If you are visually impaired or blind, you can visit the PDF version by Pressing CONTROL + ALT + 4
<br /> Data Security Focus:<br /> Protecting client data<br /> In association with<br /> Protecting client data<br /> The recent hacking of the<br /> personal and financial details of<br /> 2.4 million Carphone Warehouse<br /> customers was a high profile<br /> reminder that we live in a world<br /> where so much of our personal information is held<br /> by organisations with which we trade – and just<br /> how vulnerable it can be to determined criminals.<br /> While relatively few breaches of data security have<br /> been recorded officially, it is thought that data loss<br /> occurs on a far more frequent basis than gets out<br /> into the public domain.<br /> Adviser firms may not be high profile like Carphone<br /> Warehouse but they do hold considerable<br /> amounts of information and personal details on<br /> their clients. This can be in the form of physical<br /> records, documents and electronically held data.<br /> All of which is vulnerable t<a title="Special Report Data Security page 1" href="http://viewer.zmags.com/publication/81619faa?page=1"> Data Security Focus: Protecting client data In as</a> <a title="Special Report Data Security page 2" href="http://viewer.zmags.com/publication/81619faa?page=2"> Protecting client data The recent hacking of </a> <a title="Special Report Data Security page 3" href="http://viewer.zmags.com/publication/81619faa?page=3"> Protecting client data In an age of data misuse </a> <a title="Special Report Data Security page 4" href="http://viewer.zmags.com/publication/81619faa?page=4"> measure the effectiveness of our security and emp</a> <a title="Special Report Data Security page 5" href="http://viewer.zmags.com/publication/81619faa?page=5"> Patrick Connolly, head of communications, Chase d</a> <a title="Special Report Data Security page 6" href="http://viewer.zmags.com/publication/81619faa?page=6"> “There were four key reasons we opted to go paper</a> <a title="Special Report Data Security page 7" href="http://viewer.zmags.com/publication/81619faa?page=7"> more sensible approach than contending with stora</a> <a title="Special Report Data Security page 8" href="http://viewer.zmags.com/publication/81619faa?page=8"> As such, access and permission rights to in</a> <a title="Special Report Data Security page 9" href="http://viewer.zmags.com/publication/81619faa?page=9"> TAKE AWAYS FROM THIS SPECIAL REPORT Tilney Bestin</a>