SHARE
Facebook X Pinterest WhatsApp

Who Will Be Held Responsible for Personal Info Breaches

Pay attention to polls like the one that HyTrust announced today if you are still wondering how your customers would react if your company were to suffer a breach of personal information. Most coverage of breaches describes the event and the missteps or malfeasance that led up to it. What really happens after that can […]

Written By
thumbnail
Kachina Shaw
Kachina Shaw
Oct 1, 2014

Pay attention to polls like the one that HyTrust announced today if you are still wondering how your customers would react if your company were to suffer a breach of personal information. Most coverage of breaches describes the event and the missteps or malfeasance that led up to it. What really happens after that can be harder to discern, since most involved parties won’t or can’t discuss it.

HyTrust’s snap poll of 2,000 consumers found that people, not surprisingly, are aware of recent high-profile breaches, and are prepared to change their behavior if they are affected by one.

Plenty of blame will go around the company after a breach. When asked, “Who do you think should pay the price and be held ‘ultimately accountable’ for negligence involved in a data breach (e.g., where unprotected customer information is stolen)?” nearly 20 percent answered, “all officers of the company.” The board of directors seems to receive the least blame, at 9 percent.

HyTrust Data 

And one answer was overwhelmingly popular when customers were asked, “At what point should a vendor you do business with – bank, retail outlet, Internet Service Provider – be considered criminally negligent when your digital information is breached?”

Over 45 percent said “the moment it happens.”

 HyTrust Data


And finally, keep in mind that demographics make a difference: Fifty-one percent of respondents will take their business elsewhere after a data breach; in the 35-44 age bracket, over 60 percent say the same. Whether those types of differences help or hurt your company in the event of a breach could be key.

Kachina Shaw is managing editor for IT Business Edge and has been writing and editing about IT and the business for 15 years. She writes about IT careers, management, technology trends and managing risk. Follow Kachina on Twitter @Kachina and on Google+

 

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.