SlideShare a Scribd company logo
ENTERPRISE DATA PRIVACY:
How Does Your Business Stack Up?
2
A recent survey examined the state of data
privacy in businesses. Results showed a
critical disconnect between companies’ data
privacy policies and protection of sensitive
data.
We’ve selected 10 questions from the survey
for you to answer. Keep track of your
responses, then see how your organization
compares to those in the study.
3
Regulated customer
data (credit cards,
health records, etc.)
Password or
authentication
credentials
Personal employee
info (SSNs, phone
numbers, etc.)
Intellectual
property
Accounting and
financial
Unregulated customer
data (emails, order
history, etc.)
Payroll Planning and
strategy documents
We do not
have sensitive
business data
What type of data is the most sensitive to your business?
(Select up to 3)
4
Does your IT organization
conduct regular SECURITY
audits to ensure compliance
with data security standards?
❏  Yes
❏  No
Does your IT organization
conduct regular PRIVACY
audits to ensure compliance
with data privacy standards?
❏  Yes
❏  No
5
How does your IT organization focus efforts to protect
data between external threats (hackers) and internal
threats (like careless employees)?
❏  More effort on internal threats
❏  More effort on external threats
❏  Same effort on both internal and external threats
6
Sales Marketing Owner/Partner Operations IT
Accounting Manufacturing Engineering Legal
Which departments are MOST likely to ignore
corporate data privacy policies? (Select up to 3)
7
Contractors Executives
Contributors/
front-line staff
Team
managers
What level of employee is most likely to
ignore data privacy policies?
8
Insufficient employee
awareness &
understanding of data
privacy policies
Lack budget to
purchase & implement
technology solutions
No process in place
to train or audit
employee behavior
Lack of executive
visibility or priority
into the problem
IT team doesn’t have
knowledge of laws
and requirements
Lack of data privacy
policies
Other We have no
challenges
Which of these challenges ensuring privacy of sensitive data
does your IT team face? (Select all that apply)
9
Access
Control
Log all data access Multi-factor
authentication
Encrypt data on
laptops
Encrypt data on
tablets and
smartphones
No technological
controls for data
privacy
What technological controls
does your organization
have in place to limit or
audit access to sensitive
data by authorized or
unauthorized parties?
(Select all that apply)
10
Which of these regional
data privacy challenges
does your business face?
(Select all that apply) Emerging rules and
regulations difficult to
track and implement
Requirements are
ambiguous, making it
difficult to determine
the correct course of
action
Technology vendors
not offering solutions
or guidance in
addressing regulations
Legal or compliance
team does not
communicate
requirements to IT
IT team lacks
compliance knowledge
to understand
requirements
Does not apply; we do
not have operations in
multiple countries.
11
How concerned are you about the privacy of sensitive
business data in the cloud?
Very concerned
Concerned
Not concerned
Does not apply; my company does not put any data in the cloud
12
In your opinion, which environment has
better data privacy controls?
Cloud On-premise
Now that you’ve taken the quiz, see how the experts
answered the same questions.
14
1.  Of the 99% of businesses which say they have sensitive data to
manage, 52% identified the most common types as credit cards
and health records. 46% selected password or other authentication
credentials, and 41% selected personal employee information such
as social security numbers.
2.  While almost half of organizations (47%) conduct regular privacy
audits, more (68%) conduct regular security audits.
3.  28% of companies focus efforts on protecting against internal
threats, like careless employees, that impact data privacy. 72% put
most of their efforts into protecting from external threats, like
hackers, that impact data security.
4.  48% of companies report that sales is the most likely to ignore data
privacy policies, followed by marketing (35%), owners or partners
(31%), and legal (6%).
5.  Individual contributors and front-line professionals are the most
likely to ignore data privacy policies (39%), closely followed by
executives (33%).
6.  93% of IT organizations face challenges ranging from insufficient
employee awareness (56%) and lack of budget to purchase
technology solutions (45%), to lack of process to audit behavior
(36%) and lack of executive visibility and priority (34%).
7.  63% of companies use some kind of technology approach to
ensure data privacy. The most common are basic access control
(58%) and logging data access (41%). 21% encrypt data on mobile
devices and 36% encrypt data on laptops.
8.  For global companies, 41% report facing difficulties tracking
emerging rules, 29% are challenged by ambiguity of requirements,
29% blame technology vendors for not offering solutions or
guidance to address regulations, and 17% say their IT teams lack
the ability to understand the requirements.
9.  87% of IT organizations are concerned about the privacy of cloud
data, including 32% who describe themselves as “very concerned”.
10.  65% of IT professionals still believe that their on-premises
environments have better privacy controls than the cloud, even
though the reputation of SaaS and public clouds has improved
dramatically in recent years.
SURVEY RESULTS
To learn more, download our research report:
The State of Data Privacy 2015

