CUSTOMER INFORMATION: PRIVACY, PLEASE!

1Rummaging through the company trash for a discarded password can breach the most sophisticated security systems. Banks sometimes find customers' ATM cards with the "PIN code written on the card itself. How often have you overheard a supposedly "confidential" conversation by someone shouting into their cell phone in public?

Have you ever considered how much of your customers' private information might be left lying around the office? Employees, cleaning crews, other customers, and repair people can easily walk by an absent employee's desk and see confidential information scattered about or left on the computer screen. While you're spending thousands of dollars on software barriers to protect files against hackers, those same files could be sitting open in your office for all to see. Don't overlook the most obvious and massive security breach in any business - human error.

Walk through your office after hours or while employees are at lunch to see how much information is left accessible. Sit in the middle of the office or at the next booth or table at lunch and listen for how much of your employee's conversations (and possible confidential customer information) you can overhear.

Then decide what you can do to minimize this risk. For starters, make sure that desktops are clear at night; add password-protected screen savers to your computers (and change the passwords often); and remind employees to be sensitive about what they reveal in public conversations.

It's far better to clean up this problem now than to have it clean you out later.

If you'd like our risk management professionals to review your information privacy protection plan, just give us a call.

Need insurance for You, Your Family or Your Business?
We can match you to a qualified, local insurance expert!
Further Reading
Your customers entrust their personal data to you and your company. Your employees may easily share information, though, particularly if you operate an open office with little privacy. Protect your customers’ information and identities when you follo...
The majority of job applications today are completed online. It's easy to simply enter your information, upload your resume and hit send. What happens to your personal information, though? If someone accesses your full name, social security number, a...
Building information modeling (BIM) software provides a digital three-dimensional, real-time tool that contractors, building owners, architects, and engineers can use to develop an overall view of a building throughout the design and construction pro...
Top managers are more likely than rank-and-file workers to put their companies at risk for data breaches and theft of intellectual property, according to a recent nationwide study. "On the Pulse: Information Security Risk in American Business" a su...
According to research from the Employee Benefit Research Institute (EBRI), a non-profit organization that conducts research and assembles and disseminates information related to employee benefits, those most likely to seek information on American hea...