Safest Places On the Web
Computerworld - The security breaches at ChoicePoint Inc. and LexisNexis Group have us all asking the same questions: Where is my data safe? And how do I know? These are the questions I recently set out to answer, and I found some surprising results.
First, the bad news. There still isn't one widely recognized seal of approval that says a company has top-notch privacy and security. The padlock symbol on your Web browser means the session is encrypted, and Web security seals such as ScanAlert Inc.'s "Hacker Safe" mark say the Web site is protected against all known vulnerabilities. But these methods don't address the broader, organizational security practices at issue in the ChoicePoint and LexisNexis incidents.
So which companies meet this criterion? I reviewed the privacy policies of the top 50 most-visited Web sitesas measured by Jupiter Researchand the Forbes 100 largest companies in the world. It's an admittedly small sample, so I also asked Truste and my privacy professional counterparts in other organizations for their recommendations.
What did we find? This is where the surprises sprang up. (See accompanying charts.)
The largest U.S. companies are better than their European counterparts about including the European privacy principles in their online privacy notices. The EU considers the U.S. an "inadequate" destination for personal data, but you couldn't tell it by reading corporate privacy policies. Among the Forbes 100, U.S. companies comply with an average of 3.9 of the seven EU Safe Harbor principles, compared with 2.3 for EU companies.
Another surprise was the mediocre scores of the privacy policies on the most-visited U.S. Web sites. Visitors to these popular sites apparently aren't deterred by their general lack of strong privacy commitments. The typical top-50 site posts a privacy notice that addresses only 4.4 of the EU Safe Harbor principles.
I wasn't surprised that the companies with the strongest privacy policies are concentrated in the financial and technology industries, where profits depend on consumer trust in data privacy. Seventeen of the top 20 sites hail from these sectors.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have. All Privacy White Papers | Webcasts