3M uses cookies on this site. This site and 3M selected service providers place cookies, containing text files, on your computer to recognize your computer and:

  • personalize your experience on 3M websites
  • show you ads tailored to your interests
  • collect anonymous statistical information to enhance site functionality and performance.

Learn the benefits of accepting these cookies

You can change your cookie settings at any time by clicking on the Cookie Preferences link at the bottom of the page.

Some opt-outs may fail due to your browser's cookie settings. If you would like to set opt-out preferences using this tool, you must allow third party cookies in your browser settings.

By clicking Accept and Proceed, you confirm your understanding and agreement for cookie settings as indicated on the left.

Accept and Proceed

Skip to Primary Navigation Skip to Site Navigation Skip to Main Content All 3M.com Site Map

3M Privacy & Protection White Papers

  • The Three Biggest Risks Of Cloud Computing
    Posted On 31/03/14
    The Three Biggest Risks Of Cloud Computing

    While cloud computing has been around for a few years, widespread corporate use is growing at an incredible rate. According to Forrester Research, spending on cloud computing services amounted to $40.7 billion in 2011.

  • Secure Visual Data Security
    Posted On 31/03/14
    Secure Visual Data Security

    While awareness of the threat posed by a data breach is increasing, there is still a lack of understanding of the many ways in which such a breach can occur and, little awareness of the often simple steps that can be taken. 

    Learn More
  • Visual Data Breach Risk Assessment Study
    Posted On 31/03/14
    Visual Data Breach Risk Assessment Study

    The protection of sensitive information as it is displayed on screen — is an emerging issue in information security and an under-addressed area of risk in corporate security policies. 

    Learn More
  • Visual Privacy Maturity Model
    Posted On 31/03/14
    Visual Privacy Maturity Model

    During a survey of 800 working professional, 70% of respondents revealed that their organizations had no explicit security policy on working outside of the office. When combined with the fact that 67% of respondents had worked with some type of sensitive data outside.

    Learn More
  • Visual Privacy Readiness Checklist
    Posted On 31/03/14
    Visual Privacy Readiness Checklist

    Educational modules on visual privacy included in security awareness training.
    Visual privacy awareness education included in new employee orientation.

    Learn More
  • Privacy Productivity Study
    Posted On 31/03/14
    Privacy Productivity Study

    In 2010, the Visual Data Breach Risk Assessment Study revealed that two out of three working professionals are displaying sensitive information on their mobile devices, such as social security numbers, credit card numbers and other non-regulated information.

    Learn More
  • Mobile Technology in Healthcare
    Posted On 31/03/14
    Mobile Technology in Healthcare

    While this trend is exciting for the future of the healthcare industry, it could also have potential consequences for the confidential information to which doctors are privy. Current mobile technology users present expanded risks to the security.

    Learn More
  • Financial Services - The Need For Visual Privacy
    Posted On 31/03/14
    Financial Services - The Need For Visual Privacy

    In the financial services industry, the protection of customer data and internal financial statements is non‐negotiable. With rising customer security sensitivity, motivated attackers, and an increasingly complex legal and regulatory environment.

    Learn More
  • Dealing With Careless Mobile Workers
    Posted On 31/03/14
    Dealing With Careless Mobile Workers

    Mobile workers have been in our midst for years. In the past, working from home involved a personal computer that was located in one room with a modem or ISDN connection at best. The changes to the model are incredible.

    Learn More
  • How Supporting Privacy Practices Can Help the Bottom Line
    Posted On 31/03/14
    How Supporting Privacy Practices Can Help the Bottom Line

    Internet-based security breaches have become commonplace and are at an all-time high. According to the Open Security Foundation, there were 1,387 data loss incidents in 2012 compared to 1,084 in 2011.

    Learn More
  • Mitigating Risk - Privacy In Practice
    Posted On 31/03/14
    Mitigating Risk - Privacy In Practice

    The defence of data as it is displayed on a screen. Visual Privacy has become increasingly important given that mobile workers often access data in highly exposed areas such as coffee shops, trains, and airplanes.

    Learn More
  • What New Mobile Technology Means For Your Company’s Data Security Policy
    Posted On 31/03/14
    What New Mobile Technology Means For Your Company’s Data Security Policy

    Gartner predicts that by 2013, 80 percent of businesses will support a workforce using tablets, bringing both ease and utility – but more importantly, risk.

    Learn More
  • A Risk Based Approach To Defending Visual Privacy
    Posted On 31/03/14
    A Risk Based Approach To Defending Visual Privacy

    Defending an enterprise from a data breach (both malicious and accidental) requires a combination of technical, policy, physical and people controls. With the rise in worker mobility, organizations have been forced to re–‐examine their data security strategy.

    Learn More
Need Help Finding The Correct Product For Your Device Then View Our Product Selector Tool
View Now
Request A Sample
  • Tell Us More About Your Privacy Needs! (e.g. the volume and type of devices you’re looking to protect) 

  • Get Sample!

Tell Us More About Your Privacy Needs! (e.g. the volume and type of devices you’re looking to protect) 

    • About You
    • Getting In Touch
    • Your Message
  • 3M offers a wide range of Optical Solutions products and services and would like to tell you about them and any other offers we believe may interest you. This would be by letter, telephone or e-mail. If you do not wish 3M to do this please tick the appropriate boxes.

We will only use this information to respond to your request but please refer to our Privacy Policy for full details.

Get Sample!
Prefer To Speak To A 3M Visual Privacy Expert On The Phone? Call Us Now On: 0300 3038161
Why Choose 3M To Protect Your On Screen Data?
Find Out More
Where Can I Buy Privacy Filters & Screen Protectors?
Buy Now!
Worried About Scuffs, Scratches & Screen Damage On Your Mobile Device? Try Our Screen Protection Range
Find Out More
Do You Have A Privacy Or Protection Product Query or Question?
alt
Get In Touch!