There are now two types of companies in the world: those whose data has been breached and those who don’t yet know that their data has been breached.
That also means that there is new reality for each of us: It’s not if a data breach situation will happen, it’s how we deal with it when it does.
A sad fact of our time is that every company is at real risk for a criminal data breach. Nearly every aspect of our society has been hacked, including education, business, and government. One report quoted by the Venable law firm found that 621 confirmed breaches occurred in 2012 alone and retailers represented 21.7 percent of network-based breach incidents.
A proactive approach is not only good for business, it’s good for customers, too. Brands hold a fragile trust bond with people and that bond is shaken a bit now for every brand, not just those in the high-profile recent cases. Marketers have a chance to be at the epicenter of corporate and brand readiness, working with legal, IT, privacy, and customer service teams.
It seems counterintuitive for marketers to break down silos and be the lead on data security policies, but who better than us? Just as marketers can step up and be the company leads on data stewardship and customer centricity, it is our processes and practices that are under attack and so who better to lead the charge on readiness than the people who will be most affected in terms of business goal attainment?
To get started, check out the new checklist included in the newly updated Article #37 in the 2014 Ethical Business Guidelines from the Digital Marketing Association (DMA) (full disclosure: I work for DMA). Some of the guidance includes:
- Should you be in a situation where you are dealing with law enforcement, it’s important to have a published privacy and security policy as well as documented internal processes and meaningful employee training.
- A collaborative approach must include legal, privacy, IT, your colleagues in marketing (like email, social, and digital), and even HR people. For example, the DMA Guidelines now include guidance on “BYOD” or “bring your own device” employee training.
- Figure out the most appropriate law enforcement contact and make that part of your planning process.
- Your plan should facilitate a prompt and coordinated response in order to be rapid, thorough, and reasoned in your response. You want to focus on notification – for internal teams and external parties like customers, partners, credit card companies, and even if not legally required, regulatory agencies and law enforcement.
- Even if personally identifiable information (PII) or financial data is not breached, you might still be regulated and required to notify affected parties. Remember that email address can be PII in some situations. Check with counsel about exactly what constitutes PII in each state, and plan ahead for your notification business rules. You may decide for business purposes to notify more people than legally required, for example.
These situations are regulated, and in fact 47 states have breach notification laws, each with their own requirements. The rules will apply not just to the business location but also to the location of the people affected and/or the data affected. Be sure that you have your requirements up to date.
When a data breach happens, a lot will be going on at once, in addition to your daily activities. These new emergency activities range from call center training to PR to law enforcement cooperation and research on relevant elements. The plan will be your blueprint for action, especially in the first crucial 72 hours. It’s also a good idea to put a plan together and test it with a mock crisis situation. Better to know now where the holes are, rather than find them out when the pressure is on.
This plan development and testing takes a financial commitment. It will include legal fees and employee time and research. You may need to update your various security certifications or practices. However, the financial cost of a data breach in 2012 was estimated at $5.4 million, according to the Venable law firm. That doesn’t necessarily count the costs to recover reputation and consumer good will, and any regulatory investigations even if there is not litigation.
Consumer trust is at risk, even if your company is not breached. DMA accepts tens of thousands of consumer complaints a year about marketing practices, most of which are around choices offered via our consumers services like DMAChoice.org (opt out for direct mail) and AboutAds.info (opt out for behavioral advertising). However, recently, complaints about phishing and malware have increased, which we see as reflective of heightened levels of consumer anxiety and unease. Anxious customers are not happy customers.
Please make a note in the comments section about what you are doing on readiness, and what resources you need to be successful.
New Top-Level Domains (TLDs) have become more popular in the last couple of years, so here’s everything you need to know about them.
Sure, some apps are doing personalized push notifications, but what happens when your users are in the app?
Since cloud computing first gained mainstream attention around 2009, its popularity has exploded. Promising increased efficiency, flexibility and cost-effectiveness, it was hailed as the ultimate business solution. But are users seeing the benefits?
The term ‘marketing cloud’ has gained significant traction in the last few years as major software companies have sought to monetise the growing importance of technology for marketing teams.