More Related Content

PDF
Data Privacy Readiness Test
PDF
Where in the world is your PII and other sensitive data? by @druva inc
PDF
The state of data privacy with dimensional research
PDF
Getting a clue: uncovering the truth about your data with mobile forensics
PDF
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
PDF
Wp security-data-safe
PPTX
Data Loss Prevention
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Privacy Readiness Test
Where in the world is your PII and other sensitive data? by @druva inc
The state of data privacy with dimensional research
Getting a clue: uncovering the truth about your data with mobile forensics
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Wp security-data-safe
Data Loss Prevention
Data Loss Prevention (DLP) - Fundamental Concept - Eryk

What's hot (20)

PDF
C7 defending the cloud with monitoring and auditing
PDF
Bridging the Data Security Gap
PDF
California Consumer Privacy Act (CCPA)
PDF
Symantec Webinar: GDPR 1 Year On
PDF
The Rise of Data Ethics and Security - AIDI Webinar
PDF
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
PDF
The Art of Cloud Auditing - ISACA ID
PDF
Protecting Innovation Through Next Generation Enterprise File Sharing
PDF
The Trick to Passing Your Next Compliance Audit
PPTX
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
DOCX
Data privacy and security in uae
PPTX
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PDF
Operational CyberSecurity Final Case Report
PDF
Master Data in the Cloud: 5 Security Fundamentals
PDF
Big Data for Security
PPTX
Seclore: Information Rights Management
PPTX
Data security
PPTX
The CISO’s Guide to Data Loss Prevention
PDF
Crossing the Threshold: Clinical Portals from a Site Perspective
C7 defending the cloud with monitoring and auditing
Bridging the Data Security Gap
California Consumer Privacy Act (CCPA)
Symantec Webinar: GDPR 1 Year On
The Rise of Data Ethics and Security - AIDI Webinar
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
The Art of Cloud Auditing - ISACA ID
Protecting Innovation Through Next Generation Enterprise File Sharing
The Trick to Passing Your Next Compliance Audit
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Data privacy and security in uae
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Technology Overview - Symantec Data Loss Prevention (DLP)
Operational CyberSecurity Final Case Report
Master Data in the Cloud: 5 Security Fundamentals
Big Data for Security
Seclore: Information Rights Management
Data security
The CISO’s Guide to Data Loss Prevention
Crossing the Threshold: Clinical Portals from a Site Perspective
Ad

Viewers also liked (18)

PDF
The State of Employee Engagement
PDF
CIO Cloud Security Checklist
PDF
Why You Need Enterprise Backup
PDF
Advanced Laboratory Analytics — A Disruptive Solution for Health Systems
PPTX
How Sales Reps Can Leverage Social Media
PPTX
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
PDF
The Growth of Corporate Data (infographic)
PPTX
Defining Data Protection in the Cloud 디지탈링스
PPTX
Evans Online Privacy Quiz
PPTX
랜섬웨어
PDF
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
PDF
GDPR: Requirements for Cloud Providers
PDF
Personal Data Protection for your Church
PDF
New Strategies for More Effective Remote/Branch Office Data Protection
PDF
Data Flow Mapping and the EU GDPR
PDF
Infographic e5 - Your finance, Anytime. Any place. Anywhere
PDF
Small Business Owner Report Infographic - Spring 2014 Bank of America
PDF
Apps for Finance infographic_btc
The State of Employee Engagement
CIO Cloud Security Checklist
Why You Need Enterprise Backup
Advanced Laboratory Analytics — A Disruptive Solution for Health Systems
How Sales Reps Can Leverage Social Media
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
The Growth of Corporate Data (infographic)
Defining Data Protection in the Cloud 디지탈링스
Evans Online Privacy Quiz
랜섬웨어
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
GDPR: Requirements for Cloud Providers
Personal Data Protection for your Church
New Strategies for More Effective Remote/Branch Office Data Protection
Data Flow Mapping and the EU GDPR
Infographic e5 - Your finance, Anytime. Any place. Anywhere
Small Business Owner Report Infographic - Spring 2014 Bank of America
Apps for Finance infographic_btc
Ad

Similar to Enterprise Data Privacy Quiz (20)

