Professional Documents
Culture Documents
Infosec
Value Privacy
Privacy and information security policy overlap and are
also separate, as in a Venn diagram or like links in a chain.
These are the questions the IAPP and TRUSTe set out to
explore in a recent survey of 550 privacy, IT, and
information security professionals.
30
40
50
60
70
80
90
87
100
92
85
84
78
89
75
88
72
84
50
64
61
IT / INFOSECURITY
PRIVACY
60
70
80
75
Data inventory/mapping
90
100
80
74
75
Privacy policies
70
69
77
72
65
77
Spend on information security-related technology
64
77
DATA retention policies
64
69
Employee monitoring
52
56
Spend on privacy-related technology
48
61
IT / INFOSECURITY
PRIVACY
Disciplines representation
PRIVACY INFOSEC
NO
IT
Information Technology
42%
76%
Information Security
52%
71%
Legal
95%
43%
26%
46%
33%
92%
51%
57%
Human Resources
82%
40%
34%
Physical Security
42%
73%
53%
Records Management
71%
49%
41%
Finance / Accounting
52%
54%
50%
Procurement
44%
55%
57%
Marketing/ PR
67%
37%
47%
Government Affairs
78%
29%
31%
Privacy
%
66
61
53
50
49
42
42
41
40
39
34
26
Yes: 39%
No: 53%
Dont Know: 8%
Yes: 14.5%
No: 75.5%
75%
67%
60%
68%
58%
70%
57%
49%
53%
64%
49%
52%
43%
55%
31%
30%
>
Data inventory/mapping
-6%
-8%
>
62%
+8%
+12%
-8%
>
68%
+11%
>
-9%
+3%
>
70%
+12%
>
79%
>
Data minimization
+7%
>
88%
>
81%
>
>
-1%