{"id":1653,"date":"2006-04-27T00:00:00","date_gmt":"2006-04-27T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/27\/despite-stricter-rules-in-europe-us-companies-more-advanced-in-protecting-data\/"},"modified":"2021-12-30T11:39:45","modified_gmt":"2021-12-30T11:39:45","slug":"despite-stricter-rules-in-europe-us-companies-more-advanced-in-protecting-data","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/27\/despite-stricter-rules-in-europe-us-companies-more-advanced-in-protecting-data\/","title":{"rendered":"Despite Stricter Rules in Europe, US Companies More Advanced in Protecting Data"},"content":{"rendered":"<p>A new study comparing European and US corporate privacy practices reveals that while European companies impose tighter restrictions on the sharing of sensitive personal data, US companies currently have more sophisticated systems in place to prevent breaches.  The study, sponsored by global law firm White &#038; Case as part of its annual Global Privacy Symposium, held Thursday, April 27 in New York, was conducted by the independent privacy think tank Ponemon Institute.  The survey questions were reviewed by two European data protection authorities, The Information Commissioner&#8217;s Office of the UK and The Commission Nationale de l&#8217;Informatique et des Libertes (CNIL) in France.  &#8220;European companies are much more likely to have privacy practices that restrict or limit the sharing of customer or employees&#8217; sensitive personal information and are also more likely to provide employees with choice or consent on how information is used or shared,&#8221; said David Bender, head of White &#038; Case&#8217;s Global Privacy practice.  &#8220;But the research also revealed that US companies are engaging in more security and control-oriented compliance activities than their European counterparts.  Bender adds that ongoing concern about compliance with government rules is the lead driver for both US and European companies&#8217; privacy practices.  But 50 percent of European and 24 percent of US privacy leaders now believe that strong privacy policies also are an important part of protecting or enhancing their company&#8217;s brand or image in the marketplace.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;The study further shows that European corporate privacy leaders are more likely to hold the view that their role is inextricably tied to advancing a culture of responsible information use rather than establishing technical or administrative controls over privacy and data protection,&#8221; said Larry Ponemon, founder of the Ponemon Institute, who led the research team.  Most European companies have a strict &#8220;no share&#8221; policy for consumer and employee data.<\/p>\n<p>US companies are more likely to employ information security technologies to protect or safeguard sensitive personal information than European firms, including the use of encryption, intrusion detection systems and website monitoring.<\/p>\n<p>Whether in established or emerging markets, the hallmark of White &#038; Case is our complete dedication to the business priorities and legal needs of our clients.<\/p>\n<p>http:\/\/www.whitecase.com\/news\/Detail.aspx?news=1091<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1653","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1653"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1653\/revisions"}],"predecessor-version":[{"id":4140,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1653\/revisions\/4140"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}