{"id":916,"date":"2019-01-20T15:47:37","date_gmt":"2019-01-20T20:47:37","guid":{"rendered":"https:\/\/www.amp.legal\/blog\/?p=916"},"modified":"2020-05-08T10:35:47","modified_gmt":"2020-05-08T14:35:47","slug":"data-privacy-builds-customer-trust","status":"publish","type":"post","link":"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/","title":{"rendered":"Data Privacy Builds Customer Trust"},"content":{"rendered":"<p>January 28 is <a href=\"https:\/\/staysafeonline.org\/data-privacy-day\/about\/\" target=\"_blank\" rel=\"noopener noreferrer\">Data Privacy Day<\/a>, which is a global effort to create awareness for securing data. This date commemorates the signing of <a href=\"https:\/\/www.coe.int\/en\/web\/data-protection\/convention108-and-protocol\" target=\"_blank\" rel=\"noopener noreferrer\">Convention 108<\/a> on Jan. 28, 1981 that created the first international data privacy treaty.<\/p>\n<p>According to the <a href=\"https:\/\/staysafeonline.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Cyber Security Alliance<\/a> (NCSA), most Americans feel that companies should be transparent about using personal data. To create trust, companies should inform their customers about what data they collect and how it\u2019s used with third parties.<\/p>\n<p>The NCSA offers a list of best practices for creating a culture of respecting privacy and safeguarding data in its guide,\u00a0<a href=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2019\/01\/PrivacyIsGoodForBusiness-2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Is Good For Business<\/a>. This guide highlights security fundamentals, which include:<\/p>\n<ul>\n<li><strong>If You Collect It, Protect It<\/strong> \u2013 Secure personal data by taking reasonable security measures.<\/li>\n<li><strong>Be Open &amp; Honest<\/strong> \u2013 Communicate data collection and sharing practices with customers\u00a0on how they can manage their privacy.<\/li>\n<li><strong>Educate Employees<\/strong> \u2013 Train employees to understand their role in protecting personal information.<\/li>\n<li><strong>Monitor Partners &amp; Vendors<\/strong> \u2013 Take responsibility for how third parties use and collect data.<\/li>\n<\/ul>\n<h3>Privacy vs. Security<\/h3>\n<p>In data management, the concepts of \u201c<a href=\"https:\/\/www.amp.legal\/data-privacy\/\" target=\"_blank\" rel=\"noopener noreferrer\">privacy<\/a>\u201d and \u201c<a href=\"https:\/\/www.amp.legal\/cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">security<\/a>\u201d have different meanings. \u201cPrivacy\u201d refers to managing \u201cauthorized\u201d access to data. Examples of data privacy include acceptable use policies and data sharing agreements. \u201cSecurity\u201d means preventing \u201cunauthorized access\u201d to company data. The goal of security is to protect the confidentiality, integrity, and availability of data from unauthorized individuals.<\/p>\n<p><a href=\"https:\/\/www.fbi.gov\/investigate\/cyber\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber crime<\/a> is a major threat to a customer&#8217;s privacy. A security breach threatens an individual\u2019s privacy when hackers steal and distribute a company\u2019s compromised data throughout the web. <a href=\"https:\/\/www.amp.legal\/blog\/millennials-await-crypto-revolution\/\">Cryptocurrency<\/a>, such as <a href=\"https:\/\/www.hoganinjury.com\/bitcoin-and-its-possible-impact-on-insurance\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bitcoin<\/a>, offers the ability to make payments that are private and secure. However, these payment methods give criminals a way to hide their crimes, such as a <a href=\"https:\/\/www.amp.legal\/blog\/ransomware-sparks-class-action\/\">ransomware<\/a> attack. A business can guard against cyber crimes with preventative measures, such as installing malware detection and making data backups.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>January 28 is Data Privacy Day, which is a global effort to create awareness for securing data. This date commemorates the signing of Convention 108 on Jan. 28, 1981 that created the first international data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":917,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[78],"tags":[31,44,79,76],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Privacy Builds Customer Trust - Cyber Law Blog<\/title>\n<meta name=\"description\" content=\"To create trust with customers, companies should inform their customers about what data they collect and how it\u2019s used with third parties.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Privacy Builds Customer Trust - Cyber Law Blog\" \/>\n<meta property=\"og:description\" content=\"To create trust with customers, companies should inform their customers about what data they collect and how it\u2019s used with third parties.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Law Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-20T20:47:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-08T14:35:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2019\/01\/Data-Tunnel.