Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Business > Data Privacy: A Necessary Pillar for M&A Success
    Business

    Data Privacy: A Necessary Pillar for M&A Success

    Data Privacy: A Necessary Pillar for M&A Success

    Published by maria gbaf

    Posted on January 25, 2022

    Featured image for article about Business

    By Gaurav Bhandari, AVP and Head of Data & Analytics Consulting at Infosys

    Last year wasn’t bad for M&A deals. Given the pandemic was in full swing, the value of transactions fell by only 5% from 2019, with a whopping $3.6 trillion spent in M&A activity.[1] Most deals were big company acquisitions, leveraging the technology, capability, and market potential of smaller firms.

    Throughout the season, regulators sifted through the paperwork to ensure transactions were compliant with E.U. and U.S. data privacy and security legislation. And no wonder. Even a small data breach can have serious consequences for businesses (think Yahoo’s flash crash after its accounts were compromised[2]), markets, and the viability of the regulators themselves.

    To succeed where others fail, big firms should intertwine data privacy and security within the deal itself. This complex task can be broken down to the following four steps.

    The M&A data privacy roadmap

    1. Benchmark existing privacy exposure during screening: This ensures the deal value is adjusted accordingly, with both parties aware of all possible data vulnerabilities. Acquiring firms can use a compliance maturity measure and if maturity is low (and costs are too high), the deal can be screened out early.
    2. Use a clean data room for security and privacy due diligence: This requires that both parties conduct vulnerability mapping exercises within a “clean” data room (i.e., a tightly controlled space with policy in place). Acquiring firms seek to understand what data is collected and how it will be used both pre- and post- deal. This irons out future threats and ensures factors like personally identifiable information (PPI) don’t cause regulatory concern.
    3. Weave data privacy into the deal structure: Map what data is stored, how it is used, and what regulations processing of this data should meet. M&A deals also need consent of data transfer within the agreement. Lacking this consent, the deal might be null and void. Further, the firm’s customers should be apprised of potential usage of data post-merger, and a warranty agreement between merging entities should be put in place to take care of any investigations and complaints.
    4. Integrate IT systems and migrate data post deal closure. A joint data inventory should be mapped out, with data privacy policies and guidelines in place. This step also requires customer consent for data contradictions between firms. A change management plan should be instituted at this stage, and the post-merger operating model should aim to unlock synergies between both firms with well-defined data access protocols and control levers.

    The M&A data privacy framework and reference architecture

    Ensuring data privacy and security in M&A is always easier said than done. Beyond putting in place an effective roadmap, our work with clients has helped us develop a framework which can ease the M&A journey of large enterprise. This framework brings together program and change management, governance and, importantly, execution across four key pillars:

    • Collect and analyze: Understand the data and process status-quo, and establish gaps and risks using workshops.
    • Design and synergize: Based on the gap reports design the privacy architecture and operating model.
    • Build and transition: Initiate implementation of the operating model while creating checks and balances with specific measures. This needs to be in line with the initial gap report.
    • Stabilize and monitor: Use a trusted partner to constantly assess ongoing risks and outputs.

    A data privacy M&A framework is only as good as the underlying reference architecture it uses. This architecture details various data privacy issues and solutions for effective regulatory compliance. The architecture entails:

    • Data interaction services: Required to interact with all possible sources of data – customers, suppliers, vendors, and employees. Primarily meant to present privacy policy to users and gather consent.
    • Data portability services: Ensures secure movement of data between business and stakeholders.
    • Enterprise capabilities: Facilitates data management and processing while fulfilling privacy rights.
    • Data/application security: Allows secure storage and processing of data while avoiding any breaches.
    • Information governance: Defines all policies including privacy, data, and privacy-reporting components.

    Left in isolation, data privacy can have serious negative repercussions for a deal, with many once confident firms unable to execute due to a lapse or breach. While deal value depends on a wide range of factors, putting data privacy into the equation can help executives determine if the deal is worth going ahead or not.

