Feeds

Gambling companies must be extra careful with personal data

Protect punters' info while palming their cash

Build a business case: developing custom apps

Opinion Companies have to protect the personal data they collect in proportion to its sensitivity, and gambling companies must be particularly attentive to information security.

The data that gambling companies collect is particularly sensitive, meaning a data breach could have a serious adverse impact on their reputation and ultimately on their entire business.

Gambling operators who fail to take data protection seriously or fail to invest in robust data security measures could find several sets of regulators beating a path to their door. Worse, customers will flee and share prices will plummet. If you doubt that, just ask any senior Sony executive.

The company's PlayStation network was hacked and 77 million records were taken. It is one of the biggest data protection breaches ever and has affected the credibility of the organisation; the trust users are likely to place in it in future; and, ultimately, its share price. Sony has recently estimated the cost of the hacking and data breaches at a staggering $170m.

Gambling companies hold even more personal data than Sony would have. As well as names, addresses, passwords and account details, gambling companies hold details of payments and bank accounts and information about a person's gambling history.

Any company which allowed this personal data to be exposed to the world would struggle to regain users' trust. So even before a single regulator or law enforcement agency gets involved a company would be in major trouble. Add the Information Commissioner's Office (ICO), the Gambling Commission and lawyers acting for individuals intent on pursuing civil actions, and you have on your hands a serious threat to a whole company.

How companies can protect themselves

So what can companies do to avoid this scenario? The first and most obvious thing to do is to protect all the personal data you collect. Invest in secure systems; ensure your processes are sound; make sure security requirements and restrictions extend to any sub-contractors and anyone else with access to the data.

It is not just companies using portable media which are at risk: operators who are online are vulnerable to attacks including hacking and denial of service attacks. The Data Protection Act 1998 (DPA) requires that the measures put in place must be relative to the sensitivity of the personal data in question and the harm that could be caused by a security breach, taking into account cost and the technology available. You don't have to establish a research and development department to design unhackable code, but you do need comprehensively to consider the risks for your business and to implement appropriate security measures proactively.

Make sure all your staff are trained and have the level of data protection expertise appropriate to their role. Update their training so that they know exactly what is expected of them.

But if there is a leak, you can still take steps to limit the damage. As part of setting up of your data protection systems, create a plan that can be implemented as soon as a breach is found.

This should involve prompt notification to customers and regulators as well as mobilising the team that will be responsible for managing the breach. Quickly put in place support plans for customers, including compensation if necessary.

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Microsoft exits climate denier lobby group
ALEC will have to do without Redmond, it seems
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.