Get All Access for $5/mo

Data Security and the Downside Risk of M&As Here's why specialists are using a template - Information rights management technology (IRM) - to protect sensitive information from unauthorized access

By Bimal Raj

Opinions expressed by Entrepreneur contributors are their own.

You're reading Entrepreneur India, an international franchise of Entrepreneur Media.


Mergers and acquisitions (M&As) are good for business. But in these days of unpredictable risks pertaining to data security, mergers also come with unforeseen headaches. This is because security issues have gone beyond being a technology risk to an elevated plain of business risk. Studies have shown that such risk was the primary cause for many M&As to go haywire after the deal was consummated. Data privacy, security, and data breach risks are important due diligence issues in the deal landscape. Post-acquisition discovery of security mix-ups are a far too common downward risk.

It's a Big Problem

Reports say that more than 40per cent of companies engaged in a deal transaction end up with a bug related to data breach during the integration process post acquisition or merger. More even for those acquiring companies that intend to scrutinize data security issues as part of the due diligence process, often legal eagles conducting such homework do not adequately understand the changing threat perceptions or comprehend in full the particular risks associated with the target company. More often than not, the lawyers settle for asking an array of usual, privacy-related questions of a company even when that company does not collect or handle consumer data at a granular level on an on-going basis.

The focus on privacy and not security more generally in part is due to a general lack of awareness of broader security issues. To a large degree, an overemphasis on data breach risks is not surprising since companies must publicly disclose breaches of personal data to consumers, and more often than not the big time breaches only get attention while a large chunk of data compromises go sans red flagged.

The Core Reason

This is because when a deal is getting executed the most important concern for everyone involved in the transaction is data privacy and security. Even though parties involved in the transaction sign the non-disclosure agreements (NDA), it is important to limit the exposure to the data on a need-to-know basis.

In the process of due diligence and deal evaluation, a lot of sensitive information like company financials, intellectual property, customer contracts etc get shared among the parties concerned. What happens if the deal does not consummate is left to everybody's guess. Even though usual disclaimer of non-disclosure may take care of the confidentially part, it is always prudent to limit the buyer's exposure to the data to mitigate future risks. This is because the sensitive data can be used by the buyer to evaluate other opportunities or can be used by competitors which may upend the company's future business prospect.


This has prompted M&A specialists to use a much-refined template - Information rights management technology (IRM) - to protect sensitive information from unauthorized access. Virtual data rooms (VDR) use IRM and provide a safe and highly functional environment to the parties involved in the transaction. It acts as an online repository of data. VDR provides the document control where data owner can share the information on view only screen so that the user cannot download or take print outs or cut and paste of the information shared. As these data rooms are cloud-based and can be accessed from anywhere and at any time which gives flexibility to the users. It gives excellent control of the data shared. If the deal is not happening, then the owner can revoke the permission to the data room instantly. After that buyer with whom data had been shared, will not be able to access it. The owner can also provide controlled access and set rights to the data on a user by user basis by allowing print and download capabilities and can track document access and usage. Therefore the key takeaway is to share sensitive data with adequate protections and precautions.

Bimal Raj

Partner, Singhi Advisors

Business News

Y Combinator Helped Launch Reddit, Airbnb and Dropbox. Here's What I Learned From Its Free Startup School.

The famed startup accelerator offers a free course on building a business — and answers five pressing questions for founders.

Science & Technology

Why We Shouldn't Fear AI in Education (and How to Use It Effectively)

Facing resistance to new technologies in the educational process is nothing new, and AI is no exception. Yet, this powerful tool is set to overcome these challenges and revolutionize education, preparing students and professionals for a future of unparalleled efficiency and personalized learning.


Watch Out for These 5 Consequences of Too Much Collaboration

Beware of the collaboration trap! Too much collaboration causes overload, and well-intentioned efforts to have broad collaboration can backfire.


How His Personal Battle With Cancer Inspired This Founder's Solution for Patient Care

On this episode of "The Founder CEO," Michael O'Neil, founder and CEO of GetWellNetwork, discusses his inspiring journey as a leader and the transformative role of AI in healthcare.

Starting a Business

Inside the Exclusive Private Club Devoted to Food, Wine and the Arts

Barrett Wissman breaks down the passions and partnerships behind his latest venture Domus Artium Reserve.

Business News

Apple's AI Has a Catch — And It Could Help Boost Sales

Not every iPhone owner will get to use the new Apple Intelligence.