    [1] M&A rebounds sharply to hit $3.6tn in 2020, Ortenca Aliaj & James Fontanella-Khan & Arash Massoudi, Dec 31, 2020, FT

    [2] The Inside Story of When Verizon Learned of the Yahoo Breach, Craig Silliman, Adam Janofsky, Dec. 17, 2017, WSJ

    By Gaurav Bhandari, AVP and Head of Data & Analytics Consulting at Infosys

    Last year wasn’t bad for M&A deals. Given the pandemic was in full swing, the value of transactions fell by only 5% from 2019, with a whopping $3.6 trillion spent in M&A activity.[1] Most deals were big company acquisitions, leveraging the technology, capability, and market potential of smaller firms.

    Throughout the season, regulators sifted through the paperwork to ensure transactions were compliant with E.U. and U.S. data privacy and security legislation. And no wonder. Even a small data breach can have serious consequences for businesses (think Yahoo’s flash crash after its accounts were compromised[2]), markets, and the viability of the regulators themselves.

    To succeed where others fail, big firms should intertwine data privacy and security within the deal itself. This complex task can be broken down to the following four steps.

    The M&A data privacy roadmap

    1. Benchmark existing privacy exposure during screening: This ensures the deal value is adjusted accordingly, with both parties aware of all possible data vulnerabilities. Acquiring firms can use a compliance maturity measure and if maturity is low (and costs are too high), the deal can be screened out early.
    2. Use a clean data room for security and privacy due diligence: This requires that both parties conduct vulnerability mapping exercises within a “clean” data room (i.e., a tightly controlled space with policy in place). Acquiring firms seek to understand what data is collected and how it will be used both pre- and post- deal. This irons out future threats and ensures factors like personally identifiable information (PPI) don’t cause regulatory concern.
    3. Weave data privacy into the deal structure: Map what data is stored, how it is used, and what regulations processing of this data should meet. M&A deals also need consent of data transfer within the agreement. Lacking this consent, the deal might be null and void. Further, the firm’s customers should be apprised of potential usage of data post-merger, and a warranty agreement between merging entities should be put in place to take care of any investigations and complaints.
    4. Integrate IT systems and migrate data post deal closure. A joint data inventory should be mapped out, with data privacy policies and guidelines in place. This step also requires customer consent for data contradictions between firms. A change management plan should be instituted at this stage, and the post-merger operating model should aim to unlock synergies between both firms with well-defined data access protocols and control levers.

    The M&A data privacy framework and reference architecture

    Ensuring data privacy and security in M&A is always easier said than done. Beyond putting in place an effective roadmap, our work with clients has helped us develop a framework which can ease the M&A journey of large enterprise. This framework brings together program and change management, governance and, importantly, execution across four key pillars:

    • Collect and analyze: Understand the data and process status-quo, and establish gaps and risks using workshops.
    • Design and synergize: Based on the gap reports design the privacy architecture and operating model.
    • Build and transition: Initiate implementation of the operating model while creating checks and balances with specific measures. This needs to be in line with the initial gap report.
    • Stabilize and monitor: Use a trusted partner to constantly assess ongoing risks and outputs.

    A data privacy M&A framework is only as good as the underlying reference architecture it uses. This architecture details various data privacy issues and solutions for effective regulatory compliance. The architecture entails:

    • Data interaction services: Required to interact with all possible sources of data – customers, suppliers, vendors, and employees. Primarily meant to present privacy policy to users and gather consent.
    • Data portability services: Ensures secure movement of data between business and stakeholders.
    • Enterprise capabilities: Facilitates data management and processing while fulfilling privacy rights.
    • Data/application security: Allows secure storage and processing of data while avoiding any breaches.
    • Information governance: Defines all policies including privacy, data, and privacy-reporting components.

    Left in isolation, data privacy can have serious negative repercussions for a deal, with many once confident firms unable to execute due to a lapse or breach. While deal value depends on a wide range of factors, putting data privacy into the equation can help executives determine if the deal is worth going ahead or not.

