadline which leaves businesses at risk of incurring significant fines Nearly a quarter (23 per cent) said their organisation will not be compliant at all, or only partly compliant, by 2018 Of this group, only a fifth (20 per cent) believe it is even possible to become fully compliant with the GDPR Nearly half (49 per cent) believe that while some company departments will be able to comply - others will not
  4. There is a stark lack of confidence in meeting the May 2018 deadline which leaves businesses at risk of incurring significant fines Nearly three quarters (74 per cent) of businesses do not think an organisation’s privacy track record is a top three consideration for customers when choosing who to do business Respondents admit customers ask about data security in more than a third (36 per cent) of transactions 35 per cent of respondents do not believe their organisation takes an ethical approach to securing and protecting data
  5. While businesses grapple to become compliant, they remain out of touch with consumer expectations when it comes to data privacy and security. Nearly three quarters (74 per cent) of businesses do not think an organisation’s privacy track record is a top three consideration for customers when choosing who to do business, despite customers asking about data security in more than a third (36 per cent) of transactions.   Equally concerning is the finding that 45 per cent of respondents do not believe their organisation takes an ethical approach to securing and protecting data.   These results show there is a significant disconnect with consumer priorities. Symantec’s State of Privacy Report, found 88 per cent of European consumers see data security as the most important factor when choosing a company to do business with. In fact, 86 per cent see it as more important than product quality.   Perhaps unsurprisingly then, the State of European Data Privacy found 55 per cent of businesses are not confident they completely meet customers’ data security expectations.
  6. Many businesses have not started working out the necessary organisation and cultural changes they need to make ahead of May 2018 Almost one in 10 (9 per cent) say all employees can access customers’ personal information Six per cent say all staff can access customers’ payment details Only 14 per cent believe everyone in the organisation has a responsibility to ensure data is protected
  7. With such wide reaching access to people’s personal information, businesses are underestimating the challenges they will face in managing this in line with the GDPR Less than half of those surveyed (47 per cent) said managing data ethically is a top priority for their organisation less than half again (45 per cent) said they would be increasing security training Only 27 per cent of businesses are planning to completely overhaul their approach to security in response to the GDPR
  8. The results show businesses will struggle when it comes to The Right To Be Forgotten Only 28 percent of IT and business decision makers realise the right to be forgotten is part of GDPR (see slide 4) 90 per cent of businesses say customers requesting their data be deleted will be a challenge for their organisation 81 per cent of respondents believe their customers would exercise their right for data to be deleted However, 60 per cent of businesses do not currently have a system in place that enables them to respond to these requests Only nine per cent of respondents have already received requests to be forgotten