dokumen.tips Open in urlscan Pro
188.114.96.3  Public Scan

URL: https://dokumen.tips/technology/2013-cost-of-data-breach-study-global-analysis.html?page=6400239?context=%7B%22contex...
Submission: On April 26 via manual from US — Scanned from NL

Form analysis 1 forms found in the DOM

GET https://dokumen.tips/search

<form action="https://dokumen.tips/search" method="get" id="form-search">
  <input class="vdocument_page_form_input" name="q" placeholder="What are you looking for?">
  <button aria-label="Search document" onclick="document.getElementById('form-search').submit();" class="vdocument_page_form_search"></button>
</form>

Text Content

×

 * Log in
 * Upload File

 * Most Popular
 * Art & Photos
 * Automotive
 * Business
 * Career
 * Design
 * Education
 * Hi-Tech

+ Browse for More
 * Home


 * TECHNOLOGY

 * 2013 cost of data breach study - Global analysis

125
100% Actual Size Fit Width Fit Height Fit Page Automatic
Match case Limit results 1 per page

--------------------------------------------------------------------------------


2013 Cost of Data Breach Study: Global Analysis Benchmark research sponsored by
Symantec Independently Conducted by Ponemon Institute LLC May 2013 Ponemon
Institute© Research Report


2013 COST OF DATA BREACH STUDY - GLOBAL ANALYSIS

Download PDF Report

 * Upload
   beeware

 * View
   409

 * Download
   1


Facebook

Twitter

E-Mail

LinkedIn

Pinterest


Tags:

 * cost of data breach
 * cost of data breach
 * cost of data breach
 * data breach cases
 * detailed cost data
 * causes of data breaches
 * size of data breaches
 * costly data breaches

Embed Size (px) 344 x 292 429 x 357 514 x 422 599 x 487

<iframe
src="https://dokumen.tips/embed/v1/2013-cost-of-data-breach-study-global-analysis"
frameborder="0" marginwidth="0" marginheight="0" scrolling="no"
style="border:1px solid #CCC; margin-bottom:5px; max-width: 100%; overflow:
hidden; width: 599px; height: 487px;" allowfullscreen></iframe>

DESCRIPTION

Résultats d’une étude sur le coût de la cybercriminalité dans le monde

Citation preview

Page 1


2013 Cost of Data Breach Study: Global Analysis

Benchmark research sponsored by Symantec Independently Conducted by Ponemon
Institute LLC May 2013

Ponemon Institute© Research Report

Page 2


Ponemon Institute© Research Report Page 1

20131 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013

Part 1. Executive Summary Symantec Corporation and Ponemon Institute are pleased
to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual
benchmark study concerning the cost of data breach incidents for companies
located nine countries. Since 2009, we have provided a consolidated report of
the benchmark findings from all countries represented in the research. In this
report, we present both the consolidated findings and country differences. The
number of global organizations represented this year has grown to 277 in nine
countries. More than 1,400 individuals were interviewed for this study during a
ten-month period. In last year’s report, 199 organizations from eight countries
participated in this benchmark research. As the findings reveal, the average per
capita cost of data breach (compiled for nine countries and converted to US
dollars) differs widely among the countries. Many of these cost differences can
be attributed to the types of attacks and threats organizations face as well as
the data protection regulations and laws in their respective countries. In this
year’s global study, the average consolidated data breach increased from $130 to
$136. However, German and US organizations on average experienced much higher
costs at $199 and $188, respectively. Ponemon Institute conducted its first Cost
of Data Breach study in the United States eight years ago. Since then, we have
expanded the study to include the United Kingdom, Germany, France, Australia,
India, Italy, Japan and, for the first time this year, Brazil. To date, 965
business and government (public sector) organizations have participated in the
benchmarking process since the inception of this research series. As mentioned
above, this year’s study examines the costs incurred by 277 companies in 16
industry sectors after those companies experienced the loss or theft of
protected personal data. It is important to note the costs presented in this
research are not hypothetical but are from actual data loss incidents. They are
based upon cost estimates provided by the individuals we interviewed over a
ten-month period in the companies that are represented in this research. The
number of breached records per incident this year ranged from 2,300 records to
more than 99,000 records. This year the average number of breached records was
23,647. We do not include organizations that had data breaches in excess of
100,000 because they are not representative of most data breaches and to include
them in the study would skew the results. The detailed cost data for the 277
data breach cases can be found as Appendix 1 in the nine separate country
reports. The report examines a wide range of business costs, including expense
outlays for detection, escalation, notification, and after-the-fact (ex-post)
response. We also analyze the economic impact of lost or diminished customer
trust and confidence as measured by customer turnover or churn. The following
are the most salient country differences measured in US dollars: The most and
least expensive breaches. German and US companies had the most costly

data breaches ($199 and $188 per record, respectively). These countries also
experienced the highest total cost (US at $5.4 million and Germany at $4.8
million). The least costly breaches occurred in Brazil and India ($58 and $42,
respectively). In Brazil total cost was $1.3 million and in India it was $1.1
million.

1The Cost of Data Breach report is dated as a 2013 publication. Please note that
all data breach incidents studied in this year’s report happened in the 2012
calendar year. Thus, all figures reflect the 2012 data breach incidents.

Page 3


Ponemon Institute© Research Report Page 2

Size of data breaches. On average, Australian and US companies had data breaches
that resulted in the greatest number of exposed or compromised records (34,249
and 28,765 records, respectively). On average, Italian and Japanese companies
had the smallest number of breached records (18,285 and 18,237 records,
respectively).

Causes of data breaches differ among countries. German companies were most
likely to

experience a malicious or criminal attack, followed by Australia and Japan.
Brazilian companies were most likely to experience breaches caused by human
error. Companies in India were the most likely to experience a data breach
caused by a system glitch or business process failure.

The most costly malicious and criminal attacks. Consolidated findings show that

malicious or criminal attacks are the most costly data breaches incidents in all
nine countries. US and German companies experience the most expensive data
breach incidents at $277 and $214 per compromised records, respectively. Brazil
and India had the least costly data breach caused by malicious or criminal
attackers at $71 and $46 per capita, respectively.

Factors that decrease the cost. US and UK companies received the greatest
reduction in

data breach costs by having a strong security posture, incident response plan
and CISO appointment. The US and France received the greatest cost reduction
from the engagement of consultants to support data breach remediation.

Factors that increase the cost. US companies realized the greatest increase in
data breach

costs if caused by a third party error or quick notification of data breach
victims, regulators and other stakeholders. UK companies had the greatest
increase in the cost of data breach if the incident involved a lost or stolen
device.

Countries that lose the most customers following a data breach. France and
Australia

had the highest rate of abnormal customer turnover or churn following a data
breach. In contrast, Brazil and India had the lowest rate of abnormal churn. In
the context of this study, abnormal churn is defined as the customer turnover
caused by the data breach (above the churn experienced in the normal course of
business).

Countries that spend the most and least on detection and escalation. On average,

German and Australian organizations spent the most on such detection and
escalation activities as investigating and assessing the data breach ($1.3
million and $1.2 million, respectively). Organizations in India and Brazil spent
the least on detection and escalation at $359,406 and $358,478, respectively.

Countries that spend the most and least on notification. Some typical
notification costs

include IT activities associated with the creation of contact databases,
determination of all regulatory requirements, engagement of outside experts and
other efforts to make sure victims are alerted to the fact that their personal
information has been compromised. US and Germany organizations on average spent
the most ($565,020 and $353,927, respectively). Brazil and India spent the least
amount on notification ($53,063 and $22,232, respectively).

