Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Most Organizations Not Ready For New Privacy Regulations

SEC0719-Privacy-Feat-slide1_900px
September 17, 2019

An Internet Society report finds that most organizations do not comply with existing global privacy regulations and are not ready for additional regulations going into effect in 2020.

The report,  “Are Organizations Ready for New Privacy Regulations?” by the Online Trust Alliance (OTA) analyzed 29 variables in 1,200 privacy statements against common themes in three major privacy regulations: the European Union’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA).

The report revealed that many organizations’ privacy statements fail to meet common privacy principles outlined in GDPR, CCPA, PIPEDA, including the user’s right to request information, to understand how their data is being shared with third parties and the ability of that information to be deleted upon request. Organizations also have a duty to notify users of their rights in an easily understandable matter.

While the organizations audited were mainly US-based and do not yet have a legal obligation to meet all requirements, these regulations represent general benchmarks for consumer privacy and set the stage for new laws going into effect in 2020, including the California Consumer Privacy Act (CCPA).

The audit analyzed organizations across the following areas:

Data Handling

  • The majority (98%) of privacy statements had some language about data sharing with two-thirds (67%) stating that they do not share data with third parties. However, less than 1% of organizations had language stating which types of third parties could access user data.
  • While not yet a requirement in the US, none of the organizations audited had any language regarding users being notified if their information was sold or shared.
  • A vast number of major cyber incidents include some type of failure on the part of a third party. Many privacy regulations are now requiring that any third parties the organizations work with are held to the same data sharing standards they hold themselves to. Only 57% of organizations currently say they hold third parties to this standard.
  • Many privacy regulations highlight data retention as an important concept, as many unauthorized data releases occur when an attacker accesses stored information that the company did not need to keep. Only 2% of organizations had explicit language about data retention.

User Access to Data

  • When CCPA goes into effect in January 2020, organizations will need to explicitly state how users can access their data and potentially request it to be deleted. Currently, hardly any organizations explicitly outline how to get in touch for this purpose.

Statements are Understandable and Effective Date is Clear

  • Privacy statements must be easy to find and must be simple for users to understand. One component of this is offering privacy statements in multiple languages, which only 3.5% of the organizations analyzed did.
  • For the first time in 2019 OTA tracked the concept of “readability” directly. OTA analysts scored each statement and 32% of organizations had “readable” statements based on OTA standards. Privacy regulations around the world all have readability requirements, though they differ in how they define this. Regardless, organizations must understand these standards and ensure that their statements fit them, which most do not according to OTA.
  • In addition to being readable, privacy statements should also include date stamps so users can see the effective date of the statement. Overall, 70% of organizations had the stamp somewhere on the page, 46% at the top, 22% at the bottom and 2% in both locations.

“Privacy regulations around the world are evolving and compliance will soon be a requirement, not a choice,” said Kenneth Olmstead, Internet Security and Privacy Analyst at the Internet Society’s Online Trust Alliance. “Within the U.S. alone, multiple states have privacy laws in motion. It’s in the best interest of all organizations to keep up-to-date on these laws as the requirements change. Protecting customer’s data will not only be an essential component of fostering loyalty and trust, but will also become necessary to avoid heavy fines.”

OTA will host a public webinar to discuss the findings on Thursday, September 26 at 1pm EDT/5PM UTC. See https://www.internetsociety.org/privacystatements for more information.

 

KEYWORDS: CCPA GDPR PIPEDA regulations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0719-Privacy-slide4_900px

    Most Organizations Not Ready for New Privacy Regulations

    See More
  • cyber6-900px.jpg

    Report Says Organizations Are Not Ready for Global Security Risks and Regulations

    See More
  • Privacy

    Research Reveals 70% of Privacy Professionals Agree Their Systems Will Not Support New Privacy Regulations

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing