Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Do Your Privacy Practices Line Up With Your Privacy Expectations?

Do Your Privacy Practices Line Up With Your Privacy Expectations?

How concerned are you about your data privacy, as a consumer, particularly when you entrust it to another business? If you answered “very”, you aren’t alone… 87 percent of Americans consider their data privacy to be a human right. Having said that, most don’t pay near enough attention to their own security precautions. Let’s take a few moments and examine this trend.

How Consumers View Business Data Practices

A recently released report presented the results of a survey of American consumers to chart their attitudes and expectations regarding corporations and their data privacy. This report—which was compiled by advisory firm KPMG and is available for download on their website—outlined the primary privacy concerns of the everyday user and discusses the statistics around the issue.

Overall, the results showed varying levels of awareness amongst these users and made a few shared concerns very clear. For instance:

  • 86 percent of respondents to the survey felt that their data privacy was a rising concern.
  • 70 percent claimed to be “generally familiar” with how companies collect their personal data, while 64 percent were familiar with how it was used and stored, 63 percent say they understand how it is protected, and 57 percent say they know how it is sold.
  • Having said that, 68 percent don’t trust these companies to sell this data ethically, 54 percent don’t trust it will be used ethically, 53 percent don’t feel it will be collected ethically, and 50 percent don’t trust these companies to protect their data sufficiently.
  • Most consumers are concerned about the theft of their social security number, with 83 percent of respondents identifying this concern. Following closely behind come the 69 percent worried about their credit card numbers.
  • Surprisingly, only 16 percent are concerned about the theft of their medical records.

How Consumers Treat Their Own Data Practices

Now, while this sounds promising (if not quite at optimal numbers), this concern isn’t reflected in consumers when their own actions are considered. While many—in fact, the majority—of users stated that they would consider it risky to engage in many online behaviors, like repeating passwords across accounts, using public Wi-Fi, and saving a credit card to a website, over 40 percent did these things regardless.

This study also took note of the fact that many users neglected their own security options… 61 percent, in fact.

What This Should Tell Us, as People and Business Owners

Whether you’re considering your own personal data, or you’re thinking about the data you’ve collected as you’ve done business, security needs to be your highest priority. Harvard Business Review Analytic Services conducted a study of their own, and the results were quite telling.

46 percent, essentially half of surveyed consumers, said that they had stopped doing business with a retailer due to discomfort with their privacy statement.

That’s huge. As a consumer, it only shows how much power can potentially be wielded to help improve security for everybody… and how much responsibility that power gives us. As a business, it’s a wakeup call to how important securing data really is. While comprehensive data and information security isn’t a simple process and will ultimately make some of your internal processes more time-consuming, it is better than alienating half of your market.

Fortunately, Central Technology Solutions can help make the adoption of improved security solutions and procedures far simpler. To learn more about what we have to offer to help ensure your data security, give us a call at 1-844-237-4300 today.

