Three Ways To Prepare For The IT Impact Of New Privacy Laws - InformationWeek
IoT
IoT
Infrastructure
Commentary
4/27/2005
11:19 AM
Commentary
Commentary
Commentary
50%
50%

Three Ways To Prepare For The IT Impact Of New Privacy Laws

In the wake of numerous high-profile customer-data breaches, companies that haven't previously been subject to information security and privacy regulation should expect new regulations to mirror elements from existing laws. For businesses that want to start planning now, there's no need to wait for implementation instructions on how to secure consumer data.

As new privacy legislation looms, IT leaders may be better equipped than they realize to meet the challenge. How about the rest of the company?

Many U.S. companies almost certainly face new regulation in the wake of recent privacy breaches--ChoicePoint, Polo Ralph Lauren, and LexisNexis, among others. Pending federal and state legislative proposals demand that companies tighten security around consumers' personal data and notify consumers of privacy breach incidents.

Already, companies must notify California residents of privacy breaches, and federally regulated financial institutions are required to implement customer notification programs "as soon as possible."

Meeting these compliance challenges requires new levels of coordination and accountability across the enterprise. Companies with substantial consumer-data assets that haven't yet implemented privacy-incident response-and-notification programs should start now.

How can a company plan for laws that don't yet exist? Here are three steps a company can take to prepare for what lies ahead.

Previous
1 of 4
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll