{"id":858,"date":"2016-09-14T15:42:29","date_gmt":"2016-09-14T15:42:29","guid":{"rendered":"http:\/\/www.securityinshredding.com\/blog\/?p=858"},"modified":"2018-06-27T14:08:15","modified_gmt":"2018-06-27T14:08:15","slug":"ireland-businesses-top-six-threats-to-data-privacy","status":"publish","type":"post","link":"https:\/\/www.securityinshredding.com\/blog\/ireland-businesses-top-six-threats-to-data-privacy\/","title":{"rendered":"Ireland Businesses &#8211; Top Six threats to Data Privacy"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-large wp-image-593\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/04\/privacy-data-security-1024x600.jpg\" alt=\"clear out shredding, onsite document shredding, on site document shredding, onsite shredding service Ireland, on site shredding service Ireland, onsite paper destruction, on site paper destruction, shredding confidential paper, confidential document shredding, confidential document destruction\" width=\"584\" height=\"342\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/04\/privacy-data-security-1024x600.jpg 1024w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/04\/privacy-data-security-300x176.jpg 300w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/04\/privacy-data-security-768x450.jpg 768w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/04\/privacy-data-security-500x293.jpg 500w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/04\/privacy-data-security.jpg 1280w\" sizes=\"(max-width: 584px) 100vw, 584px\" \/><\/p>\n<p>All Businesses in operation in <strong>Limerick<\/strong>,<strong> Cork<\/strong>, <strong>Dublin<\/strong>, <strong>Galway<\/strong> and across <strong>Ireland<\/strong> will be aware of <strong>Data Breaches<\/strong> and the risks associated with them. A data breach can come in the form of a paper breach when failing to implement <a href=\"https:\/\/www.securityinshredding.com\/\">confidential document destruction<\/a> and a digital breach when failing to have appropriate security procedures in place. The knock on negativity that an Organisation faces affects client relationships in addition to damaging your Company image.<\/p>\n<p>In many cases due to <a href=\"https:\/\/www.dataprotection.ie\/docs\/Home\/4.htm\" rel=\"nofollow\">DATA PROTECTION LAW<\/a> your Organisation may be legally responsible to your customers. In this article I will go through my top six threats to Data Privacy for Organisations.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-medium wp-image-385\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/03\/blog1.1-300x154.jpg\" alt=\"clear out shredding, onsite document shredding, on site document shredding, onsite shredding service Ireland, on site shredding service Ireland, onsite paper destruction, on site paper destruction, shredding confidential paper, confidential document shredding, confidential document destruction\" width=\"300\" height=\"154\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/03\/blog1.1-300x154.jpg 300w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/03\/blog1.1.jpg 313w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>Top SixThreats;<\/strong><\/p>\n<ol>\n<li><span style=\"text-decoration: underline;\">Lack of Data Protocols<\/span><\/li>\n<\/ol>\n<p>In many data breach cases it is found that there was a failure of the Organisation to have even the most basic protocols in place to minimise the loss of customer and employee data. Examples have been; a failure to have confidential paper stored in a secure location when not in use and waste paper material being destroyed through an onsite document shredding facility.<\/p>\n<ol start=\"2\">\n<li><span style=\"text-decoration: underline;\">Restricted access to information<\/span><\/li>\n<\/ol>\n<p>A regular mistake by Organisations today both Public and Private is to restrict access to confidential information for employees. A simple \u201cneed to know\u201d procedure is a great step in achieving data security.<\/p>\n<ol start=\"3\">\n<li><a href=\"https:\/\/www.benzinga.com\/general\/16\/09\/8448462\/lessons-learned-from-the-secs-1-million-data-privacy-fine\" rel=\"nofollow\"><span style=\"text-decoration: underline;\">Failing client expectations<\/span><\/a><\/li>\n<\/ol>\n<p>Within many Organisations there seems to be a free for all information sharing tendency. However, in today\u2019s competitive environment business clients and public clients to given Organisations expect to have their information maintained securely. Various staff members with varying staff functions are not required to know one another data details. A simple contract inclusion at employment stage would reduce and minimise this non-required cross function data sharing tendency.<\/p>\n<ol start=\"4\">\n<li><span style=\"text-decoration: underline;\">Extended information gathering &amp; sharing<\/span><\/li>\n<\/ol>\n<p>There is an increasing trend in information gathering through online forms and \u201copt out\u201d functions. This information may be shared among Organisations with no accurate business case to justify such sharing.<\/p>\n<ol start=\"5\">\n<li><span style=\"text-decoration: underline;\">Increases in technology<\/span><\/li>\n<\/ol>\n<p>This point covers a multitude of technologies but I will mention two different kinds;<\/p>\n<ol>\n<li>Confidential document shredding \u2013 reconstruction technologies<\/li>\n<li>Online digital data technologies that part individuals from their personal information for fraudulent use.<\/li>\n<\/ol>\n<ol start=\"6\">\n<li><span style=\"text-decoration: underline;\">Lack of awareness<\/span><\/li>\n<\/ol>\n<p>There is a concerning level ignorance or lack of knowledge from a Data Controller perspective and general public perspective when dealing with sensitive data.<\/p>\n<p>Data Controllers may lack a degree of awareness of their data protection obligations, such examples can be failing to complete a clear out shredding process at the end of each calendar year or failing to have a confidential document destruction process in place for daily generated materials.<\/p>\n<p>For more information on data privacy Email us at <strong>info@securityinshredding.com\u00a0<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.dataprotection.ie\/docs\/Home\/4.htm\" rel=\"nofollow\">Data Protection Commissioner<\/a> phone no:<strong> +353 57 868 4800<\/strong><\/p>\n<p><span style=\"border-radius: 2px; text-indent: 20px; width: auto; padding: 0px 4px 0px 0px; text-align: center; font: bold 11px\/20px 'Helvetica Neue',Helvetica,sans-serif; color: #ffffff; background: #bd081c no-repeat scroll 3px 50% \/ 14px 14px; position: absolute; opacity: 0.85; z-index: 8675309; display: none; cursor: pointer; top: 642px; left: 105px;\">Save<\/span><\/p>\n<p><span style=\"border-radius: 2px; text-indent: 20px; width: auto; padding: 0px 4px 0px 0px; text-align: center; font: bold 11px\/20px 'Helvetica Neue',Helvetica,sans-serif; color: #ffffff; background: #bd081c no-repeat scroll 3px 50% \/ 14px 14px; position: absolute; opacity: 0.85; z-index: 8675309; display: none; cursor: pointer; top: 642px; left: 105px;\">Save<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>All Businesses in operation in Limerick, Cork, Dublin, Galway and across Ireland will be aware of Data Breaches and the risks associated with them. A data breach can come in the form of a paper breach when failing to implement &hellip; <a href=\"https:\/\/www.securityinshredding.com\/blog\/ireland-businesses-top-six-threats-to-data-privacy\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,8,5],"tags":[64,73,74,93,67,95,92,68,94,96],"_links":{"self":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/858"}],"collection":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/comments?post=858"}],"version-history":[{"count":11,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/858\/revisions"}],"predecessor-version":[{"id":1233,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/858\/revisions\/1233"}],"wp:attachment":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/media?parent=858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/categories?post=858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/tags?post=858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}