Technology Making it Possible to Go Back to School...
Business Analytics 101

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Hosted Solutions Network Security Privacy IT Services Email Data Backup Internet Malware Hackers IT Support Software Efficiency Business Innovation Outsourced IT Microsoft Hardware Data Recovery Computer Mobile Devices Productivity Managed IT Services Google Business Continuity Small Business Smartphone IT Support Cybersecurity Upgrade Backup Collaboration Cloud Computing Phishing User Tips Disaster Recovery Communication Ransomware Business Management Workplace Tips Tech Term Managed IT Services Mobile Device VoIP Managed Service Provider Windows 10 Android Internet of Things Managed Service Smartphones Social Media Quick Tips Data Management Paperless Office Encryption Remote Monitoring communications Browser Managed IT Saving Money Facebook Network Office 365 Artificial Intelligence Save Money Covid-19 Windows 10 Server Windows BDR Virtualization Remote Work Miscellaneous Business Technology Users Holiday Risk Management Help Desk Wi-Fi Document Management BYOD Apps Compliance Passwords Chrome Automation Analytics Mobile Device Management Government Healthcare Health Office Vendor Management Training App Microsoft Office Password Windows 7 Recovery Laptops Applications Firewall Bandwidth Avoiding Downtime Unified Threat Management Employer-Employee Relationship Money Robot Bring Your Own Device Gmail Content Filtering Going Green Data Security Blockchain Big Data IT Management Files Redundancy Tip of the week Apple Hosted Solution Website Scam Antivirus Two-factor Authentication Project Management Computing Infrastructure Data storage Telephone Systems SaaS Regulations Data loss Vulnerability Information Technology Information Gadgets Wireless Computers Mobility Processor Storage File Sharing Remote Computing Tablet Company Culture Unified Communications RMM Settings Meetings Flexibility Downtime Proactive Customer Service Social Software as a Service Router Employee-Employer Relationship Politics Maintenance Work/Life Balance VPN Virtual Reality Mobile Office Customer Relationship Management Virtual Private Network Budget Hard Drive IT Service IoT Operating System Access Control Printing OneDrive Machine Learning Professional Services Managed Services Google Drive How To Samsung Recycling Spam Business Growth Utility Computing Consulting WiFi Word Search YouTube Dark Web Augmented Reality Instant Messaging Chromebook Private Cloud Remote Worker Mobile Computing Hacker The Internet of Things Managed Services Provider Administration Tech Support Education Solid State Drive LiFi Digital Payment Remote Monitoring and Management Upgrades Wireless Technology Legal Management Current Events Smart Technology Time Management Networking Twitter Net Neutrality IT solutions Patch Management Social Network Websites Identity Theft Licensing Remote Workers Data Breach File Management Display Network Management Internet Exlporer Sports End of Support Payment Cards Bitcoin HIPAA Assessment Server Management Cooperation How To Monitors Alert Mouse Mobile Security Data Storage Electronic Health Records Electronic Medical Records Co-Managed IT Outlook Monitoring Uninterrupted Power Supply Employees Consultation Break Fix Social Networking Asset Tracking Statistics Mobile Data Identities SharePoint Staff Conferencing Address Wireless Internet Business Telephone Supercomputer MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing CRM Cyberattacks Digital Obstacle Manufacturing Optimization Black Friday Roanoke — Central Technology Solutions Superfish Safety Biometric Google Wallet Fraud Screen Reader Remote Working G Suite History Dark Data Transportation Personal Information Mobile VoIP Mirgation Tracking Development Zero-Day Threat IT Assessment Motherboard Google Maps OneNote Bluetooth Virtual Assistant Vendor Hard Drives Google Docs Downloads Taxes Managing Stress Employer/Employee Relationships IT Budget Tech Terms Proactive IT Batteries Notifications User Error Language Remote eWaste Read Only Spyware Course Hard Disk Drives Virtual Machines Humor Cyber Monday technology services provider Projects Black Market Gamification Drones Smart Tech Cabling Shortcut Cyber security Backups Migration Cables Backup and Disaster Recovery Writing Proactive Maintenance Emoji Digitize Deep Learning Data Warehousing Wasting Time Smart Devices Operations Enterprise Content Management Finance Firefox Theft Virtual Desktop Heating/Cooling IT Consulting ROI Computing Infrastructure Banking Point of Sale Network Congestion Solid State Drives Credit Cards Technology Assurance Group ’s 18 Human Error Return on Investment Alt Codes Peripheral Cybercrime Cost Management E-Commerce WannaCry Teamwork Computer Repair Technology Tips Chatbots Wires Retail Database Management Cortana Shadow IT Microsoft Excel Modem Sync Connectivity Hacking Database Physical Security Sensors Cryptocurrency Multi-Factor Security Wearable Technology Telephony Vulnerabilities Authentication Annual Convention Public Cloud WPA3 Financial Servers Notes 3D Printing Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Options Holidays Distributed Denial of Service Permission Active Directory Processors Typing PCI DSS Travel Features Shared resources Windows Server 2008 Hacks Comparison Identity Botnet GDPR Outsourcing Best Practice Cookies Outsource IT Mobile Device Managment Software Tips Marketing Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Geography Authorization Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws PowerPoint Unsupported Software Value of Managed Services Virus Gadget Mobile Favorites Buisness Mail Merge 5G Update IT Test Touchscreen Techology Windows Server Cache VoIP Sponsor Specifications Lenovo Social Engineering USB Video Conferencing Permissions Nanotechnology Laptop Star Wars Telephone Windows 8 Save Time Legislation IT Technicians GPS High-Speed Internet Administrator CCTV Relocation Webcam Hard Disk Drive Students IT Consultant Error Printers Emergency Web Server CrashOverride Cameras Regulation Motion Sickness