Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Data privacy in 2022: Four recommendations for businesses and consumers

By Stu Sjouwerman
data-privacy-freepik1170x6.jpg

Image via Freepik

March 22, 2022

Data privacy is considered one of the decade’s most important issues. Incidents surrounding data privacy have taken center stage, what with Amazon being fined a record $887 million and WhatsApp reportedly losing millions of customers due to issues stemming from consumer privacy. 2022 won’t be any different. 


Consumers, owing to their ongoing patronage, are increasingly entrusting businesses with their private data. With data breaches reaching new highs every year, this is raising questions around the liability and accountability of businesses that collect, process and hold sensitive data.


The need to develop new products as well as to personalize the user experience and create targeted marketing campaigns are increasingly driving businesses to collect location tracking, usage metrics and other forms of Personally Identifiable Information (PII).


The proliferation of the Internet of Things (IoT), biometric devices and artificial intelligence in our daily lives (smart-home tech, wearables, intelligent cars, etc.) is creating an explosion of data collection points, putting consumer privacy at even greater risk.


Since the internet is borderless, there is growing concern from governments around illegal cross-border data transfers and localization of data. 


In addition to the above, a number of countries and U.S. states, including Colorado and Virginia, are expected to roll out their own data privacy laws and these will no doubt lead to more discussions surrounding the privacy of individuals. What’s needed is a national data privacy roll-out, instead of a patchwork quilt of varying state-to-state policies that will only deter interstate commerce, stifle innovation and add unnecessary complexity and confusion.


Businesses Need To Be More Responsible


There isn’t a silver bullet to consumer data privacy; different organizations are at different stages of privacy maturity. Privacy is an evolutionary process that matures with time, effort, experience and changes in the industry and the regulatory environment. Four recommendations below can serve as guidance for organizations looking to advance their data privacy program maturity. 


1) Involve All Functions And Departments


Data protection concerns every department (HR, marketing, sales, product development, operations), and each one tends to process data differently. Every department will have a different collection point and a number of third-party vendors they deal with. Ensure your program takes into account every department, every process and every vendor.


2) Document Your Practices


Documentation helps put things in perspective and provides an accurate and granular insight into organizational practices and key areas of risk. Map out your entire data lifecycle (using data flow diagrams) and the process each department uses to collect, store, access, use and share consumer data. Outline the organization’s legal and contractual obligations and the process with which end users can manage their privacy rights.


3) Go Beyond Compliance


Due to legal and compliance obligations, organizations can make a common mistake on their data privacy journey because they see it as a checklist of items that need to be crossed. Businesses should instead see privacy as a consumer’s fundamental right and view compliance practices as a step along the way, not as the ultimate destination.


4) Assess Your Privacy Posture Repeatedly


As organizations evolve, their departments, processes, products and vendors should evolve with it. It’s recommended that organizations carry out a Data Protection Impact Assessment (DPIA) on a regular basis to help identify risks proactively and reduce the likelihood of any impact to the organization or its customers. 


Consumers Need To Be More Responsible Too


The internet belongs to everyone, and as consumers, we too have a responsibility of practicing safer privacy hygiene. Here are four best practices for consumers to know:


  • Assess Social Media Settings Regularly: Linkedin, Twitter, Facebook, TikTok, Reddit, Quora and other social media platforms routinely gather data about your interests and activity on their platforms and can publish it without your explicit consent. Ensure to review your privacy settings at regular intervals to check whether your settings are where you want them to be. Only share information that you’re comfortable with living online permanently.  


  • Review Browser Privacy Settings: Some browsers offer better control over privacy than others, such as the Global Privacy Control (GPC) functionality that consumers can turn on to opt-out of having their personal data sold by the websites they visit. Consumers can also choose to disable third-party cookies in their browser. This may only limit online exposure to an extent but know that the technology is already on the verge of being replaced. 


  • Opt-out Of Third-Party Advertisements: By visiting Network Advertising, consumers can freely opt out of a range of third-party, interest-based advertisements and tracking. 


  • Use A Password Manager: At least 65% of consumers reuse their passwords across websites, devices and applications. It’s time consumers move on to third-party password managers (not those native to browsers), which offer a safe, easy and convenient way of storing and auto-generating strong passwords and reducing privacy risk in the event of a breach or data leak.


As regulations evolve and internet access becomes as ubiquitous as electricity, data privacy will be at the forefront of every online interaction. As individuals and businesses, we must exercise our choices carefully and stay vigilant so that we can protect our data and control the misuse of personal information. 

KEYWORDS: compliance cyber security data privacy Internet of Things (IoT) risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

New stu sjouwerman ceo knowbe4

Stu Sjouwerman is founder and CEO of KnowBe4, developer of security awareness training and simulated phishing platforms. He was co-founder of Sunbelt Software, the anti-malware software company acquired in 2010. He is the author of four books, including “Cyberheist: The Biggest Financial Threat Facing American Businesses.” He can be reached at ssjouwerman@knowbe4.com.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-password-freepik1170x658v4.jpg

    Four ways cybercriminals can hack passwords

    See More
  • phishing-freepik1170x658v4.jpg

    5 tips for building a positive anti-phishing behavior management program

    See More
  • cyber-theft-freepik1170x658.jpg

    Initial access brokers: The new face of organized cybercrime

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367667887.jpg

    Surveillance, Privacy and Security

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing