Privacy Ref Blog
Your staff needs to be “privacy aware”
When it is all said and done, no matter what policies you put in place, no mater what procedures you define, no matter what documentation has been written to support your privacy program, it is worthless unless your organization’s staff is knows that these tools exist making them “privacy aware”. Here are a couple of horror stories:
- A nationwide pharmacy chain has a book that you sign when you receive your prescriptions. Upon signing you indicate if you want to talk to a pharmacist and if you prefer not to have a safety cap on your bottles. The person at the counter takes a pre-printed label from the prescription bag and places it next to where you should sign. The book is kept on the counter near the cash register and publicly displayed. There are several pre-printed labels on the bag, some with the name of the prescription and the person receiving it, others with just an order number. A new, poorly trained counter person used the labels with names for several pages of prescriptions allowing everyone to see what medications their neighbors were taking.
- A small business with a telemarketing operation wanted to make it easy for customers to reorder product. For each transaction they wrote the customer’s credit card number on the inside of the customer’s paper file folder. The company kept the file folders in unlocked cabinets in an unsecured area of a warehouse allowing wide access to customer credit card numbers.
- A technology service company had a retail operation and business had taken off. To allow business customers who wanted to discuss an on-going relationship to avoid waiting in line at the retail store the company placed a pad of paper on the counter and asked these customers to provide their name, business name, email address, and telephone number. The pad was on the counter for a few days, but at the end of the week it was missing. It turned out that a competitor had taken the pad and was contacting the customers on the list explaining that the original company was too busy to help them so he was asked to take their business.
You can find regulatory violations, brand damage, and direct lost business in these cases. In each of these situations either the person executing a process or the person who had created a process was not aware of the privacy issues being created. By stepping up privacy awareness efforts these situations could all have been avoided.
There are several ways to improve privacy awareness that I will be discussing over the coming blog entries, but what approach do you have that you are willing to share?
Privacy Ref provides consulting and assessment services to build and improve organizational privacy programs. For more information call Privacy Ref at (888) 470-1528 or email us at email@example.com Posted on September 24, 2012 by Bob Siegel
, Customer Service
Want to find out more?
Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to firstname.lastname@example.org or call (888) 470-1528.
May 10, 2017
Predictive Breach Cost Model
Download our predictive breach cost modelhere
Latest Blog Posts
February 12, 2018
Let me begin by saying that the following text is intentionally ridiculous. I want to illustrate a point recently made about the upcoming E-Privacy Regulation, specifically related to direct marketing.
Imagine one day, President Trump is in France for a summit to discuss some topic of relevance to the international community. He grabs a diet coke and heads over to his monitor to watch a stream of his favorite informative news on Fox & Friends. Little does he know that lying in wait for him is a piece of targeted marketing specifically aimed towards him.
Continue reading this post...
by Keri LeBlanc, Marketing Director, CyberDenfenses, Inc.
Founded in 2001 by military cybersecurity veterans, CyberDefenses works closely with enterprise clients to provide battle-tested managed security services. If there is anything we’ve learned over the years, it’s that effectively protecting your organization’s critical data from increasingly capable and determined adversaries requires a combination of trained people, well-designed processes, and modern tools. That’s why CyberDefenses’ approach encompasses a full suite of services, training and advisory guidance.
Continue reading this post...
Other Recent Posts