PDF
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
PPTX
Idge dell reignite2014 qp #2
PPTX
Security Analytics and Big Data: What You Need to Know
PPTX
Overcoming Hidden Risks in a Shared Security Model
PDF
2015 Scalar Security Study Executive Summary
PPT
Shariyaz abdeen data leakage prevention presentation
PDF
Proactive information security michael
PPTX
Keep Calm and Comply: 3 Keys to GDPR Success
PDF
Ponemon Institute Data Breaches and Sensitive Data Risk
PDF
A data-centric program
PPTX
CIO WaterCooler Focus: GDPR Jasmit Sagoo
PPT
2009 iapp-the corpprivacydeptmar13-2009
PPT
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
PDF
State of Data Governance in 2021
PPTX
Ciso round table on effective implementation of dlp & data security
PPTX
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
PPTX
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
PDF
A Survey On Data Leakage Detection
PDF
Security Priorities Sample Slides 2023.pdf
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
Idge dell reignite2014 qp #2
Security Analytics and Big Data: What You Need to Know
Overcoming Hidden Risks in a Shared Security Model
2015 Scalar Security Study Executive Summary
Shariyaz abdeen data leakage prevention presentation
Proactive information security michael
Keep Calm and Comply: 3 Keys to GDPR Success
Ponemon Institute Data Breaches and Sensitive Data Risk
A data-centric program
CIO WaterCooler Focus: GDPR Jasmit Sagoo
2009 iapp-the corpprivacydeptmar13-2009
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
State of Data Governance in 2021
Ciso round table on effective implementation of dlp & data security
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
A Survey On Data Leakage Detection
Security Priorities Sample Slides 2023.pdf

More from Druva (20)

PDF
Druva’s 2017 Ransomware Survey
PPTX
4 ways to cut your e discovery costs in half-webinar-exterro-druva
PDF
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
PDF
Rethink Server Backup and Regain Control
PDF
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
PDF
20 point checklist : why move backup and disaster recovery to the cloud - druva
PDF
Interested in working at Druva?
PDF
Black Hat 2015 Survey: The Challenge of Data Sprawl
PDF
Where In The World Is Your Sensitive Data?
PDF
Soundbytes from the Frontlines
PDF
Security and privacy of cloud data: what you need to know (Interop)
PDF
AWS reInvent: Building an enterprise class backup and archival solution on AWS
PDF
Data in the Wild: Survival Guide
PDF
40 scary stats about data at risk
PDF
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
PDF
inSync Cloud FAQ
PDF
inSync FAQ
PDF
The Challenges of Windows XP Migration (infographic)
PDF
How Endpoint Mobility Kills Bare Metal Restore (infographic)
PDF
Series C: The growth, innovation, and leadership of Druva
Druva’s 2017 Ransomware Survey
4 ways to cut your e discovery costs in half-webinar-exterro-druva
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Rethink Server Backup and Regain Control
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
20 point checklist : why move backup and disaster recovery to the cloud - druva
Interested in working at Druva?
Black Hat 2015 Survey: The Challenge of Data Sprawl
Where In The World Is Your Sensitive Data?
Soundbytes from the Frontlines
Security and privacy of cloud data: what you need to know (Interop)
AWS reInvent: Building an enterprise class backup and archival solution on AWS
Data in the Wild: Survival Guide
40 scary stats about data at risk
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
inSync Cloud FAQ
inSync FAQ
The Challenges of Windows XP Migration (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)
Series C: The growth, innovation, and leadership of Druva

Recently uploaded (20)

PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Nekopoi APK 2025 free lastest update
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Transform Your Business with a Software ERP System
PPTX
Introduction to Artificial Intelligence
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Nekopoi APK 2025 free lastest update
wealthsignaloriginal-com-DS-text-... (1).pdf
Design an Analysis of Algorithms I-SECS-1021-03
Odoo POS Development Services by CandidRoot Solutions
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
2025 Textile ERP Trends: SAP, Odoo & Oracle
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
VVF-Customer-Presentation2025-Ver1.9.pptx
Wondershare Filmora 15 Crack With Activation Key [2025
Which alternative to Crystal Reports is best for small or large businesses.pdf
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Transform Your Business with a Software ERP System
Introduction to Artificial Intelligence
Operating system designcfffgfgggggggvggggggggg
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus

