SlideShare a Scribd company logo
1 of 4
                                       Background What do the above companies along with hundreds of others have in common?    When it comes to their technology, there are at least three things.    First, they all have or at least profess to have the finest I.T. (information technology) systems available.   Second, they purport to have the brightest and finest I.T. technicians available maintaining their I.T. systems to ensure they are adequately protected from outside intrusion.   Finally, all of them have experienced unauthorized access to their data and the release of private information of their employees, clients, and customers. The Issue Should unauthorized access and information releases be of concern to PEOs?   Clearly the answer is yes!   PEOs maintain the personal information of their corporate employees, worksite employees, and warehouse in their databases the information of previous employees, all of which can number from hundreds to millions of records.   Yet when the question of unauthorized access to data is posed to PEO owners and officers, the response is often “we have a great computer system and our I.T. technicians have assured me that there is no chance of our data being accessed”.  Sound familiar?   While there are exceptions, generally Fortune 1000 companies have the most recent advances in I.T. tools and technicians at their disposal.  Yet, as previously noted, unauthorized access to their data still occurs.   No firm in today’s world, PEOs included, can safely assume that unauthorized access to their data is not possible.  Those who believe otherwise are most likely accepting substantial risk. According to the Identity Theft Resource Center, through May of 2009 over 12,000,000 records containing personal information have been compromised.    The Ponemon Institute, a privacy management research firm, indicates that data breaches cost on average over $197 per personal record compromised.   The legal notification requirements of a breach, or even suspected breach, cost $10 to $12 per individual record with the balance being applied to individual credit monitoring services to prevent I.D. theft as well as actual individual I.D. theft resolution expenses.   In 2007, a PEO experienced a breach that resulted in the loss of records of 159,000 former and current worksite and corporate employees.  Using the numbers previously cited, a conservative loss cost of this incident was over $1,500,000 not to mention the individual prevention and restoration costs. Loss Drivers There are three primary areas of data compromise.  These are a) unauthorized access to data, b) lost or stolen information, and c) the acts of dishonest employees.  We will explore each in more detail.   Unauthorized access to private information through a company’s I.T. system is the most common method of data compromise.   Companies that maintain private information on individuals and businesses are obligated to safeguard this information utilizing the most current technology applications and methods available.  Many states have enacted laws requiring this private information be encrypted.    It is incumbent upon the owners of companies to be sure that this is the case, typically through their I.T. technicians.  It is an ongoing evolving process that continually attempts to safeguard the data from unauthorized access. Loss of Information.  The second area of data breaches occurs due to the loss of information.   Theft and/or loss of laptop and notebook computers is the leading cause of compromise.  This is how the previously cited PEO in 2007 lost the personal records of 159,000 current and former employees.    According to the Ponemon Institute, over 12,000 laptop and notebook computers are lost in U.S. airports every week.   Only 33% of these lost machines are ever reclaimed by the owners.    As a result, over 400,000 machines are sold at airport auctions annually, intact with all the information in place when they were lost.  These numbers do not include machines lost and stolen in other places. According to employee surveys, over 58% of business laptops and notebooks contain private information of employees and clients on their hard drive.    In order to eliminate this risk, PEOs should not allow corporate data to be kept on the laptop/notebook’s local hard drive.    Remote data access should be through a secure private network or virtual private network via an internet connection with the data encrypted.   Further, rules should be in place that forbids the transferring of corporate data to portable drives.  Again, remote access should be granted only through secure networks. Additional losses of data have occurred due to server theft, lost backup tapes, lost data tapes, and lost shipments containing data. Employee Actions.  Employees are the third largest source of unauthorized data releases.    These releases can occur both through the I.T. system as well as through physical records.    They can occur due to lax attitudes toward security as well as through dishonest acts.    A recent study by the Ponemon Institute found that employees are increasingly becoming more lax in their compliance with corporate data security.    Consider the following survey responses: ,[object Object]
47% share passwords
43% have lost data bearing devices
21% have turned off their mobile devices security tools

More Related Content

More from Praxiom

Corporate risk management
Corporate risk managementCorporate risk management
Corporate risk managementPraxiom
 
Top Ten Reasons Employees Sue Their Employer
Top Ten Reasons Employees Sue Their EmployerTop Ten Reasons Employees Sue Their Employer
Top Ten Reasons Employees Sue Their EmployerPraxiom
 
Media release cic
Media release   cicMedia release   cic
Media release cicPraxiom
 
Px Webinars Provider Agreements 2010
Px Webinars Provider Agreements 2010Px Webinars Provider Agreements 2010
Px Webinars Provider Agreements 2010Praxiom
 
Safety Analysis Sheet
Safety Analysis SheetSafety Analysis Sheet
Safety Analysis SheetPraxiom
 
Napeo Loss Prevention Presentation
Napeo Loss Prevention PresentationNapeo Loss Prevention Presentation
Napeo Loss Prevention PresentationPraxiom
 
Job Safety Analysis
Job Safety AnalysisJob Safety Analysis
Job Safety AnalysisPraxiom
 
Risk Management Presentation Powerpoint 2008
Risk Management Presentation Powerpoint 2008Risk Management Presentation Powerpoint 2008
Risk Management Presentation Powerpoint 2008Praxiom
 
Risk Management as a Strategic Business Unit
Risk Management as a Strategic Business UnitRisk Management as a Strategic Business Unit
Risk Management as a Strategic Business UnitPraxiom
 
200906 Stf Insp Chklist
200906 Stf Insp Chklist200906 Stf Insp Chklist
200906 Stf Insp ChklistPraxiom
 
Business Income Worksheet
Business Income WorksheetBusiness Income Worksheet
Business Income WorksheetPraxiom
 
