1 3M Privacy Filters Justification Toolkit: How to Use The following presentation is meant to provide you with the most impactful data points to help you.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

© Outsource Professional Services - All rights reserved Discussion Document 2012 Confidential PowerPoint Design Services for Management Consultants,
Travelers CyberRisk for Insurance Companies
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
PCI Compliance Roundtable Update Presented by the PCI Compliance Task Force.
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
REAL TOOLS FOR REAL AGENTS
Telluride Gives Training for Nonprofits Part II of II: Getting the Most Out of Razoo.
Business-class messaging from [PROVIDER NAME] Business-Class Messaging built on Microsoft Exchange [PRODUCT NAME] A Business-Class Messaging Solution from.
Third Annual Shopping on the Job: ISACA’s Online Holiday Shopping and Workplace Internet Safety Survey Commissioned by ISACA ( November 2010.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Windows 7 & Office 2010 Glenn Osako Partner Territory Manager West Region SMB Microsoft Corporation Best productivity on a modern foundation.
SHARESYNCPage 1 of 2 ShareSync is a business-grade file sync and share service Sync files across devices Share files and folders easily and securely Business-grade.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
FIRST LOOK.
Should Suppliers be Qualified in Advance to Upload their Inventory Files to a Search Engine? All Rights Reserved 2008.
Richard Jordan, President OPM Winter Meeting 12/4/2012 How To Create A Paperless Office (without breaking the bank)
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
HOME-BASED AGENTS Welcome to Unit 7. Review of unit reading material from textbook: Travel Career Development 8 th ed. Authors: Gagnon,P. & Houser, S.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
AUGUST 25, 2015 Cyber Insurance:
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Enterprise Content Management Identifying and Addressing New Areas of Cost Reduction How to use this PowerPoint template: 1.Insert these slides onto your.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Information Assurance Market Research June Executive Summary Small response rate (n=43) General low awareness of information security controls and.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
COMP1321 Networks in Organisations Richard Henson March 2014.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Communication Methods
Are you really protected against all Risk and liabilities? Are you sure that your Security Company have: Liability Insurance covering up to $ 2, ?
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
SIMPLE TEMPLATE ---- developed for kids ---- SIMPLE TEMPLATE ---- developed for kids ---- James Sager, Morgan Sager September 2016 James Sager, Morgan.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
Total Enterprise Mobility Comprehensive Management and Security
 Many people like the flexibility of digital images. For example:  They can be shared by attaching to /uploading to Internet  Sent via mobiles.
For more course tutorials visit
For More Best A+ Tutorials CMGT 400 Entire Courses (UOP Course) CMGT 400 Week 1 DQ 1 (UOP Course)  CMGT 400 Week 1 Individual Assignments.
Combating Identity Fraud In A Virtual World
Savings Cents make Euros © Annie Patton Next Slide.
Build an Enterprise IT Security Training Program
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Wallpaper only – on screen during welcome and chat
Encrypted from CDS Office Technologies
WEL-COME Norton Internet Security Service Number Norton Internet Security Service Number
Credit Cards: More Than Plastic
Module 3 Selling Security
THIS IS A TIPS & TRICKS SLIDE FOR YOU
Do you know what you own? -Intro -
Ethical, Legal, Cultural and Environmental Concerns
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
BTEC level 3 Learning Aim D.
Figuring out CyberSecurity Return On Investment
Leading financial services provider
The photo app every contractor & supplier needs
Presentation transcript:

1 3M Privacy Filters Justification Toolkit: How to Use The following presentation is meant to provide you with the most impactful data points to help you explain the value of a 3M Privacy Filter for your device. To get started: Review and customize the slides to tell your story of why you need to invest in a 3M Privacy Filter for your device and how it will benefit you and the company. Feel free to include personal stories or anecdotes about information you must keep secure while working on it outside the office. Include any personal experiences you may have had when a lack of privacy and how it has impacted your work. The most important items you need to customize are noted in [red] throughout the presentation Prepare to present This presentation can be shared in person, but may also be sent via to the proper point person in charge of authorizing enterprise expenses The presentation references a number of studies that offer helpful insights into the state of data breaches and the issues of visual privacy. We encourage you to review the studies for additional information before presenting: 3M’s Visual Privacy Productivity StudyVisual Privacy Productivity Study Verizon’s 2013 Data Breach Investigations Report2013 Data Breach Investigations Report Symantec’s 2013 Cost of Data Breach Study2013 Cost of Data Breach Study

2 I regularly manage confidential and sensitive data and often need to access it in non-secure locations. A privacy filter will allow me to stay compliant with standard industry privacy and security rules and better protect the company. [Highlight additional needs if applicable] [If you think your entire team needs a privacy filter, update the slide with information on intellectual property they frequently access in and outside the office to start to build the case for team-wide privacy protection] Why a 3M Privacy Filter?

3 Product: ― 3M Privacy Filter for [insert device type] e.g. Lenovo Thinkpad Figure out your correct screen size heresize here Enterprise Expense: ― [$xx] – cost, plus shipping and handling [Do you manage an entire team that you think could benefit from 3M Privacy Filters? Edit the slide to reflect the total expense] Expense Description

4 Visual privacy protects sensitive and confidential info displayed on screen. More than half of people surveyed in a recent study said their visual privacy had been violated. The importance of visual privacy KEY FACT: In 2011, the organizational cost of a data breach was $5.4 million.* *Data Breach Study, Ponemon Institute, % at work 55% on plane, train or bus 51% in public

5 78 percent of breaches reported were categorized as “low” or “very low” tech threats 1 ― Low: basic methods, little or no customization or resources required ― Very low: the average person could have done it 35 percent of data breaches can be attributed to physical methods 2, such as snooping 56 percent of Americans adults are equipped with a smartphone 3 that has the capability of taking high resolution photos of data displayed on-screen Consider including story or anecdote of a time you were traveling and saw important information on another person’s screen A 3M Privacy Filter is one easy and cost- effective measure that can help me mitigate the risk of a low-tech data breach, potentially saving the company from an unnecessary loss. 3M Privacy Filters Can Help Protect Data Against the Rise of Low-Tech Data Breaches Image taken with an Apple™ iPhone4 Computer Screen Visibility on Camera Phone 1 & 2 Verizon 2013 Data Breach Investigations Report, Data Breach Investigations Report 3 Pew Internet: Mobile Technology Report, 2013Mobile Technology Report

6 In a recent study commissioned by 3M, the Ponemon Institute found that employees are up to two times more productive 1 when they feel their visual privacy is protected. Many employees are wisely choosing to stop working in order to protect the data at hand when privacy is threatened This loss in productivity is costing organizations $543 per employee per year ― Potentially costing companies up to $1 million per year Consider including story or anecdote of a time you stopped working when you felt unsure of your work environment Travel a lot? Include the number of hours a month you are on the road accessing important client or corporate information to highlight your need for a 3M Privacy Filter A 3M Privacy Filter would allow me to meet my deadlines while working remotely, without putting the company at risk of a data leak. 3M Privacy Filters Have Been Found to Affect Productivity of Mobile Workers 1 3M Visual Privacy Productivity Study, 2013Visual Privacy Productivity Study

7 Thank you for considering investing in a 3M Privacy Filter and reviewing the benefits it can bring to me and the company.