Page 4


Ponemon Institute© Research Report Page 3

Cost of Data Breach FAQs How do you collect the data? Ponemon Institute
researchers collected in-depth qualitative data through interviews with more
than 1,400 individuals in 277 organizations conducted over a ten-month period in
nine countries. Recruiting organizations for the 2012 study began in January
2012 and interviews were completed in December. In each of the participating
organizations, we spoke with IT, compliance and information security
practitioners who are knowledgeable about their organization’s data breach and
the costs associated with resolving the breach. For privacy purposes we do not
collect any organization-specific information. How do you calculate the cost of
data breach? To calculate the average cost of data breach, we collect both the
direct and indirect expenses incurred by the organization. Direct expenses
include engaging forensic experts, outsourcing hotline support and providing
free credit monitoring subscriptions and discounts for future products and
services. Indirect costs include in-house investigations and communication, as
well as the extrapolated value of customer loss resulting from turnover or
diminished acquisition rates. For a detailed explanation about Ponemon
Institute’s benchmark methodology, please see Part 4 of this report. How does
benchmark research differ from survey research? The unit of analysis in the Cost
of Data Breach study is the organization. In survey research, the unit of
analysis is typically the individual. As discussed previously, we recruited 277
organizations to participate in this study. All of these organizations
experienced a data breach ranging from a low of about 1,000 to nearly 100,000
compromised records. Can the average cost of data breach be used to calculate
the financial consequences of a mega breach such as those involving millions of
lost or stolen records? The average cost of a data breach in our research does
not apply to catastrophic or mega data breaches because these are not typical of
the breaches most organizations experience. In order to be representative of the
population of organizations and draw conclusions from the research that can be
useful in understanding costs when protected information is lost or stolen, we
do not include data breaches of more than 100,000 compromised records in our
analysis. Are you tracking the same organizations each year? Each annual study
involves a different sample of companies. In other words, we are not tracking
the same sample of companies over time. To be consistent, we recruit and match
companies with similar characteristics such as the company’s industry,
headcount, geographic footprint and size of data breach. Since starting this
research in 2005, we have studied the data breach experiences of 965
organizations.

Page 5


Ponemon Institute© Research Report Page 4

Part 2. Key Findings In this section we provide the detailed findings of this
research. Topics are presented in the following order: Frequency of data breach
incidents Cost of data breach per record and organization Root causes of a data
breach Factors that influence the cost of a data breach Trends in the frequency
of compromised records Trends in customer turnover or churn Data breach cost
components The following table contains the list of countries and legend used in
forthcoming figures. The table also provides the 04/01/2013 Wall Street Journal
conversion rates used to convert cost data into one common currency (US
dollars).

Table 1. Country legend Legend Case studies Currency Conversion rate to US$

Australia AU 21 AU Dollar 0.97 Brazil BZ 31 Real 2.00 France FR 26 Euro 0.76
Germany DE 31 Euro 0.76 India IN 28 Rupee 54.12 Italy IT 22 Euro 0.76 Japan JP
26 Yen 98.00 United Kingdom UK 38 GBP 0.65 United States US 54 Dollar 1.00

Number of exposed or compromised records. Figure 1 reports the average size of
data breaches for organizations in the nine countries represented in this
research. At an average of 34,249, Australia has the highest number of breached
records. Our sample of Japanese organizations, on the other hand, experienced
the lowest average number of breach records at 18,237. By design, the data
breach cases included in this research had a minimum value of 1,000 records and
a maximum value of 100,000 records. As discussed, we do not include data breach
cases in excess of 100,000 records because this would affect the findings and
are not representative of the data breaches most companies experience. Figure 1.
The average number of breached records

18,237

18,285

22,462

22,847

23,833

24,280

26,586

28,765

34,249

- 5,000 10,000 15,000 20,000 25,000 30,000 35,000 40,000

JP

IT

FR

BZ

UK

DE

IN

US

AU

Page 6


Ponemon Institute© Research Report Page 5

Per capita cost. Figure 2 reports the average per capita cost of a data breach
expressed in US dollars for nine country studies. As shown there is marked
variation among country samples.2 The consolidated average per capita cost for
all country samples was $136 compared to a $130 cost per compromised record
calculated last year (excluding Brazil). Germany experienced the highest per
capita cost of data breach at $199 and India experienced the lowest cost at $42
per compromised record. Figure 2. The average per capita cost of data breach
over two years Measured in US$

Average organizational cost of data breach varies by country. Figure 3 presents
the total average cost of data breach for nine country studies in this year’s
study. As can be seen, the US sample experienced the highest total average cost
at more than $5.4 million, followed by Germany at $4.8 million. In sharp
contrast, samples of Brazilian and Indian companies experienced the lowest total
average cost at $1.3 million and $1.1 million, respectively. Figure 3. The
average total organizational cost of data breach Measured in US$

2Per capita cost is defined as the total cost of data breach divided by the size
of the data breach in terms of the number of lost or stolen records.

42 58

124 125 132 133

168 188

199

42

102

132 124 145

159

194 191

-

50

100

150

200

250

IN BZ* IT JP UK AU FR US DE

FY 2012 (n = 277) FY 2011 (n = 199)

1,115,804

1,321,903

2,275,404

2,282,095

3,143,048

3,763,299

4,104,932

4,823,583

5,403,644

- 1,000,000 2,000,000 3,000,000 4,000,000 5,000,000 6,000,000

IN

BZ

IT

JP

UK

FR

AU

DE

US

Page 7


Ponemon Institute© Research Report Page 6

Certain industries have higher data breach costs. Figure 4 reports the per
capita costs for the consolidated sample by industry classification. Heavily
regulated industries such as healthcare, financial, pharmaceuticals,
transportation and communications had a per capita data breach cost
substantially above the overall mean of $136. Retailers and public sector
organizations had a per capita cost well below the overall mean value. Figure 4.
Per capita cost by industry classification Consolidated view (n=277). Measured
in US$

78

81

103

103

111

113

114

125

125

129

134

150

169

207

215

233

0 50 100 150 200 250

Retail

Public services

Industrial

Media

Education

Consumer

Hospitality

Energy

Research

Technology

Services

Communications

Transportation

Pharmaceuticals

Financial

Healthcare

Page 8


Ponemon Institute© Research Report Page 7

Mistakes made by people and systems are the main causes of data breach.3 Figure
5 provides a summary of the main root causes of data breach on a consolidated
basis for all nine country samples. Taken together, human errors and system
problems account for 64 percent of data breaches in the global study. These can
include: Employees mishandling information Violations of industry and government
regulations Lack of system controls IT or business process failure (such as
legacy FTP jobs expose credit card data in the clear) Insiders greatly
contribute to data breaches and that loss can be costly to organizations. Figure
5. Distribution of the benchmark sample by root cause of the data breach
Consolidated view (n=277)

Figure 6 presents the main root causes of data breach for nine country samples.
At 48 percent, German companies are most likely to experience a malicious or
criminal attack. In contrast, Brazilian companies were least likely to
experience such data breaches and most likely experienced a breach caused by
human errors. Indian companies were most likely to experience a data breach
caused by a system glitch or business process failure. Figure 6. Distribution of
the benchmark sample by root cause of the data breach

3Negligent insiders are individuals who cause a data breach because of their
carelessness, as determined in a post data breach investigation. Malicious
attacks can be caused by hackers or criminal insiders (employees, contractors or
other third parties).

37%

29%

35% Malicious or criminal attack

System glitch

Human factor

23% 25% 32% 34% 41% 42% 42% 43% 48%

35% 46% 32% 29% 26% 27% 23% 24% 16%

42% 29% 36% 37% 33% 31% 35% 33% 35%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

100%

BZ IN IT UK US FR JP AU DE

Malicious or criminal attack System glitch Human factor

Page 9


Ponemon Institute© Research Report Page 8

Malicious attacks are more costly globally. Figure 7 reports the per capita cost
of data breach for three root causes of the breach incident on a consolidated
basis. These results show data breaches due to malicious or criminal attacks
cost companies an average of ($157). This is significantly above the
consolidated mean of $136 per compromised record and the per capita cost for
breaches caused by system glitch and human factors ($122 and $117,
respectively). Figure 7. Per capita cost for three root causes of the data
breach Consolidated view (n=277). Measured in US$

Figure 8 reports the per capita cost of data breach by country sample for three
root causes. These results clearly show data breach costs resulting from
malicious or criminal attacks were consistently higher than those costs
resulting from system glitches or human error. This graph also shows wide
variation across country samples. That is, the US cost of a malicious or
criminal data breach incident was $277 per compromised record. In India, this
per capita cost was only $46. Figure 8. Per capita cost for three root causes of
the data breach Measured in US$

157

122 117

- 20 40 60 80

100 120 140 160 180

Malicious or criminal attack System glitch Human factor

46

71

140

155

157

164

187

214

277

40

55

117

116

122

135

155

187

174

42

54

113

105

117

129

152

182

159

- 100 200 300 400 500 600 700

IN

BZ

JP

IT

UK

AU

FR

DE

US

Malicious or criminal attack System glitch Human factor

Page 10


Ponemon Institute© Research Report Page 9

Seven factors that influence the cost of data breach. We identified seven
factors that influence the cost consequences of a data breach incident. These
attributes are defined as follows:

The company had an incident management plan. Organizations had a data breach
incident management plan in place at the time of the data breach event.

The company had a relatively strong security posture at the time of the
incident. Organizations had a security effectiveness score (SES) at or above the
normative average. We measured the security posture of each participating
company using the Security Effective Score (SES) as part of the benchmarking
process.4

CISO (or equivalent title) has overall responsibility for enterprise data
protection. Organizations have centralized the management of data protection
with the appointment of a C-level information security professional.

Data was lost due to third party error. Organizations had a data breach caused
by a third party, such as vendors, outsourcers and business partners.

The company notified data breach victims quickly. Organizations notified data
breach victims and/or regulators within 30 days after the discovery of data loss
or theft.

The data breach involved lost or stolen devices. Organizations had a data breach
as a result of a lost or stolen mobile device, which included laptops, desktops,
smartphones, tablets, servers and USB drives containing confidential or
sensitive information.

Consultants were engaged to help remediate the data breach. Organizations
engaged consultants to assist in their data breach response and remediation.

As shown in Figure 9, a strong security posture, incident response planning CISO
appointments and consulting support decreases the per capita cost of data breach
(shown as negative numbers). Third party errors, lost or stolen devices and
quick notification increases the per capita cost of data breach (shown as
positive numbers). Figure 9. Impact of seven factors on the per capita cost of
data breach Consolidated view (n=277). Measured in US$

4The Security Effectiveness Score was developed by Ponemon Institute in its
annual encryption trends survey to define the security posture of responding
organizations. The SES is derived from the rating of 24 security features or
practices. This method has been validated from more than 40 independent studies
conducted since June 2005. The SES provides a range of +2 (most favorable) to -2
(least favorable). Hence, a result greater than zero is viewed as net favorable.

(15)

(13)

(8)

(5)

7

8

19

(20) (15) (10) (5) - 5 10 15 20 25

Strong security posture

Incident response plan

CISO appointment

Consultants engaged

Quick notification

Lost or stolen devices

Third party error

Page 11


Ponemon Institute© Research Report Page 10

The following figures show the impact of these seven factors by country. It is
clear from this analysis that the magnitude or impact of each factor on per
capita data breach cost varies by country. According to Figure 10a, a strong
security posture in US organizations had the potential to reduce the costs by as
much as $34. Strong security postures did not have as significant an impact
among Australian, Brazil and Indian organizations. Figure 10a. Strong security
posture (US$)

According to Figure 10b, US organizations should make sure they have an incident
response plan in place because it could reduce the cost by as much as $42. Such
planning did not seem to benefit organizations in Brazil, Australia and India.
Figure 10b. Incident response plan (US$)

(3) (10)

(10) (12)

(12) (14)

(16) (20)

(34)

(40) (35) (30) (25) (20) (15) (10) (5) -

IN BZ AU IT JP DE FR UK US

(4)

(5)

(6)

(9)

(11)

(12)

(13)

(20)

(42)

(45) (40) (35) (30) (25) (20) (15) (10) (5) -

IN

AU

BZ

FR

JP

DE

IT

UK

US

Page 12


Ponemon Institute© Research Report Page 11

Where are CISOs most influential in reducing the cost of data breach? According
to the research, US and UK organizations had a reduced cost of data breach
because of the appointment of a CISO. This factor did not have the same level of
impact in India and Brazil. Figure 10c. CISO appointment (US$)

Once again, the factors that can decrease the cost of data breach benefited US
organizations. In the US, those organizations that hired consultants to help
them contain and resolve the incident were able to reduce the cost an average of
$13 per compromised or exposed record. Organizations in Brazil and India that
engage consultants did not realize as much cost savings. Figure 10d. Consultants
engaged (US$)

(3)

(3)

(4)

(5)

(7)

(7)

(8)

(14)

(23)

(25) (20) (15) (10) (5) -

BZ

IN

JP

FR

DE

AU

IT

UK

US

(1) (3)

(3) (4)

(5) (5)

(6) (7)

(13)

(14) (12) (10) (8) (6) (4) (2) -

IN BZ AU IT JP DE UK FR US

Page 13


Ponemon Institute© Research Report Page 12

Figures 11a, 11b and 11c show the factors that increased the cost of data
breach. On average, third party errors increased the cost of data breach by as
much as $43 per record in the US In the case of Brazil and India, such incidents
increased the cost by only $10 and $6, respectively. Figure 11a. Third party
error (US$)

As shown in Figure 11b, if the data breach involved lost or stolen devices the
cost was increased by as much as $15 per record followed by German organizations
at $11. Again, Brazil and India are at the low end of increased costs. Figure
11b. Lost or stolen devices (US$)

6 10

12 16 16

17 22

26 43

- 5 10 15 20 25 30 35 40 45 50

IN BZ AU DE IT

JP FR UK US

3

6

7

7

8

9

10

11

15

- 2 4 6 8 10 12 14 16 18

IN

BZ

IT

JP

AU

FR

US

DE

UK

Page 14


Ponemon Institute© Research Report Page 13

In many countries, regulations dictate the notification of data breach victims.
However, if organizations are too fast in contacting individuals it can actually
result in higher costs. In this year’s study, in the US quick notification added
as much as $37 per record, as shown in Figure 11c. It is understandable that
this factor would have little impact on Brazil and India, because data breach
notification regulations are non-existent. Figure 11c. Quick notification (US$)

The more records lost, the higher the cost of the data breach. Figure 12 shows
the relationship between the total cost of data breach and the size of the
incident for 277 organizations in ascending order by the size of the breach
incident. The regression line clearly indicates that the size of the data breach
incident and total costs are linearly related. Figure 12. Total cost of data
breach by size of the data breach Regression = Intercept + {Size of Breach
Event} x β, where β denotes the slope. Measured in US$

