Clearwater, FL - Customers expect that every business — large or small — that collects their sensitive personal information will protect it. Beyond customer expectations, there are legal requirements, as well. Depending on your type of business and the states in which your customers reside, you may be legally required to protect the personal information you collect. Better Business Bureau is reminding businesses to safeguard the privacy of their customers.
“Customer's need to trust that their personal information is safe with your business before they can trust doing business with you," states Karen Nalven, President of BBB serving West Florida. “Special attention must be paid to Protecting your customer’s personal data against mishandling." When looking to secure your customers’ private data, BBB recommends the following:
Determine what makes sense for your type of business. This will be based on the type of data that you collect and store, and the kind of resources you have managing that data. If your small business keeps information about customers in several formats (e.g., on paper, on computers, and online), you should sit down with a team of your employees — an IT person, office manager, etc. — and discuss these issues together to make sure you consider all viewpoints.
Inventory your data. Inventory the type of data you collect, store and/or transmit. Inventory how you store your data. Inventory where you store your data for each type and format of customer information. Inventory how data is moved and who has access to it. Take into consideration your type of business, and the stationary and portable tools your employees use to do their jobs. This is a very important part of the inventory process, as it will help you begin to identify the potential ways that sensitive data could be inadvertently disclosed. If you think you need outside help to identify potential leak points, consider consulting with a data forensics team or the bank or processor that provides your merchant account services. Inventory the data controls you have in place…or not.
Evaluate costs vs. benefits of different security methods. Brainstorm different types of security procedures and think about whether they make sense for the type of information you maintain, the format in which it is maintained, the likelihood that someone might try to obtain the information, and the harm that would result if the information was improperly obtained.
Write it down. Type up the checklists you’ve just created, the security measures you are taking, and an explanation on why these security measures make sense. Congratulations — you've just created the foundation of your written security policy!