Enterprise Data Privacy Quiz

  • 1. ENTERPRISE DATA PRIVACY: How Does Your Business Stack Up?
  • 2. 2 A recent survey examined the state of data privacy in businesses. Results showed a critical disconnect between companies’ data privacy policies and protection of sensitive data. We’ve selected 10 questions from the survey for you to answer. Keep track of your responses, then see how your organization compares to those in the study.
  • 3. 3 Regulated customer data (credit cards, health records, etc.) Password or authentication credentials Personal employee info (SSNs, phone numbers, etc.) Intellectual property Accounting and financial Unregulated customer data (emails, order history, etc.) Payroll Planning and strategy documents We do not have sensitive business data What type of data is the most sensitive to your business? (Select up to 3)
  • 4. 4 Does your IT organization conduct regular SECURITY audits to ensure compliance with data security standards? ❏  Yes ❏  No Does your IT organization conduct regular PRIVACY audits to ensure compliance with data privacy standards? ❏  Yes ❏  No
  • 5. 5 How does your IT organization focus efforts to protect data between external threats (hackers) and internal threats (like careless employees)? ❏  More effort on internal threats ❏  More effort on external threats ❏  Same effort on both internal and external threats
  • 6. 6 Sales Marketing Owner/Partner Operations IT Accounting Manufacturing Engineering Legal Which departments are MOST likely to ignore corporate data privacy policies? (Select up to 3)
  • 7. 7 Contractors Executives Contributors/ front-line staff Team managers What level of employee is most likely to ignore data privacy policies?
  • 8. 8 Insufficient employee awareness & understanding of data privacy policies Lack budget to purchase & implement technology solutions No process in place to train or audit employee behavior Lack of executive visibility or priority into the problem IT team doesn’t have knowledge of laws and requirements Lack of data privacy policies Other We have no challenges Which of these challenges ensuring privacy of sensitive data does your IT team face? (Select all that apply)
  • 9. 9 Access Control Log all data access Multi-factor authentication Encrypt data on laptops Encrypt data on tablets and smartphones No technological controls for data privacy What technological controls does your organization have in place to limit or audit access to sensitive data by authorized or unauthorized parties? (Select all that apply)
  • 10. 10 Which of these regional data privacy challenges does your business face? (Select all that apply) Emerging rules and regulations difficult to track and implement Requirements are ambiguous, making it difficult to determine the correct course of action Technology vendors not offering solutions or guidance in addressing regulations Legal or compliance team does not communicate requirements to IT IT team lacks compliance knowledge to understand requirements Does not apply; we do not have operations in multiple countries.
  • 11. 11 How concerned are you about the privacy of sensitive business data in the cloud? Very concerned Concerned Not concerned Does not apply; my company does not put any data in the cloud
  • 12. 12 In your opinion, which environment has better data privacy controls? Cloud On-premise
  • 13. Now that you’ve taken the quiz, see how the experts answered the same questions.
  • 14. 14 1.  Of the 99% of businesses which say they have sensitive data to manage, 52% identified the most common types as credit cards and health records. 46% selected password or other authentication credentials, and 41% selected personal employee information such as social security numbers. 2.  While almost half of organizations (47%) conduct regular privacy audits, more (68%) conduct regular security audits. 3.  28% of companies focus efforts on protecting against internal threats, like careless employees, that impact data privacy. 72% put most of their efforts into protecting from external threats, like hackers, that impact data security. 4.  48% of companies report that sales is the most likely to ignore data privacy policies, followed by marketing (35%), owners or partners (31%), and legal (6%). 5.  Individual contributors and front-line professionals are the most likely to ignore data privacy policies (39%), closely followed by executives (33%). 6.  93% of IT organizations face challenges ranging from insufficient employee awareness (56%) and lack of budget to purchase technology solutions (45%), to lack of process to audit behavior (36%) and lack of executive visibility and priority (34%). 7.  63% of companies use some kind of technology approach to ensure data privacy. The most common are basic access control (58%) and logging data access (41%). 21% encrypt data on mobile devices and 36% encrypt data on laptops. 8.  For global companies, 41% report facing difficulties tracking emerging rules, 29% are challenged by ambiguity of requirements, 29% blame technology vendors for not offering solutions or guidance to address regulations, and 17% say their IT teams lack the ability to understand the requirements. 9.  87% of IT organizations are concerned about the privacy of cloud data, including 32% who describe themselves as “very concerned”. 10.  65% of IT professionals still believe that their on-premises environments have better privacy controls than the cloud, even though the reputation of SaaS and public clouds has improved dramatically in recent years. SURVEY RESULTS
  • 15. To learn more, download our research report: The State of Data Privacy 2015