3 Ways U.S. Businesses Can Benefit From GDPR
On May 25, 2018, the General Data Protection Regulation (GDPR) will enforce the biggest overhaul in data protection the European Union has seen in over 20 years. The new laws will apply to every organization that processes personal data within the EU and every business that sells goods or services to its citizens. The increasing importance of integrating security and privacy into a business strategy means GDPR can provide an effective Unified Communications framework – even for American companies that don’t operate in European markets. Preparing your UC strategy to incorporate GDPR protocols can provide important benefits – and protections – for your organization. Here’s why:
Most data breaches affect U.S. companies
The primary objectives of GDPR are to give EU citizens more control over how organizations collect, protect and use their personal data. The regulations will also force organizations to report any breach of personal data that affects consumers’ rights and freedoms within 72 hours. If these parameters are not met, business could face fines of up to $24 million or 4 percent of their global turnover.
Digital security provider Gemalto recently did the math and revealed that over 9 billion data records have been “lost, stolen or compromised” since 2013. Additionally, the latest Breach Level Index reported 918 data breaches in the first half of 2017, 801 of which affected U.S. organizations. By comparison, the UK, the country with the second most breaches, only had 40.
In short, most security breaches affect U.S. companies and citizens. Despite this, there is currently no single, unifying law that regulates the collection and use of personal data, only separate state and federal laws that can sometimes contradict one another. But with the number of data breaches only set to increase, there’s never been a greater need for stricter data privacy laws like GDPR that help make people’s personal information safer.
Reputational damage costs money
In addition to giving consumers greater control over how their personal data is used, GDPR will seek to reduce the amount of personal data that companies collect by default. As a result, businesses will need to adopt “privacy by design” into all processes and services to comply. They also must be able to demonstrate that suitable data protection measures are not only in place, but also being continually monitored.
Deloitte recently identified 14 business impacts of a cyberattack. The accounting giant argues that the true cost of many data leaks is hard to measure because “above the surface” impacts dominate valuations. While the cost of breach notifications and regulatory fines are easier to measure, factors such as lost value from customer relationships and intellectual property are harder to place a value on. Therefore, Deloitte believes that 90 percent of a cyberattack’s impact is impossible to measure.
Even with the difficulty of assessing the actual cost of data leaks, the estimates that exist do not make good reading. NewVoiceMedia’s research estimates that businesses lose $62 billion a year due to damaged customer relationships, and Centrify’s report calculates that immediately after revealing a data breach, companies experience an average stock price decline of 5 percent.
Considering the potential tangible and intangible costs of a cyberattack, the benefits of building GDPR-strength privacy protection into all processes become clear.
Trust builds positive customer perceptions
Nine out of ten businesses still haven’t made crucial updates to their privacy policies ahead of GDPR, according to a recent UK survey. In isolation, this stat makes it possible to assume that British businesses see the new laws as more hinderance than help. However, by viewing GDPR as an opportunity to drive best practice in data integrity, the regulations present forward-thinking companies with a great chance to improve customer trust levels.
Last year, the Heartbleed and WannaCry cyberattacks compromised the personal data of businesses all over the world. At the same time, Uber, Yahoo and Equifax – companies used by millions of people – have admitted to being breached by huge hacks. In our interconnected world, no business exists in a bubble where they can afford to neglect their responsibility to keep customer data safe and secure.
Organizations that handle personal data will be under more scrutiny than ever before. People are now more aware of how companies use their data, and consumers are demanding more robust and transparent data handling processes. In this context, becoming GDPR compliant, creating privacy controls and adopting good data security practices will help to breed trust in customers.
Final thoughts
GDPR represents a fantastic opportunity for U.S. organizations to review their data protection policies. By adopting key concepts such as privacy by design, data transparency and confidentiality into your Unified Communications strategy, organizations can create a competitive advantage over businesses that don’t. The time between now and May 28 provides a great opportunity to update your UC strategy to help you manage all the forthcoming implications of GDPR compliance a lot smoother.
In highly competitive markets, where customer service is now a crucial differentiator, adhering to the principals of GDPR will build trust with consumers and ultimately drive more sales.