(3) 1

3 4

5 5 5

8 37

(10) (5) - 5 10 15 20 25 30 35 40

UK IN

BZ JP AU FR IT

DE US

-

5,000,000

10,000,000

15,000,000

20,000,000

25,000,000

1 10

19

28

37

46

55

64

73

82

91

100

109

118

127

136

145

154

163

172

181

190

199

208

217

226

235

244

253

262

271

Ascending order by size of breach

Total cost Regression

Page 15


Ponemon Institute© Research Report Page 14

The more churn, the higher the per capita cost of data breach. Figure 13 reports
the distribution of per capita data breach costs in ascending rate of abnormal
churn for 277 organizations in nine countries. The regression line is upward
sloping, which suggests that abnormal churn and per capita costs are linearly
related. This pattern of results is consistent with benchmark studies completed
in prior years. Figure 13. Distribution of abnormal churn rates in ascending
order by per capita costs Regression = Intercept + {abnormal churn rate) x β,
where β denotes the slope. Measured in US$

- 50

100 150 200 250 300 350 400 450 500

1 9 17

25

33

41

49

57

65

73

81

89

97

105

113

121

129

137

145

153

161

169

177

185

193

201

209

217

225

233

241

249

257

265

273

Ascending order by abnormal churn rates

Per capita cost Regression

Page 16


Ponemon Institute© Research Report Page 15

Certain countries are more vulnerable to churn. Figure 14 reports the average
abnormal churn rates for nine country samples. Our 2012 global results show
marked differences among countries. Specifically, France experienced the highest
rate of abnormal churn at 4.4 percent and Brazil experienced the lowest churn
rate.5 The implications of this analysis is that countries with the highest
churn rates could significantly reduce the costs of a data breach by putting an
emphasis on customer retention and activities to preserve reputation and brand
value. Figure 14. Abnormal churn rates by country sample

5Public sector organizations utilize a different churn framework given that
customers of government organizations typically do not have an alternative
choice.

2.4% 2.7% 2.8%

3.0% 3.1%

3.8% 3.8% 4.0%

4.4%

0.0%

0.5%

1.0%

1.5%

2.0%

2.5%

3.0%

3.5%

4.0%

4.5%

5.0%

BZ IN US JP UK DE IT AU FR

Page 17


Ponemon Institute© Research Report Page 16

Detection and escalation costs. Figure 15 shows the costs associated with
detection and escalation of data breach incidents for nine countries. Such costs
typically include forensic and investigative activities, assessment and audit
services, crisis team management, and communications to executive management and
board of directors. As noted, German companies experienced the highest detection
and escalation costs and Brazil and India experienced the lowest cost. Figure
15. Average detection and escalation costs Measured in US$

Notification costs. Figure 16 reports the distribution of costs associated with
notification activities for nine countries. Such costs typically include IT
activities associated with the creation of contact databases, determination of
all regulatory requirements, engagement of outside experts, postal expenditures,
secondary contacts to mail or email bounce-backs and inbound communication
set-up. The US sample experienced the highest notification cost. Figure 16.
Average notification costs Measured in US$

358,478

359,406

395,262

699,018

738,009

818,996

953,094

1,189,391

1,316,526

- 200,000 400,000 600,000 800,000 1,000,000 1,200,000 1,400,000

BZ

IN

US

UK

JP

IT

FR

AU

DE

22,232

53,063

71,454

73,115

145,739

219,986

244,669

353,927

565,020

- 100,000 200,000 300,000 400,000 500,000 600,000

IN

BZ

JP

IT

FR

AU

UK

DE

US

Page 18


Ponemon Institute© Research Report Page 17

Post data breach costs. Figure 17 shows the distribution of costs associated
with ex-post (after-the-fact) activities for nine countries. Such costs
typically include help desk activities, inbound communications, special
investigative activities, remediation activities, legal expenditures, product
discounts, identity protection services and regulatory interventions. Here
again, US organizations experienced the highest ex-post response costs. Figure
17. Average ex-post response costs Measured in US$

Lost business costs. Figure 18 reports lost business costs associated with data
breach incidents for nine countries. Such costs include the abnormal turnover of
customers, increased customer acquisition activities, reputation losses and
diminished goodwill. As can be seen, lost business costs over the past few years
appear to be trending downward. The highest lost business cost of over $3.03
million was experienced by US organizations. Figure 18. Average lost business
costs Measured in US$

395,419

450,825

592,394

728,294

782,245

1,094,514

1,101,437

1,406,663

1,412,548

- 300,000 600,000 900,000 1,200,000 1,500,000

BZ

IN

IT

JP

UK

FR

AU

DE

US

283,341

514,944

744,338

790,899

1,417,116

1,569,953

1,746,467

1,957,966

3,030,814

- 500,000 1,000,000 1,500,000 2,000,000 2,500,000 3,000,000 3,500,000

IN

BZ

JP

IT

UK

FR

DE

AU

US

Page 19


Ponemon Institute© Research Report Page 18

Net change in lost business costs. Figure 19 reports lost business costs as a
percent of total average cost for nine countries. As can be seen, three
countries experienced a net percentage increase over two years, while five
countries experienced a net percentage decrease. The largest percentage
increases over two years occurred in India (+13 percent) and France (+11
percent). Australian companies experienced the largest percentage decrease
between the 2012 and 2013 lost business costs (-10 percent). Figure 19.
Percentage of lost business costs relative to total average cost Brazil (BZ) is
not included because 2013 is the first year of this study

The proportion of direct and indirect costs of data breach varies by country.
Direct costs refer to the direct expense outlay to accomplish a given activity
such as engaging forensic experts, hiring a law firm or offering victims
identity protection services. Indirect costs include the time, effort and other
organizational resources spent during the data breach resolution. It includes
the use of existing employees to help in the data breach notification efforts or
in the investigation of the incident. Indirect costs also include the loss of
goodwill and customer churn. Figure 20 reports the direct and indirect per
capita cost components of a data breach on a percentage basis for nine
countries. As shown, US companies have the highest percentage of indirect cost
and Brazil has the highest percentage direct cost. Figure 20. Percentage direct
and indirect per capita data breach cost

39% 37% 34%

39%

27% 31%

45%

55%

29% 33%

35% 36% 40% 42%

45%

56%

0%

10%

20%

30%

40%

50%

60%

AU JP IT DE IN FR UK US

2012 Lost business costs as a percentage to total cost

2013 Lost business costs as a percentage to total cost

68% 57% 56% 54% 53% 50% 50% 48% 41%

32% 43% 44% 46% 47% 50% 50% 52% 59%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

100%

US AU FR DE IT IN UK JP BZ

Indirect Direct

Page 20


Ponemon Institute© Research Report Page 19

Part 3. Observations and description about participating companies We conclude
that companies’ efforts in improving their data protection practices are paying
off. As evidenced by the nine global studies, the most profitable investments
companies can make seem to be an incident response plan, a strong security
posture, the appointment of a CISO with enterprise-wide responsibility and the
engagement of outside consultants. We hope this study helps to understand what
the potential costs of a data breach could be based upon certain characteristics
and how best to allocate resources to the prevention, detection and resolution
of a data breach. Specifically, the study reveals the severe financial
consequences from malicious or criminal acts. These data breaches can prove to
be the most costly. In this report, we compare the results of nine separate
country studies. It is important to note that each annual study involves a
different sample of companies. In other words, we are not tracking the same
sample of companies over time. To be consistent, we recruit and match companies
with similar characteristics such as the company’s industry, headcount,
geographic footprint, and size of data breach. Figure 21 shows the distribution
of benchmark organizations by their primary industry classification. In this
year’s study, 16 industries are represented. The largest sector is financial
services, which includes banks, insurance, investment management and payment
processors. Figure 21. Distribution of the benchmark sample by industry segment
Consolidated (n = 277 organizations)

17%

14%

14%

12%

11%

9%

8%

3% 3%

3% 2% 2% 1% 1%

Financial Public services Retail Services Consumer Industrial Technology
Communications Hospitality Pharmaceuticals Transportation Energy Healthcare
Media Research Education

Page 21


Ponemon Institute© Research Report Page 20

Part 4. How we calculate the cost of data breach Our study addresses core
process-related activities that drive a range of expenditures associated with an
organization’s data breach detection, response, containment and remediation. The
four cost centers are: Detection or discovery: Activities that enable a company
to reasonably detect the breach of

personal data either at risk (in storage) or in motion. Escalation: Activities
necessary to report the breach of protected information to appropriate

personnel within a specified time period. Notification: Activities that enable
the company to notify data subjects with a letter, outbound

telephone call, e-mail or general notice that personal information was lost or
stolen. Ex-post response: Activities to help victims of a breach communicate
with the company to

ask additional questions or obtain recommendations in order to minimize
potential harms. Redress activities also include ex-post response such as credit
report monitoring or the reissuing of a new account (or credit card).

In addition to the above process-related activities, most companies experience
opportunity costs associated with the breach incident, which results from
diminished trust or confidence by present and future customers. Accordingly, our
Institute’s research shows that the negative publicity associated with a data
breach incident causes reputation effects that may result in abnormal turnover
or churn rates as well as a diminished rate for new customer acquisitions. To
extrapolate these opportunity costs, we use a cost estimation method that relies
on the “lifetime value” of an average customer as defined for each participating
organization. Turnover of existing customers: The estimated number of customers
who will most likely

terminate their relationship as a result of the breach incident. The incremental
loss is abnormal turnover attributable to the breach incident. This number is an
annual percentage, which is based on estimates provided by management during the
benchmark interview process.6

Diminished customer acquisition: The estimated number of target customers who
will not

have a relationship with the organization as a consequence of the breach. This
number is provided as an annual percentage.

We acknowledge that the loss of non-customer data, such as employee records, may
not impact an organization’s churn or turnover.7 In these cases, we would expect
the business cost category to be lower when data breaches do not involve
customer or consumer data (including payment transactional information).

6In several instances, turnover is partial, wherein breach victims still
continued their relationship with the breached organization, but the volume of
customer activity actually declines. This partial decline is especially salient
in certain industries – such as financial services or public sector entities –
where termination is costly or economically infeasible. 7In this study, we
consider citizen, patient and student information as customer data.

Page 22


Ponemon Institute© Research Report Page 21

Benchmark methods All participating organizations experienced one or more data
breach incidents sometime over the past year, often requiring notification
according various regulations and laws. Our benchmark instrument captured
descriptive information from IT, compliance and information security
practitioners about the full cost impact of a breach involving the loss or theft
of customer or consumer information. It also required these practitioners to
estimate opportunity costs associated with program activities. Estimated data
breach cost components were captured on a rating form. In most cases, the
researcher conducted follow-up interviews to obtain additional facts, including
estimated abnormal churn rates that resulted from the company’s most recent
breach event involving 1,000 or more compromised records.8 Data collection
methods did not include actual accounting information, but instead relied upon
numerical estimation based on the knowledge and experience of each participant.
Within each category, cost estimation was a two-stage process. First, the
benchmark instrument required individuals to rate direct cost estimates for each
cost category by marking a range variable defined in the following number line
format. How to use the number line: The number line provided under each data
breach cost category is one way to obtain your best estimate for the sum of cash
outlays, labor and overhead incurred. Please mark only one point somewhere
between the lower and upper limits set above. You can reset the lower and upper
limits of the number line at any time during the interview process.

Post your estimate of direct costs here for [presented cost category]

LL ______________________________________|___________________________________ UL

The numerical value obtained from the number line rather than a point estimate
for each presented cost category preserved confidentiality and ensured a higher
response rate. The benchmark instrument also required practitioners to provide a
second estimate for indirect and opportunity costs, separately. The scope of
data breach cost items contained within our benchmark instrument was limited to
known cost categories that applied to a broad set of business operations that
handle personal information. We believed that a study focused on business
process – and not data protection or privacy compliance activities – would yield
a better quality of results.

8Our sampling criteria only included companies experiencing a data breach
between 1,000 and 100,000 lost or stolen records sometime during the past 12
months. We excluded catastrophic data breach incidents to avoid skewing overall
sample findings.

Page 23


Ponemon Institute© Research Report Page 22

Figure 22 illustrates the activity-based costing schema used in our benchmark
study. The cost centers we examine sequentially are: incident discovery,
escalation, notification, ex-post response and lost business. Figure 22. Schema
of the data breach process

Within each cost center, the research instrument required subjects to estimate a
cost range to capture estimates of direct cost, indirect cost and opportunity
cost, defined as follows:

Direct cost – the direct expense outlay to accomplish a given activity.

Indirect cost – the amount of time, effort and other organizational resources
spent, but not as a direct cash outlay.

Opportunity cost – the cost resulting from lost business opportunities as a
consequence of negative reputation effects after the breach has been reported to
victims (and publicly revealed to the media).

To maintain complete confidentiality, the benchmark instrument did not capture
any company-specific information. Subject materials contained no tracking codes
or other methods that could link responses to participating companies. To keep
the benchmarking process to a manageable size, we carefully limited items to
only those cost activity centers that we considered crucial to data breach cost
measurement. Based upon discussions with learned experts, the final set of items
included a fixed set of cost activities. Upon collection of the benchmark
information, each instrument was re-examined carefully for consistency and
completeness.

Page 24


Ponemon Institute© Research Report Page 23

Part 5. Limitations Our study utilizes a confidential and proprietary benchmark
method that has been successfully deployed in earlier research. However, there
are inherent limitations with this benchmark research that need to be carefully
considered before drawing conclusions from findings. Non-statistical results:
Our study draws upon a representative, non-statistical sample of

organizations experiencing a breach involving the loss or theft of confidential
data during the past 12 months. Statistical inferences, margins of error and
confidence intervals cannot be applied to these data given that our sampling
methods are not scientific.

Non-response: The current findings are based on a small representative sample of

benchmarks. In total, 277 companies completed the benchmark process.
Non-response bias was not tested so it is always possible companies that did not
participate are substantially different in terms of underlying data breach cost.

Sampling-frame bias: Because our sampling frame is judgmental, the quality of
results is

influenced by the degree to which the frame is representative of the population
of companies being studied. It is our belief that the current sampling frame is
biased toward companies with more mature privacy or information security
programs.

Company-specific information: The benchmark information is sensitive and
confidential.

Thus, the current instrument does not capture company-identifying information.
It also allows individuals to use categorical response variables to disclose
demographic information about the company and industry category.

Unmeasured factors: To keep the interview script concise and focused, we decided
to omit

other important variables from our analyses such as leading trends and
organizational characteristics. The extent to which omitted variables might
explain benchmark results cannot be determined.

