Over 80% of breaches are a result of employees taking personal data outside the organization on paper, thumb drives and unencrypted laptops.
St. Louis, MO (PRWEB) July 09, 2013
Effective data security starts with assessing what information a company has and identifying who has access to it. The best data protection policy is useless if it can’t be connected to everyday business practices. The first step in protecting personal data is locating and documenting an inventory of the specific types of sensitive information that exists across a company, the business areas that have it, media types and locations where it’s stored and how it’s shared. As simple as it sounds, before personal data can be controlled or protected, a company has to locate and document what information they have and where they have it.
A comprehensive Personal Data Inventory (PDI) is the cornerstone of any privacy program. In order to protect sensitive and personal information an organization has to know where it exists.
The escalation of security breaches involving personally identifiable information (PII) costs organizations millions of dollars each year, not to mention reputational harm. Over 80% of breaches are a result of employees taking personal data outside the organization on paper, thumb drives and unencrypted laptops. "Our customers are able to protect their sensitive and personal information because they know where that information exists and how it flows across and outside of the organization," said Marty Provin, Executive Vice President at Jordan Lawrence.
*Gartner, Inc. “Let Go of Personal Data Without Losing Control”, Carsten Casper May 20, 2013.
About Jordan Lawrence
With 25 years of experience and thousands of client engagements, Jordan Lawrence provides a unique and objective way to solve the most pressing data privacy and records management challenges.
Jordan Lawrence provides proven, fast and affordable services that help any company meet current and ever changing legal and business requirements. Our clients understand what information they have, where they have it, its sensitivity and defensibly eliminate what they don’t need.