    [1] M&A rebounds sharply to hit $3.6tn in 2020, Ortenca Aliaj & James Fontanella-Khan & Arash Massoudi, Dec 31, 2020, FT

    [2] The Inside Story of When Verizon Learned of the Yahoo Breach, Craig Silliman, Adam Janofsky, Dec. 17, 2017, WSJ

    Related Posts
    Why Email Deliverability is a Business Risk Your Company Can’t Afford to Ignore
    Why Email Deliverability is a Business Risk Your Company Can’t Afford to Ignore
    Five questions to ask before stepping into Employee Ownership
    Five questions to ask before stepping into Employee Ownership
    Cybersecurity as a Profit Engine: Turning Financial Services Security into Measurable Business Value
    Cybersecurity as a Profit Engine: Turning Financial Services Security into Measurable Business Value
    How Investability Helps Companies Navigate Transformational Times
    How Investability Helps Companies Navigate Transformational Times
    88% of UK and US organisations concerned about state-sponsored cyber attacks as national threat levels surge, IO research reveals
    88% of UK and US organisations concerned about state-sponsored cyber attacks as national threat levels surge, IO research reveals
    One in three SME leaders do not fully understand cash flow, despite 82% facing cash flow problems
    One in three SME leaders do not fully understand cash flow, despite 82% facing cash flow problems
    Inside the Company that Predicted the Remote Work Mega-Trend Before It Became Mainstream
    Inside the Company that Predicted the Remote Work Mega-Trend Before It Became Mainstream
    SEO Consultant Adrian Czarnoleski on How to Increase Business Value Before Exit
    SEO Consultant Adrian Czarnoleski on How to Increase Business Value Before Exit
    No SOC 2, No Deal: Why You’re Already Losing Clients - and What You Can Do About It
    No SOC 2, No Deal: Why You’re Already Losing Clients - and What You Can Do About It
    Jose Tolosa Guides Organizations Forward with Clarity, Purpose, and Integrity
    Jose Tolosa Guides Organizations Forward with Clarity, Purpose, and Integrity
    Reducing Freight Costs to Drive Global Trade Expansion
    Reducing Freight Costs to Drive Global Trade Expansion
    The Psychology of Music in the Modern Workplace
    The Psychology of Music in the Modern Workplace

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Business

    Explore more articles in the Business category

    Revealed: Low-Cost/No-Cost Marketing Hacks For Results Oriented Businesses

    Revealed: Low-Cost/No-Cost Marketing Hacks For Results Oriented Businesses

    Finance teams still stuck in spreadsheets as manual processes stall digital transformation

    Finance teams still stuck in spreadsheets as manual processes stall digital transformation

    The Future of Remote & Hybrid Leadership: Leading With Data-Driven Foresight

    The Future of Remote & Hybrid Leadership: Leading With Data-Driven Foresight

    2025-2030: The Next Technological Innovations for Business

    2025-2030: The Next Technological Innovations for Business

    The CFO’s New Playbook: 5 Ways AI Is Redefining Finance with Insights from Rishi Oberoi

    The CFO’s New Playbook: 5 Ways AI Is Redefining Finance with Insights from Rishi Oberoi

    Revolutionizing Payments: Secure, Scalable, Sovereign

    Revolutionizing Payments: Secure, Scalable, Sovereign

    Why Trademark Abuse in Paid Search Is a Growing Risk for Financial Institutions

    Why Trademark Abuse in Paid Search Is a Growing Risk for Financial Institutions

    E-commerce Customer Service: Tips

    E-commerce Customer Service: Tips

    When to Automate Your Warehouse: The Tipping Point for Operations Growth

    When to Automate Your Warehouse: The Tipping Point for Operations Growth

    Hurt at Work? 5 Financial Facts You Need to Know

    Hurt at Work? 5 Financial Facts You Need to Know

    Against the Odds: Resilience in Consumer Subsectors Offers Prime Opportunities for Investors

    Against the Odds: Resilience in Consumer Subsectors Offers Prime Opportunities for Investors

    Empower Your Workforce With Financial Wellness This Labor Day

    Empower Your Workforce With Financial Wellness This Labor Day

    View All Business Posts
    Previous Business PostCorrection Time
    Next Business PostSustainable business in 2022: What to expect this year after the uncertainty of the past two years