Extrapolated cost results. The quality of benchmark research is based on the
integrity of

confidential responses provided by respondents in participating companies. While
certain checks and balances can be incorporated into the benchmark process,
there is always the possibility that respondents did not provide accurate or
truthful responses. In addition, the use of cost extrapolation methods rather
than actual cost data may inadvertently introduce bias and inaccuracies.

Page 25


Ponemon Institute© Research Report Page 24

If you have questions or comments about this research report or you would like
to obtain additional copies of the document (including permission to quote or
reuse this report), please contact by letter, phone call or email:

Ponemon Institute LLC Attn: Research Department

2308 US 31 North Traverse City, Michigan 49686 USA

1.800.887.3118 research@ponemon.org

Ponemon Institute LLC

Advancing Responsible Information Management Ponemon Institute is dedicated to
independent research and education that advances responsible information and
privacy management practices within business and government. Our mission is to
conduct high quality, empirical studies on critical issues affecting the
management and security of sensitive information about people and organizations.
As a member of the Council of American Survey Research Organizations (CASRO), we
uphold strict data confidentiality, privacy and ethical research standards. We
do not collect any personally identifiable information from individuals (or
company identifiable information in our business research). Furthermore, we have
strict quality standards to ensure that subjects are not asked extraneous,
irrelevant or improper questions.


LOAD MORE

2011 Cost of Data Breach Study: Germany · The total average cost of data breach
over four years is shown in Figure 2. The total cost of data breach increased
very slightly from €3.38

Documents

2016 Cost of Data Breach Study: Global
Analysismediaassets.news5cleveland.com/uploads/Data Breach Report...data breach
incidents studied in the current report happened in the 2015

Documents

Ponemon Benchmark research - Cost of Data Breach Study: Global Analysis - May
2013

Business

Speed Up Incident Response with Actionable Forensic AnalyticsFor example, in the
Target breach alone, 40 1 “2013 Cost of Data Breach Study: Global Analysis”,
Ponemon Institute,

Documents

2016 Cost of Data Breach Study: Global Analysis · 2020. 12. 18. · Ponemon
Institute© Research Report Page 1 20161 Cost of Data Breach Study: Global
Analysis Ponemon Institute,

Documents

2013 cost of data breach study - France

Technology

2015 Cost of Data Breach Study: Global Analysis

Documents

2016 Cost of Data Breach Study: Canada

Documents

2018 Cost of a Data Breach Study: Global Overvie · 2019. 9. 21. · Part 1.
Executive Summary Cost of a Data Breach Report | 3 1 This report is dated in the
year of publication rather

Documents

2016 Cost of Data Breach Study: Global Analysis...Ponemon Institute© Research
Report Page 1 20161 Cost of Data Breach Study: Global Analysis Ponemon
Institute, June 2016 Part 1. Introduction

Documents

Introducing The Vanguardian In this edition...The global cost of data breach
decreases. The average cost of data breach decreased 10 percent and the per
capita cost decreased 2.9 percent

Documents

2015 Cost of Data Breach Study: Global Analysis...IBM and Ponemon Institute are
pleased to release the 2015 Cost of Data Breach Study: Global Analysis.
According to our research, the

Documents

2016 cost of data breach study kor

Technology

2018 Cost of a Data Breach Study: Global Overview · 2019-04-27 · Understanding
how the cost of a data breach is calculated will explain the variance among the
countries’ results

Documents

Privacy Liability & Data Breach Management Cyber Insurance ...€¦ · 2014 –Cost of
Data Breach Study global –Ponemon Institute Research Report Nikos Georgopoulos
–Microsoft

Documents

Cybowall Solution Overview · COST OF DATA BREACH Recovery from a SMB data breach
can cost between USD $36,000 - $50,000 GLOBAL ATTACK TARGET 43% of global
attacks targeted SMBs with

Documents

What is the Cost of One More Test? · Cost of Data Breach Study, The Ponemon
Institute, 2015 Cost of Data Breach Study, The Ponemon Institute, 2014 Cleaning
up after a Breach, SANS

Documents

2016 Cost of Data Breach Study: Global Analysis · § $4 million is the average
total cost of data breach § 29% increase in total cost of data breach since 2013
§ $158 is the average

Documents

2017 Cost of Data Breach Study - linq.it · Ponemon Institute© Research Report
Page 1 2017 Cost of Data Breach Study: Global Overview Ponemon Institute, June
2017 Part 1. Introduction

Documents

2013 Cost of Data Breach Study: Global Analysis Report...Factors that influence
the cost of a data breach ! Trends in the frequency of compromised records !
Trends in customer turnover

Documents

2014 Cost of Data Breach Study: Global Analysis20141 Cost of Data Breach Study:
Global Analysis Ponemon Institute, May 2014 . Part 1. Introduction . IBM and
Ponemon are pleased to

Documents

Global cost of a data breach (Ponemon/BM - may 2014)

Technology

PROTECT AGAINST A DATA BREACH & ADDRESS PCI DSS …€¦ · According to the 2016 Cost
of Data Breach Study: Global Analysis, the average cost of a breach to a company
was $4 million

Documents

2014 Cost of Data Breach Study: Global Analysis · 2014-06-03 · 2014 Cost of Data
Breach Study: Global Analysis . ... organizations in India and Brazil are more
likely to have a

Documents

Cost of-data-breach

Technology

2015 Cost of Data Breach Study: Global Analysis Global CODB FINAL … · The cost
of data breach varies by industry. The average global cost of data breach per
lost or stolen record

Documents

Cost of a Data Breach

Documents

2018 Cost of a Data Breach Study: Global Overview · Part 1. Executive Summary
Cost of a Data Breach Report | 4 As in past years, our study reports on the
relationship between how

Documents

Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber
Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 /
Verizon Data Breach Investigations

Documents

2009 Cost Of Data Breach

Technology

 * About us
 * Contact us
 * Term
 * DMCA
 * Privacy Policy

 * English
 * Français
 * Español
 * Deutsch

--------------------------------------------------------------------------------

STARTUP - SHARE TO SUCCESS

 * 


cancel


DOKUMEN.TIPS ASKS FOR YOUR CONSENT TO USE YOUR PERSONAL DATA TO:

 * perm_identity
   Personalised advertising and content, advertising and content measurement,
   audience research and services development
 * devices
   Store and/or access information on a device

expand_moreremove
Learn more
 * 
   How can I change my choice?
 * 
   What if I don't consent?
 * 
   How does legitimate interest work?
 * 
   Do I have to consent to everything?

Your personal data will be processed and information from your device (cookies,
unique identifiers, and other device data) may be stored by, accessed by and
shared with 136 TCF vendor(s) and 62 ad partner(s), or used specifically by this
site or app.

Some vendors may process your personal data on the basis of legitimate interest,
which you can object to by managing your options below. Look for a link at the
bottom of this page to manage or withdraw consent in privacy and cookie
settings.

Consent



Do not consent

Manage options

arrow_back

Data preferences


cancel


MANAGE YOUR DATA

You can choose how your personal data is used. Vendors want your permission to
do the following:

TCF vendors

help_outline


STORE AND/OR ACCESS INFORMATION ON A DEVICE

Cookies, device or similar online identifiers (e.g. login-based identifiers,
randomly assigned identifiers, network based identifiers) together with other
information (e.g. browser type and information, language, screen size, supported
technologies etc.) can be stored or read on your device to recognise it each
time it connects to an app or to a website, for one or several of the purposes
presented here.

View details
Consent (118 vendors)


USE LIMITED DATA TO SELECT ADVERTISING

Advertising presented to you on this service can be based on limited data, such
as the website or app you are using, your non-precise location, your device type
or which content you are (or have been) interacting with (for example, to limit
the number of times an ad is presented to you).