Start YourCustomized Search
SOLUTION AREA
SOLUTION PROVIDERS
- 8x8 (40) Apply 8x8 filter
- Alcatel-Lucent Enterprise (50) Apply Alcatel-Lucent Enterprise filter
- AT&T (44) Apply AT&T filter
- AudioCodes (48) Apply AudioCodes filter
- Avaya (396) Apply Avaya filter
- Cisco (573) Apply Cisco filter
- Dell (11) Apply Dell filter
- Five9 (53) Apply Five9 filter
- Fuze (39) Apply Fuze filter
- Genesys (100) Apply Genesys filter
- HP (98) Apply HP filter
- IBM (171) Apply IBM filter
- Jabra (9) Apply Jabra filter
- Logitech (56) Apply Logitech filter
- Lumen (3) Apply Lumen filter
- Masergy (50) Apply Masergy filter
- Microsoft (766) Apply Microsoft filter
- Mitel (232) Apply Mitel filter
- NEC (128) Apply NEC filter
- Nectar (58) Apply Nectar filter
- Polycom (95) Apply Polycom filter
- Ramp (37) Apply Ramp filter
- RingCentral (126) Apply RingCentral filter
- Sennheiser (18) Apply Sennheiser filter
- Slack (13) Apply Slack filter
- Tata Communications (59) Apply Tata Communications filter
- Unify (186) Apply Unify filter
- Vonage Business (80) Apply Vonage Business filter
- Yealink (8) Apply Yealink filter
- Zoom (20) Apply Zoom filter
- Acme Packet (24) Apply Acme Packet filter
- Allworx (2) Apply Allworx filter
- Arkadin (22) Apply Arkadin filter
- Aspect (34) Apply Aspect filter
- BT (25) Apply BT filter
- CaféX (8) Apply CaféX filter
- CallTower (14) Apply CallTower filter
- Clarity Connect (10) Apply Clarity Connect filter
- Continuant (1) Apply Continuant filter
- Damaka (4) Apply Damaka filter
- Dialogic (5) Apply Dialogic filter
- Dimension Data (44) Apply Dimension Data filter
- Empirix (11) Apply Empirix filter
- Enghouse Interactive (17) Apply Enghouse Interactive filter
- Inference Solutions (9) Apply Inference Solutions filter
- IntelePeer (27) Apply IntelePeer filter
- IR (11) Apply IR filter
- Jive (21) Apply Jive filter
- Kurmi Software (21) Apply Kurmi Software filter
- Lifesize (33) Apply Lifesize filter
- Lightware (3) Apply Lightware filter
- Mavenir (6) Apply Mavenir filter
- Modality Systems (8) Apply Modality Systems filter
- Momentum (36) Apply Momentum filter
- Netfortris (5) Apply Netfortris filter
- NetSapiens (6) Apply NetSapiens filter
- NewVoiceMedia (31) Apply NewVoiceMedia filter
- Nureva (26) Apply Nureva filter
- NUWAVE (5) Apply NUWAVE filter
- Orange (32) Apply Orange filter
- OVCC (8) Apply OVCC filter
- Panasonic (18) Apply Panasonic filter
- PanTerra Networks (9) Apply PanTerra Networks filter
- ScanSource (21) Apply ScanSource filter
- SIPPIO (3) Apply SIPPIO filter
- Snom (20) Apply Snom filter
- Star2Star (8) Apply Star2Star filter
- StarLeaf (12) Apply StarLeaf filter
- Tadiran Telecom (2) Apply Tadiran Telecom filter
- TekVizion (9) Apply TekVizion filter
- Unimax (7) Apply Unimax filter
- Verint (40) Apply Verint filter
- Voice4Net (2) Apply Voice4Net filter
- VOSS (85) Apply VOSS filter
- Voxbone (14) Apply Voxbone filter
- West (28) Apply West filter
- XO Communications (3) Apply XO Communications filter
- Yorktel (17) Apply Yorktel filter
- Zultys (2) Apply Zultys filter
- 3CX (8) Apply 3CX filter
- ADDASOUND (1) Apply ADDASOUND filter
- Aerohive (1) Apply Aerohive filter
- Aryaka (1) Apply Aryaka filter
- Asurion (22) Apply Asurion filter
- Avnet (7) Apply Avnet filter
- Bandwidth (5) Apply Bandwidth filter
- Calabrio (5) Apply Calabrio filter
- Consilium Software (13) Apply Consilium Software filter
- Drum (5) Apply Drum filter
- ESI (6) Apply ESI filter
