Research Technology (ResTech)

May 31, 2016

When It Comes to Managing Data Security, Know the Company You Keep

Companies shouldn’t wait for the EU-U.S. Data Privacy shield to be finalized to start putting in place measures for managing data transfer.

When It Comes to Managing Data Security, Know the Company You Keep
Rebecca West

by Rebecca West

0

Editor’s Note: This post is part of our Big Ideas Series, a column highlighting the innovative thinking and thought leadership at IIeX events around the world. Rebecca West will be speaking at IIeX North America (June 13-15 in Atlanta). If you liked this article, you’ll love IIeX NA. Click here to learn more.


It’s not yet certain what the final outcome of the EU-U.S. Data Privacy shield will mean. As soon as it is finalized it’s expected to be immediately challenged from within the EU. But whether data is being exchanged between the EU and the US or not, the truth is that how data will be handled almost everywhere has forever been changed. Companies should not wait for regulations to start putting in place mechanisms for managing data transfer.

We’ve boiled it down to ten strategies for working together to win the compliance challenge. They aren’t scientific or in any prescribed order. But they are a start toward a checklist about respondent data security.

Strategy 1

Establish a Culture of Accountability Organizations that exhibit a “culture of caring” with respect to data privacy and protection are less likely to experience security breaches. Maintain an organizational mindset that you are stewards of respondents’ data and it is your responsibility to protect and safeguard it.

Strategy 2

Establish and Engage in Best Practices Address issues of confidentiality before a project begins. Always have respondents sign an Informed Consent Form. Review deliverables to make sure respondent identifiers are removed.

Strategy 3

Become More of a Technology Guru Understand what it means to have data encrypted over public and private networks.

Strategy 4

Establish and Enforce A Security Policy Shortcomings in privacy and protection technologies can result in data being compromised.

Strategy 5

Promote and Enforce PII Security Protocols Establish a comprehensive global data protection program that provides a consistent approach to protecting respondent data.

Strategy 6

Understand the Global Public Mind Set Individuals worry about the ability of government and businesses to monitor their habits online and combine information with other data to create personal profiles, while avidly sharing personal information across social networks voluntarily. This is a dichotomy that is hard to explain, but real.

Strategy 7

Engage in Public Compliance Become more transparent. Publicly disclose privacy policies on your website.

Strategy 8

Become Aware of Non-Compliance Cost Fines for an EU data breach will become up to 4% of annual revenue from your preceding year. Regardless if you’re a Google or a 1-person consultancy, violating this law will hurt your bottom line.

Strategy 9

Accept that Global Data Privacy Issues Will Be Fluid for a While Emerging regulations generally are not sufficient for how data is transferred electronically. There are few consistencies from country to country or even within individual countries.

Strategy 10

Know the Company You Keep There is a notable difference between organizations’ intentions regarding data privacy and how they actually protect it. Understand the approach to data protection among third parties you do business with. Make it clear to business partners that safeguarding respondent information is one of your shared fundamental responsibilities.

Follow these steps, and you can lessen your risks. In the process, you are honoring the needs of respondents to maintain control over their personally identifiable information – with or without legislation.

0

data privacydata securityprivacy

Disclaimer

The views, opinions, data, and methodologies expressed above are those of the contributor(s) and do not necessarily reflect or represent the official policies, positions, or beliefs of Greenbook.

Comments

Comments are moderated to ensure respect towards the author and to prevent spam or self-promotion. Your comment may be edited, rejected, or approved based on these criteria. By commenting, you accept these terms and take responsibility for your contributions.

More from Rebecca West

The Five Clear Steps to Successful Product Testing Right Now

The Five Clear Steps to Successful Product Testing Right Now

Product testing during COVID is possible with these must-know steps.

Rebecca West

Rebecca West

Manage the Overwhelming Chaos of Qualitative Research Data

Manage the Overwhelming Chaos of Qualitative Research Data

How to keep qualitative data organized.

Rebecca West

Rebecca West

Ten Ways to Stay HIPAA Compliant In Web-Enabled Market Research

Ten Ways to Stay HIPAA Compliant In Web-Enabled Market Research

A helpful set of guidelines to help in navigating research projects requiring HIPAA compliance.

Rebecca West

Rebecca West

ARTICLES

Moving Away from a Narcissistic Market Research Model

Research Methodologies

Moving Away from a Narcissistic Market Research Model

Why are we still measuring brand loyalty? It isn’t something that naturally comes up with consumers, who rarely think about brand first, if at all. Ma...

Devora Rogers

Devora Rogers

Chief Strategy Officer at Alter Agents

The Stepping Stones of Innovation: Navigating Failure and Empathy with Carol Fitzgerald
Natalie Pusch

Natalie Pusch

Senior Content Producer at Greenbook

Sign Up for
Updates

Get content that matters, written by top insights industry experts, delivered right to your inbox.

67k+ subscribers

Weekly Newsletter

Greenbook Podcast

Webinars

Event Updates

I agree to receive emails with insights-related content from Greenbook. I understand that I can manage my email preferences or unsubscribe at any time and that Greenbook protects my privacy under the General Data Protection Regulation.*