View details
Consent (71 vendors)Legitimate interest (31 vendors)help_outline


CREATE PROFILES FOR PERSONALISED ADVERTISING

Information about your activity on this service (such as forms you submit,
content you look at) can be stored and combined with other information about you
(for example, information from your previous activity on this service and other
websites or apps) or similar users. This is then used to build or improve a
profile about you (that might include possible interests and personal aspects).
Your profile can be used (also later) to present advertising that appears more
relevant based on your possible interests by this and other entities.

View details
Consent (95 vendors)


USE PROFILES TO SELECT PERSONALISED ADVERTISING

Advertising presented to you on this service can be based on your advertising
profiles, which can reflect your activity on this service or other websites or
apps (like the forms you submit, content you look at), possible interests and
personal aspects.

View details
Consent (91 vendors)


CREATE PROFILES TO PERSONALISE CONTENT

Information about your activity on this service (for instance, forms you submit,
non-advertising content you look at) can be stored and combined with other
information about you (such as your previous activity on this service or other
websites or apps) or similar users. This is then used to build or improve a
profile about you (which might for example include possible interests and
personal aspects). Your profile can be used (also later) to present content that
appears more relevant based on your possible interests, such as by adapting the
order in which content is shown to you, so that it is even easier for you to
find content that matches your interests.

View details
Consent (30 vendors)


USE PROFILES TO SELECT PERSONALISED CONTENT

Content presented to you on this service can be based on your content
personalisation profiles, which can reflect your activity on this or other
services (for instance, the forms you submit, content you look at), possible
interests and personal aspects. This can for example be used to adapt the order
in which content is shown to you, so that it is even easier for you to find
(non-advertising) content that matches your interests.

View details
Consent (25 vendors)


MEASURE ADVERTISING PERFORMANCE

Information regarding which advertising is presented to you and how you interact
with it can be used to determine how well an advert has worked for you or other
users and whether the goals of the advertising were reached. For instance,
whether you saw an ad, whether you clicked on it, whether it led you to buy a
product or visit a website, etc. This is very helpful to understand the
relevance of advertising campaigns.

View details
Consent (77 vendors)Legitimate interest (46 vendors)help_outline


MEASURE CONTENT PERFORMANCE

Information regarding which content is presented to you and how you interact
with it can be used to determine whether the (non-advertising) content e.g.
reached its intended audience and matched your interests. For instance, whether
you read an article, watch a video, listen to a podcast or look at a product
description, how long you spent on this service and the web pages you visit etc.
This is very helpful to understand the relevance of (non-advertising) content
that is shown to you.

View details
Consent (31 vendors)Legitimate interest (14 vendors)help_outline


UNDERSTAND AUDIENCES THROUGH STATISTICS OR COMBINATIONS OF DATA FROM DIFFERENT
SOURCES

Reports can be generated based on the combination of data sets (like user
profiles, statistics, market research, analytics data) regarding your
interactions and those of other users with advertising or (non-advertising)
content to identify common characteristics (for instance, to determine which
target audiences are more receptive to an ad campaign or to certain contents).

View details
Consent (57 vendors)Legitimate interest (21 vendors)help_outline


DEVELOP AND IMPROVE SERVICES

Information about your activity on this service, such as your interaction with
ads or content, can be very helpful to improve products and services and to
build new products and services based on user interactions, the type of
audience, etc. This specific purpose does not include the development or
improvement of user profiles and identifiers.

View details
Consent (65 vendors)Legitimate interest (38 vendors)help_outline


USE LIMITED DATA TO SELECT CONTENT

Content presented to you on this service can be based on limited data, such as
the website or app you are using, your non-precise location, your device type,
or which content you are (or have been) interacting with (for example, to limit
the number of times a video or an article is presented to you).

View details
Consent (10 vendors)Legitimate interest (2 vendors)help_outline


ENSURE SECURITY, PREVENT AND DETECT FRAUD, AND FIX ERRORS

help_outline

Your data can be used to monitor for and prevent unusual and possibly fraudulent
activity (for example, regarding advertising, ad clicks by bots), and ensure
systems and processes work properly and securely. It can also be used to correct
any problems you, the publisher or the advertiser may encounter in the delivery
of content and ads and in your interaction with them.

View details


DELIVER AND PRESENT ADVERTISING AND CONTENT

help_outline

Certain information (like an IP address or device capabilities) is used to
ensure the technical compatibility of the content or advertising, and to
facilitate the transmission of the content or ad to your device.

View details


MATCH AND COMBINE DATA FROM OTHER DATA SOURCES

help_outline

Information about your activity on this service may be matched and combined with
other information relating to you and originating from various sources (for
instance your activity on a separate online service, your use of a loyalty card
in-store, or your answers to a survey), in support of the purposes explained in
this notice.

View details


LINK DIFFERENT DEVICES

help_outline

In support of the purposes explained in this notice, your device might be
considered as likely linked to other devices that belong to you or your
household (for instance because you are logged in to the same service on both
your phone and your computer, or because you may use the same Internet
connection on both devices).

View details


IDENTIFY DEVICES BASED ON INFORMATION TRANSMITTED AUTOMATICALLY

help_outline

Your device might be distinguished from other devices based on information it
automatically sends when accessing the Internet (for instance, the IP address of
your Internet connection or the type of browser you are using) in support of the
purposes exposed in this notice.

View details


USE PRECISE GEOLOCATION DATA

With your acceptance, your precise location (within a radius of less than 500
metres) may be used in support of the purposes explained in this notice.

View details
Consent

You can choose your data preferences. This site or app wants your permission to
do the following:

Site or app


USE LIMITED DATA TO SELECT ADVERTISING

Advertising presented to you on this service can be based on limited data, such
as the website or app you are using, your non-precise location, your device type
or which content you are (or have been) interacting with (for example, to limit
the number of times an ad is presented to you).

View details
Consent


CREATE PROFILES FOR PERSONALISED ADVERTISING

Information about your activity on this service (such as forms you submit,
content you look at) can be stored and combined with other information about you
(for example, information from your previous activity on this service and other
websites or apps) or similar users. This is then used to build or improve a
profile about you (that might include possible interests and personal aspects).
Your profile can be used (also later) to present advertising that appears more
relevant based on your possible interests by this and other entities.

View details
Consent


USE PROFILES TO SELECT PERSONALISED ADVERTISING

Advertising presented to you on this service can be based on your advertising
profiles, which can reflect your activity on this service or other websites or
apps (like the forms you submit, content you look at), possible interests and
personal aspects.

View details
Consent


CREATE PROFILES TO PERSONALISE CONTENT

Information about your activity on this service (for instance, forms you submit,
non-advertising content you look at) can be stored and combined with other
information about you (such as your previous activity on this service or other
websites or apps) or similar users. This is then used to build or improve a
profile about you (which might for example include possible interests and
personal aspects). Your profile can be used (also later) to present content that
appears more relevant based on your possible interests, such as by adapting the
order in which content is shown to you, so that it is even easier for you to
find content that matches your interests.

View details
Consent


MEASURE ADVERTISING PERFORMANCE

Information regarding which advertising is presented to you and how you interact
with it can be used to determine how well an advert has worked for you or other
users and whether the goals of the advertising were reached. For instance,
whether you saw an ad, whether you clicked on it, whether it led you to buy a
product or visit a website, etc. This is very helpful to understand the
relevance of advertising campaigns.

