There are now two types of companies in the world: those whose data has been breached and those who don’t yet know that their data has been breached.
That also means that there is new reality for each of us: It’s not if a data breach situation will happen, it’s how we deal with it when it does.
A sad fact of our time is that every company is at real risk for a criminal data breach. Nearly every aspect of our society has been hacked, including education, business, and government. One report quoted by the Venable law firm found that 621 confirmed breaches occurred in 2012 alone and retailers represented 21.7 percent of network-based breach incidents.
A proactive approach is not only good for business, it’s good for customers, too. Brands hold a fragile trust bond with people and that bond is shaken a bit now for every brand, not just those in the high-profile recent cases. Marketers have a chance to be at the epicenter of corporate and brand readiness, working with legal, IT, privacy, and customer service teams.
It seems counterintuitive for marketers to break down silos and be the lead on data security policies, but who better than us? Just as marketers can step up and be the company leads on data stewardship and customer centricity, it is our processes and practices that are under attack and so who better to lead the charge on readiness than the people who will be most affected in terms of business goal attainment?
To get started, check out the new checklist included in the newly updated Article #37 in the 2014 Ethical Business Guidelines from the Digital Marketing Association (DMA) (full disclosure: I work for DMA). Some of the guidance includes:
- Should you be in a situation where you are dealing with law enforcement, it’s important to have a published privacy and security policy as well as documented internal processes and meaningful employee training.
- A collaborative approach must include legal, privacy, IT, your colleagues in marketing (like email, social, and digital), and even HR people. For example, the DMA Guidelines now include guidance on “BYOD” or “bring your own device” employee training.
- Figure out the most appropriate law enforcement contact and make that part of your planning process.
- Your plan should facilitate a prompt and coordinated response in order to be rapid, thorough, and reasoned in your response. You want to focus on notification – for internal teams and external parties like customers, partners, credit card companies, and even if not legally required, regulatory agencies and law enforcement.
- Even if personally identifiable information (PII) or financial data is not breached, you might still be regulated and required to notify affected parties. Remember that email address can be PII in some situations. Check with counsel about exactly what constitutes PII in each state, and plan ahead for your notification business rules. You may decide for business purposes to notify more people than legally required, for example.
These situations are regulated, and in fact 47 states have breach notification laws, each with their own requirements. The rules will apply not just to the business location but also to the location of the people affected and/or the data affected. Be sure that you have your requirements up to date.
When a data breach happens, a lot will be going on at once, in addition to your daily activities. These new emergency activities range from call center training to PR to law enforcement cooperation and research on relevant elements. The plan will be your blueprint for action, especially in the first crucial 72 hours. It’s also a good idea to put a plan together and test it with a mock crisis situation. Better to know now where the holes are, rather than find them out when the pressure is on.
This plan development and testing takes a financial commitment. It will include legal fees and employee time and research. You may need to update your various security certifications or practices. However, the financial cost of a data breach in 2012 was estimated at $5.4 million, according to the Venable law firm. That doesn’t necessarily count the costs to recover reputation and consumer good will, and any regulatory investigations even if there is not litigation.
Consumer trust is at risk, even if your company is not breached. DMA accepts tens of thousands of consumer complaints a year about marketing practices, most of which are around choices offered via our consumers services like DMAChoice.org (opt out for direct mail) and AboutAds.info (opt out for behavioral advertising). However, recently, complaints about phishing and malware have increased, which we see as reflective of heightened levels of consumer anxiety and unease. Anxious customers are not happy customers.
Please make a note in the comments section about what you are doing on readiness, and what resources you need to be successful.
According to data gathered for the report,‘Communications Infrastructure: The Backbone of Digital,’ 88% of IT professionals and 61% of marketers ranked their company’s current communication infrastructure as 'cutting-edge' or 'good.'
President Trump's digital savvy isn't limited to social media. As it turns out, the Trump Organization owns thousands of domain names, possibly even more than 10,000.
Silicon Valley loves fancy job titles. It’s just something we do, and software and technology lend themselves to it. But it’s not always helpful.
In an often fragmented workplace, where various departments have varying opinions and goals, it can be challenging to get everyone on the same page and make strategy meetings productive.