P X Milestones 2009
P X  Milestones 2009P X  Milestones 2009
P X Milestones 2009Praxiom
 
Fixing Your Experience Mod
Fixing Your Experience ModFixing Your Experience Mod
Fixing Your Experience ModPraxiom
 
Peo Insider Article Cyber Terror
Peo Insider Article   Cyber TerrorPeo Insider Article   Cyber Terror
Peo Insider Article Cyber TerrorPraxiom
 
John C. Keller, ARM CIC AAI
John C. Keller, ARM CIC AAIJohn C. Keller, ARM CIC AAI
John C. Keller, ARM CIC AAIPraxiom
 
Praxiom Overview
Praxiom OverviewPraxiom Overview
Praxiom OverviewPraxiom
 
Praxiom One Pager
Praxiom One PagerPraxiom One Pager
Praxiom One PagerPraxiom
 
Lance B. Crawford, GBA
Lance B. Crawford, GBALance B. Crawford, GBA
Lance B. Crawford, GBAPraxiom
 
Dindi DeAngelo
Dindi DeAngeloDindi DeAngelo
Dindi DeAngeloPraxiom
 
Dennis Duffy
Dennis DuffyDennis Duffy
Dennis DuffyPraxiom
 

More from Praxiom (20)

Corporate risk management
Corporate risk managementCorporate risk management
Corporate risk management
 
Top Ten Reasons Employees Sue Their Employer
Top Ten Reasons Employees Sue Their EmployerTop Ten Reasons Employees Sue Their Employer
Top Ten Reasons Employees Sue Their Employer
 
Media release cic
Media release   cicMedia release   cic
Media release cic
 
Px Webinars Provider Agreements 2010
Px Webinars Provider Agreements 2010Px Webinars Provider Agreements 2010
Px Webinars Provider Agreements 2010
 
Safety Analysis Sheet
Safety Analysis SheetSafety Analysis Sheet
Safety Analysis Sheet
 
Napeo Loss Prevention Presentation
Napeo Loss Prevention PresentationNapeo Loss Prevention Presentation
Napeo Loss Prevention Presentation
 
Job Safety Analysis
Job Safety AnalysisJob Safety Analysis
Job Safety Analysis
 
Risk Management Presentation Powerpoint 2008
Risk Management Presentation Powerpoint 2008Risk Management Presentation Powerpoint 2008
Risk Management Presentation Powerpoint 2008
 
Risk Management as a Strategic Business Unit
Risk Management as a Strategic Business UnitRisk Management as a Strategic Business Unit
Risk Management as a Strategic Business Unit
 
200906 Stf Insp Chklist
200906 Stf Insp Chklist200906 Stf Insp Chklist
200906 Stf Insp Chklist
 
Business Income Worksheet
Business Income WorksheetBusiness Income Worksheet
Business Income Worksheet
 
P X Milestones 2009
P X  Milestones 2009P X  Milestones 2009
P X Milestones 2009
 
Fixing Your Experience Mod
Fixing Your Experience ModFixing Your Experience Mod
Fixing Your Experience Mod
 
Peo Insider Article Cyber Terror
Peo Insider Article   Cyber TerrorPeo Insider Article   Cyber Terror
Peo Insider Article Cyber Terror
 
John C. Keller, ARM CIC AAI
John C. Keller, ARM CIC AAIJohn C. Keller, ARM CIC AAI
John C. Keller, ARM CIC AAI
 
Praxiom Overview
Praxiom OverviewPraxiom Overview
Praxiom Overview
 
Praxiom One Pager
Praxiom One PagerPraxiom One Pager
Praxiom One Pager
 
Lance B. Crawford, GBA
Lance B. Crawford, GBALance B. Crawford, GBA
Lance B. Crawford, GBA
 
Dindi DeAngelo
Dindi DeAngeloDindi DeAngelo
Dindi DeAngelo
 
Dennis Duffy
Dennis DuffyDennis Duffy
Dennis Duffy
 

Recently uploaded

VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 

Recently uploaded (20)

Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 

Privacy

  • 1.
  • 3. 43% have lost data bearing devices
  • 4. 21% have turned off their mobile devices security tools
  • 5. 57% said their employers data protection policies were ineffective
  • 6. 42% indicated there was poor communication and enforcement of data security polices
  • 7.
  • 8. If you are outsourcing to others that have access to your corporate and worksite employee data, as well as your client companies’ data, ensure that your provider has employee security checks in place. Also make sure they agree contractually to assume responsibility on your behalf any consequences for the acts of their employees that compromise privacy.
  • 9. Establish a corporate data security policy that is under constant review to ensure it remains current. The policy should not only be included in your employee manual and procedures, it must be communicated and training provided on an ongoing basis.
  • 10. Be certain your I.T. technicians are constantly updating and testing your data security systems.
  • 11. Engage an outside data security firm review to review your data security and test your I.T. system safeguards on a regular basis. This will not only help prove the security of your system, but provide a professional third party opinion on your security based upon their experience with their corporate clients facing the same issues.Risk Transfer Insurance may provide some peace of mind as a backup to your company corporate data security policy. The bad news is that the standard insurance purchased by PEOs typically does not provide any coverage for violation of privacy, and in fact most policies specifically exclude coverage for privacy issues. The good news is that insurance is available for such privacy breaches as a mitigation response should your PEO experience unauthorized access to your data. These specialty coverage insurance policies can provide coverage for notification expenses and/or to include the mitigation and restoration expenses associated with a privacy breach. Closing Privacy violations can be financially devastating to a PEO for both the immediate costs of an event as well as future revenues lost due to the bad publicity that occurs with these kinds of incidents. It is imperative that a best practices program of preparedness that includes I.T. security, compliance, training, and response be undertaken in order to avoid and limit the potential consequences of this all too often occurring situation.