Get All Access for $5/mo

Data Security and the Downside Risk of M&As Here's why specialists are using a template - Information rights management technology (IRM) - to protect sensitive information from unauthorized access

By Bimal Raj

Opinions expressed by Entrepreneur contributors are their own.

You're reading Entrepreneur India, an international franchise of Entrepreneur Media.

Shutterstock

Mergers and acquisitions (M&As) are good for business. But in these days of unpredictable risks pertaining to data security, mergers also come with unforeseen headaches. This is because security issues have gone beyond being a technology risk to an elevated plain of business risk. Studies have shown that such risk was the primary cause for many M&As to go haywire after the deal was consummated. Data privacy, security, and data breach risks are important due diligence issues in the deal landscape. Post-acquisition discovery of security mix-ups are a far too common downward risk.

It's a Big Problem

Reports say that more than 40per cent of companies engaged in a deal transaction end up with a bug related to data breach during the integration process post acquisition or merger. More even for those acquiring companies that intend to scrutinize data security issues as part of the due diligence process, often legal eagles conducting such homework do not adequately understand the changing threat perceptions or comprehend in full the particular risks associated with the target company. More often than not, the lawyers settle for asking an array of usual, privacy-related questions of a company even when that company does not collect or handle consumer data at a granular level on an on-going basis.

The focus on privacy and not security more generally in part is due to a general lack of awareness of broader security issues. To a large degree, an overemphasis on data breach risks is not surprising since companies must publicly disclose breaches of personal data to consumers, and more often than not the big time breaches only get attention while a large chunk of data compromises go sans red flagged.

The Core Reason

This is because when a deal is getting executed the most important concern for everyone involved in the transaction is data privacy and security. Even though parties involved in the transaction sign the non-disclosure agreements (NDA), it is important to limit the exposure to the data on a need-to-know basis.

In the process of due diligence and deal evaluation, a lot of sensitive information like company financials, intellectual property, customer contracts etc get shared among the parties concerned. What happens if the deal does not consummate is left to everybody's guess. Even though usual disclaimer of non-disclosure may take care of the confidentially part, it is always prudent to limit the buyer's exposure to the data to mitigate future risks. This is because the sensitive data can be used by the buyer to evaluate other opportunities or can be used by competitors which may upend the company's future business prospect.

Technology

This has prompted M&A specialists to use a much-refined template - Information rights management technology (IRM) - to protect sensitive information from unauthorized access. Virtual data rooms (VDR) use IRM and provide a safe and highly functional environment to the parties involved in the transaction. It acts as an online repository of data. VDR provides the document control where data owner can share the information on view only screen so that the user cannot download or take print outs or cut and paste of the information shared. As these data rooms are cloud-based and can be accessed from anywhere and at any time which gives flexibility to the users. It gives excellent control of the data shared. If the deal is not happening, then the owner can revoke the permission to the data room instantly. After that buyer with whom data had been shared, will not be able to access it. The owner can also provide controlled access and set rights to the data on a user by user basis by allowing print and download capabilities and can track document access and usage. Therefore the key takeaway is to share sensitive data with adequate protections and precautions.

Bimal Raj

Partner, Singhi Advisors

Thought Leaders

How Leaders Can Create a Resilient Workforce and Support Employee Mental Health Challenges

Are you prepared to support the mental wellness of the incoming workforce?

Business News

Adobe Photoshop Users Are Outraged at the Company's New Terms: 'Am I Reading This Right?'

Adobe's new terms and conditions have creatives in an uproar.

Business News

I Tried the 'Anti-AI App' That Suddenly Drew Half a Million Artists Away From Instagram

Social media app Cara went from a few thousand users to more than 600,000 seemingly overnight.

Real Estate

The Top 3 Considerations for Making Money on Your Next Real Estate Investment

Seeking to maximize earnings from your investment property? Learn comparative pricing, evaluate NOI and cap rate, and implement risk management strategies for greater profits.

Career

The No. 1 Skill Employers Want Job Applicants to Have Might Be the Hardest to Find, New Research Reveals

Communication and problem-solving are important — but something else could be more critical than both.

Career

3 Reasons To Encourage Your Teen to Get a Summer Job or Internship

Summer is the best time for teenagers to develop and learn these three skills, which will serve them well throughout their careers.