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/\"},\"author\":{\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\"},\"headline\":\"Data Privacy Builds Customer Trust\",\"datePublished\":\"2019-01-20T20:47:37+00:00\",\"dateModified\":\"2020-05-08T14:35:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/\"},\"wordCount\":313,\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"keywords\":[\"business\",\"cyber breach\",\"data privacy\",\"data sharing\"],\"articleSection\":[\"Data Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/\",\"name\":\"Data Privacy Builds Customer Trust - Cyber Law Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\"},\"datePublished\":\"2019-01-20T20:47:37+00:00\",\"dateModified\":\"2020-05-08T14:35:47+00:00\",\"description\":\"To create trust with customers, companies should inform their customers about what data they collect and how it\u2019s used with third parties.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.amp.legal\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Privacy Builds Customer Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"name\":\"Cyber Law Blog\",\"description\":\"Exploring technology law in cyberspace\",\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.amp.legal\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\",\"name\":\"Alice M. Porch, P.A.\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"contentUrl\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"width\":1104,\"height\":1114,\"caption\":\"Alice M. Porch, P.A.\"},\"image\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\",\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"caption\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\"},\"description\":\"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.\",\"sameAs\":[\"https:\/\/www.aliceporch.com\",\"https:\/\/www.linkedin.com\/in\/alice-m-porch\/\"],\"url\":\"https:\/\/www.amp.legal\/blog\/author\/amplegal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Privacy Builds Customer Trust - Cyber Law Blog","description":"To create trust with customers, companies should inform their customers about what data they collect and how it\u2019s used with third parties.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/","og_locale":"en_US","og_type":"article","og_title":"Data Privacy Builds Customer Trust - Cyber Law Blog","og_description":"To create trust with customers, companies should inform their customers about what data they collect and how it\u2019s used with third parties.","og_url":"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/","og_site_name":"Cyber Law Blog","article_published_time":"2019-01-20T20:47:37+00:00","article_modified_time":"2020-05-08T14:35:47+00:00","og_image":[{"width":900,"height":525,"url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2019\/01\/Data-Tunnel.png","type":"image\/png"}],"author":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/#article","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/"},"author":{"name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f"},"headline":"Data Privacy Builds Customer Trust","datePublished":"2019-01-20T20:47:37+00:00","dateModified":"2020-05-08T14:35:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/"},"wordCount":313,"publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"keywords":["business","cyber breach","data privacy","data sharing"],"articleSection":["Data Privacy"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/","url":"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/","name":"Data Privacy Builds Customer Trust - Cyber Law Blog","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/#website"},"datePublished":"2019-01-20T20:47:37+00:00","dateModified":"2020-05-08T14:35:47+00:00","description":"To create trust with customers, companies should inform their customers about what data they collect and how it\u2019s used with third parties.","breadcrumb":{"@id":"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.amp.legal\/blog\/data-privacy-builds-customer-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.amp.legal\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Privacy Builds Customer Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.amp.legal\/blog\/#website","url":"https:\/\/www.amp.legal\/blog\/","name":"Cyber Law Blog","description":"Exploring technology law in cyberspace","publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amp.legal\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.amp.legal\/blog\/#organization","name":"Alice M. Porch, P.A.","url":"https:\/\/www.amp.legal\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","contentUrl":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","width":1104,"height":1114,"caption":"Alice M. Porch, P.A."},"image":{"@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f","name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","caption":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+"},"description":"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.","sameAs":["https:\/\/www.aliceporch.com","https:\/\/www.linkedin.com\/in\/alice-m-porch\/"],"url":"https:\/\/www.amp.legal\/blog\/author\/amplegal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/916"}],"collection":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/comments?post=916"}],"version-history":[{"count":9,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/916\/revisions"}],"predecessor-version":[{"id":928,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/916\/revisions\/928"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media\/917"}],"wp:attachment":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media?parent=916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/categories?post=916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/tags?post=916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}