LINQ for Data Privacy

The global average cost of a data breach in 2017 is $3.62 million*

This figure is made up of the unexpected and unplanned churn of customers, the time it takes to identify and contain the records involved and the cost of post-breach activities to prevent further losses.

Industries are financially impacted in different ways. The cost per record ranges from $380 in the Healthcare sector, to $71 in the Public sector with the global average at $141.

*Source: Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview

In addition to the internal financial impact, as new data protection laws are established (General Data Protection Regulation (GDPR) across Europe in May 2018), the threat of fines where inappropriate action has been taken to prevent data breaches must also be taken into consideration.

Most organisations cannot answer these basic questions about the Personally Identifiable Information (PII) of their customers and prospects;

  • What personal data do I have?
  • Where it is within my organisation?
  • Who has access to it?
  • Why do we have it; what was the purpose for which it was collected?
  • How long we have held it for? How and when do we dispose of it?
  • Who provided the permission for us to capture it and store it?
  • What is the risk to the business if it was to be accessed inappropriately?
Finding PII

Given the financial threat and the opportunity for a data breach to impact your organisation to the point of failure, establishing good documentation about your PII is essential. It doesn’t need to be a scary or arduous task and should be seen as an opportunity to ensure your businesses ongoing success.

LINQ provides a robust methodology and platform enabling you to gain the knowledge needed to manage your data risk


Phase 1

Identify where to look first

Prioritise data audit based on business value


Phase 3

Understand what information is held

Connect people to consent to process to system to outcome


Phase 2

Enable the Impact Assessment

PII in data delivering business outcomes is high priority


Phase 4

Build a strategy for continued data privacy protection

Planning, Strategy, Tactics and Implementation in response to changing needs

If you’re ready to get on top of your Data & Information Security challenge, please get in touch; we’re set to help you.

LINQ can be applied to your personal data and information challenge immediately. Our system enables you to model data and information flow by capturing the relationships between actions, information, systems, and people.

Through pivots and dashboards, you’ll have clear access to insights about how your business information flows:


Risk Management

Enabling your information risk management strategy

Level of Compliance

Providing certainty of your level of compliance throughout your entire business

Faster Capture Time

Reducing your data & information flow capture time by 60%

Quickly Answer Data Questions

Increasing the speed of answering your data questions by 70%

Lower Data Loss Impact

Reducing your risk of incurring significant cost by enabling your data and information management

Higher Time Value

Increasing the value of the time you spend gaining knowledge about your data

If you’re ready to get on top of your Data & Information Security challenge, please get in touch; we’re set to help you.

Background to Data Privacy

Data and Information Privacy is a topic affecting any organisation in the world that collects, stores and processes data about its customers. The laws associated with Data Privacy such as The Data Protection Act in the UK, the General Data Protection Regulation across the European Union or the Privacy Act in New Zealand and Australia represent more than 100 countries around the world with such regulation.

The common theme is the protection of the rights of the individual who provided consent for you to have that information for a specific purpose.

As information needs have grown, and the digital economy demands more and more data from our customers to support our business processes, many organisations have been unable to keep up with the audit trail of their information pertaining to customers. Personally Identifiable Information is highly valuable data and is susceptible to being taken illegally through internal and external security breaches.