It's no secret that many companies rely heavily on consumer-generated data to inform many activities, from product development and strategic planning to targeted marketing campaigns. When the information is used effectively, however, it is the consumer who may ultimately benefit, as it can enable companies to enhance the customer experience and provide innovative products and services. But how willing are consumers to provide their information, and what concerns do they have about sharing and protecting it?
Have consumer privacy concerns changed over the last decade?
Data security remains a hot-button issue, with a variety of well-known and respected companies reporting that the data of more than 250 million of their consumers were stolen or compromised in 2014 alone. As connected products become more common, many industry observers expect consumer concerns over data security to rise further.
Given the ever-present threat that their information may fall into the wrong hands, it’s not surprising that 81 percent of our US respondents feel they have lost control over the way their personal data are collected and used. What is surprising, though, is that—across the world—this sense of losing control has actually returned to a level close to what it was in 1999 after spiking in 2014.
Across the board, consumers appear more willing to share data when they feel they get some value in return. Seventy-nine percent of our respondents agreed that they would be willing to share their data if there was a clear benefit for them. This means that companies should consider thinking about giving consumers a return on data. Whether it is something that entertains, informs, or rewards the consumer, companies should understand that many consumers may provide information in exchange for something that benefits them.
What can companies do to reassure consumers? Our study finds that while consumers state that they want more protection and security, the reality is that they may be more willing to provide their personal information if companies:
The bottom line: An important way companies can build and maintain consumer trust is to both put in place proactive data security and privacy measures and to engage in a transparent, ongoing dialogue with consumers on data privacy.
Malicious software, also known as malware is a term that can be used for various viruses, spyware, worms and programs that attack your device or computer. The goal of malware is to target and retrieve protected data, remove confidential documents or add software without user consent or knowledge. Software is identified as malware based on its intended use, rather than a particular technique or technology used to build it.
A computer virus is a malicious software which self-replicates and attaches itself to other files/programs. It has the capability of executing secretly when the host program/file is activated. The different types of Computer virus are Memory-Resident Virus, Program File Virus, Boot Sector Virus, Stealth Virus, Macro Virus, and Email Virus.
With the number of data breaches increasing every year, it’s not a question of if your business will suffer a breach, but when. The threat affects companies of all sizes and in every industry, including manufacturers.
In fact, manufacturers are one of the most susceptible to cyber threats. According to a Kaspersky Labs report, manufacturers’ computers accounted for about one-third of all attacks as sophisticated attackers are after intellectual property.
Businesses frequently enter into contracts with suppliers, vendors, independent contractors, landlord/tenants, and other service providers.
In those contracts it is common to find language which transfers the liability of one party to the other in the event that bodily injury, property damage (tangible and intangible) and other liabilities arise out of the contractual relationship. The liability may involve both insurable and non-insurable liabilities upon the contracting parties.
The contracting parties, and their supporting legal and risk advisors should review in detail the contractual language and what liabilities may be assumed due to the contract.
Contractual Risk Transfer is one of the five traditional risk management techniques within a business.
Injuries due to slips and falls are one of the most frequently reported workers’ compensation claims. While these accidents can happen anywhere, any time, they typically spike during the winter months. According to the U.S. Bureau of Labor Statistics, over 20,000 workplace injuries due to falls from snow, sleet, and ice occurred in 2016. Of those, 28 percent resulted in more than a month off of work.
Employees and visitors alike are at risk, but with a proactive safety plan, slips and falls can be prevented.
The Department of Labor (DOL) issued a final rule that increased the civil penalty amounts that may be imposed on employers under various federal laws. The DOL’s final rule implements the 2018 annual adjustments for civil penalties assessed or enforced by the DOL, including penalties under the FLSA, FMLA, OSHA, and ERISA. The increased penalty amounts became effective on January 2, 2018, and may apply for any violations occurring after November 2, 2015.
The calendar may record the first day of summer as June 21, but Mother Nature has a mind of her own. In the Midwest, we have already broken heat records. While that may be nice if you’re spending the day hanging out at the lake, it can be dangerous for those who work in hot temperatures.
Workplace injuries are a significant risk for any business, and they can lead to costly medical bills, lost productivity, and increased insurance premiums. There are numerous strategies employers can implement to reduce the number of injuries in their workplace.
Workplace injuries are a significant risk for any business, and they can lead to costly medical bills, lost productivity, and increased insurance premiums. There are numerous strategies employers can implement to reduce the number of injuries in their workplace. Consider the following ideas:
The Worker Protection Standard (WPS) was developed by the EPA to reduce the possibility of agricultural worker injuries should they come in contact with potentially hazardous pesticides.
Key components of the WPS include:
Training information concerning the WPS is available at http://pesticideresources.org//index.html