- Esna (16) Apply Esna filter
- Exinda (2) Apply Exinda filter
- EZuce (3) Apply EZuce filter
- GUnify (6) Apply GUnify filter
- Highfive (4) Apply Highfive filter
- Huawei (47) Apply Huawei filter
- Imagicle (3) Apply Imagicle filter
- IPCortex (1) Apply IPCortex filter
- KnoahSoft (1) Apply KnoahSoft filter
- KOVA (1) Apply KOVA filter
- Logmein (9) Apply Logmein filter
- Metropolis Technologies (4) Apply Metropolis Technologies filter
- Mutare (2) Apply Mutare filter
- NextPlane (27) Apply NextPlane filter
- Ooma (16) Apply Ooma filter
- Patton (11) Apply Patton filter
- Radish Systems (1) Apply Radish Systems filter
- Radisys (3) Apply Radisys filter
- Shango (1) Apply Shango filter
- SMART (163) Apply SMART filter
- Stack8 (1) Apply Stack8 filter
- Swyx (1) Apply Swyx filter
- TrueConf (4) Apply TrueConf filter
- UJET (13) Apply UJET filter
- Voximplant (3) Apply Voximplant filter
CONTENT TYPE
- BC Expert Insights Market (42) Apply BC Expert Insights Market filter
- BC Expert Insights Objective - Vendor Neutral (42) Apply BC Expert Insights Objective - Vendor Neutral filter
- BC Expert Insights Planning (15) Apply BC Expert Insights Planning filter
- BC Expert Insights Solution (12) Apply BC Expert Insights Solution filter
- BC Expert Insights Vendor (80) Apply BC Expert Insights Vendor filter
- BC Expert Insights Vendor Solution (145) Apply BC Expert Insights Vendor Solution filter
- BC Expert Roundtable (133) Apply BC Expert Roundtable filter
- Bcs Webinar (0)
- Bcs Webinar Registration (0)
- Best Practice (38) Apply Best Practice filter
- Buyer Guide (14) Apply Buyer Guide filter
- Case Study (29) Apply Case Study filter
- Executive Interview (145) Apply Executive Interview filter
- Expert Roundtable (450) Apply Expert Roundtable filter
- Guest Contributions (34) Apply Guest Contributions filter
- Multimedia (38) Apply Multimedia filter
- News Analysis (2081) Apply News Analysis filter
- Newsfeed Article (1303) Apply Newsfeed Article filter
- Newsfeed Article (1) Apply Newsfeed Article filter
- Thought Leadership (21) Apply Thought Leadership filter
- Vendor Collateral (211) Apply Vendor Collateral filter
- Vendor Resource Best Practices (24) Apply Vendor Resource Best Practices filter
- Vendor Resource Buyers Guides (2) Apply Vendor Resource Buyers Guides filter
- Vendor Resource Multimedia Content (4) Apply Vendor Resource Multimedia Content filter
- Vendor Resource White Paper (4) Apply Vendor Resource White Paper filter
- Webinar (13) Apply Webinar filter
- Webinars (7) Apply Webinars filter
- White Paper (64) Apply White Paper filter
MORE FILTERS
INDUSTRY
- Banking And Investment (800) Apply Banking And Investment filter
- Education (446) Apply Education filter
- Energy And Utilities (487) Apply Energy And Utilities filter
- Finance (12) Apply Finance filter
- Government (675) Apply Government filter
- Healthcare (482) Apply Healthcare filter
- Hospitality (180) Apply Hospitality filter
- Insurance (100) Apply Insurance filter
- Manufacturing (704) Apply Manufacturing filter
- Media/Publishing (422) Apply Media/Publishing filter
- None (43) Apply None filter
- Professional Services (745) Apply Professional Services filter
- Retail & Distribution (798) Apply Retail & Distribution filter
- Technology (1611) Apply Technology filter
- Transportation (110) Apply Transportation filter
Comments
There are currently no comments on this article.
You must be a registered user to make comments