View details
Consent


MEASURE CONTENT PERFORMANCE

Information regarding which content is presented to you and how you interact
with it can be used to determine whether the (non-advertising) content e.g.
reached its intended audience and matched your interests. For instance, whether
you read an article, watch a video, listen to a podcast or look at a product
description, how long you spent on this service and the web pages you visit etc.
This is very helpful to understand the relevance of (non-advertising) content
that is shown to you.

View details
Consent


UNDERSTAND AUDIENCES THROUGH STATISTICS OR COMBINATIONS OF DATA FROM DIFFERENT
SOURCES

Reports can be generated based on the combination of data sets (like user
profiles, statistics, market research, analytics data) regarding your
interactions and those of other users with advertising or (non-advertising)
content to identify common characteristics (for instance, to determine which
target audiences are more receptive to an ad campaign or to certain contents).

View details
Consent

Vendor preferences

Accept all



Confirm choices

arrow_back

Vendor preferences


cancel


CONFIRM OUR VENDORS

Vendors can use your data to provide services. Declining a vendor can stop them
from using the data you shared.

TCF vendors

help_outline


EXPONENTIAL INTERACTIVE, INC D/B/A VDX.TV

Cookie duration: 90 (days).

Data collected and processed: Probabilistic identifiers, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ROQ.AD GMBH

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices, IP
addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


INDEX EXCHANGE INC.

Cookie duration: 395 (days).

Data collected and processed: Device characteristics, Precise location data,
Device identifiers, Non-precise location data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


QUANTCAST

Cookie duration: 396 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BEESWAXIO CORPORATION

Cookie duration: 395 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Precise location data, Device identifiers, Non-precise location data, Browsing
and interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


SOVRN, INC.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
Browsing and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


ADIKTEEV

Doesn't use cookies.

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Device identifiers, Non-precise location
data, Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


RTB HOUSE S.A.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


THE UK TRADE DESK LTD

Cookie duration: 3629 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADMETRICS GMBH

Doesn't use cookies.

Data collected and processed: Device characteristics, Browsing and interaction
data, Privacy choices, IP addresses

more




View details | Privacy policylaunch
Consent


NEXXEN INC.

Cookie duration: 180 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


EPSILON

Cookie duration: 184 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


YAHOO EMEA LIMITED

Cookie duration: 397 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Precise location data, Device identifiers, Non-precise location data, Browsing
and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ADVENTORI SAS

Cookie duration: 90 (days).

Data collected and processed: Probabilistic identifiers, User-provided data,
Device identifiers, Non-precise location data, Browsing and interaction data, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


TRIPLELIFT, INC.

Cookie duration: 90 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Precise location data, Device identifiers, Non-precise location
data, Browsing and interaction data, Privacy choices, Users’ profiles, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


XANDR, INC.

Cookie duration: 90 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Precise location data, Device identifiers, Non-precise location
data, Browsing and interaction data, Privacy choices, Users’ profiles, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NEORY GMBH

Cookie duration: 90 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


NEXXEN GROUP LLC

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Device identifiers, Non-precise location data, Privacy choices, Users’ profiles,
IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NEURAL.ONE

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Non-precise location data, Browsing and interaction data, Privacy choices, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADITION (VIRTUAL MINDS GMBH)

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
User-provided data, Precise location data, Device identifiers, Non-precise
location data, Browsing and interaction data, Privacy choices, Users’ profiles,
IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ACTIVE AGENT (VIRTUAL MINDS GMBH)

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
User-provided data, Precise location data, Device identifiers, Non-precise
location data, Browsing and interaction data, Privacy choices, Users’ profiles,
IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


TABOOLA EUROPE LIMITED

Cookie duration: 366 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


EQUATIV

Cookie duration: 396 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADFORM A/S

Cookie duration: 3650 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


MAGNITE, INC.

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Precise location data, Device identifiers, Non-precise location data, Browsing
and interaction data, Privacy choices, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


RATEGAIN ADARA INC

Cookie duration: 730 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, User-provided data, Device identifiers, Non-precise location data,
Browsing and interaction data, Privacy choices, Users’ profiles, IP addresses

more




View details | Storage details | Privacy policylaunch
Consent


SIFT MEDIA, INC

Doesn't use cookies.

Data collected and processed: Device characteristics, Precise location data,
Device identifiers, Non-precise location data, IP addresses

more




View details | Privacy policylaunch
Consent


RAKUTEN MARKETING LLC

Cookie duration: 730 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


LUMEN RESEARCH LIMITED

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
Browsing and interaction data, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


AMAZON AD SERVER

Cookie duration: 396 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Device identifiers, Non-precise location data, Browsing and
interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


OPENX

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices, IP
addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


YIELDLAB (VIRTUAL MINDS GMBH)

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, User-provided data,
Precise location data, Device identifiers, Non-precise location data, Browsing
and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ROKU ADVERTISING SERVICES

Cookie duration: 396 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Precise location data,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NANO INTERACTIVE GROUP LTD.

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
Browsing and interaction data

more




View details | Privacy policylaunch
Consent


SIMPLIFI HOLDINGS LLC

Cookie duration: 366 (days).

Data collected and processed: Precise location data, Device identifiers, IP
addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


PUBMATIC, INC

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Precise location data,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


COMSCORE B.V.

Cookie duration: 720 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Browsing and interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


FLASHTALKING

Cookie duration: 730 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Device identifiers, Non-precise location
data, Browsing and interaction data, Privacy choices, Users’ profiles, IP
addresses

more




View details | Privacy policylaunch
Consent


PULSEPOINT, INC.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Device identifiers, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


SMAATO, INC.

Cookie duration: 21 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, User-provided data, Precise location data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SEMASIO GMBH

Cookie duration: 366 (days).

Data collected and processed: Device identifiers, Browsing and interaction data,
Privacy choices, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


CRIMTAN HOLDINGS LIMITED

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Precise location data,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


GENIUS SPORTS UK LIMITED

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Device identifiers, Non-precise location
data, Browsing and interaction data, Privacy choices, Users’ profiles, IP
addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


CRITEO SA

Cookie duration: 390 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Device identifiers, Non-precise location
data, Browsing and interaction data, Privacy choices, Users’ profiles, IP
addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADLOOX SA

Doesn't use cookies.

Data collected and processed: Probabilistic identifiers, Device characteristics,
Device identifiers, Non-precise location data, Browsing and interaction data, IP
addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BLIS GLOBAL LIMITED

Cookie duration: 400 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Precise location data,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


LOTAME SOLUTIONS, INC

Cookie duration: 274 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Browsing and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


LIVERAMP

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Device identifiers, Non-precise location data, Browsing and
interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


GROUPM UK LIMITED

Cookie duration: 395 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices, IP
addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


LOOPME LIMITED

Cookie duration: 90 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
User-provided data, Precise location data, Device identifiers, Non-precise
location data, Browsing and interaction data, Privacy choices, Users’ profiles,
IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


DYNATA LLC

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, User-provided data, Device identifiers, Non-precise location data,
Browsing and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ASK LOCALA

Doesn't use cookies.

Data collected and processed: Device characteristics, Precise location data,
Device identifiers, Non-precise location data, Privacy choices, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


AZIRA

Doesn't use cookies.

Data collected and processed: Device characteristics, Precise location data,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DOUBLEVERIFY INC.

Doesn't use cookies.

Data collected and processed: Probabilistic identifiers, Device characteristics,
Non-precise location data, Browsing and interaction data, Privacy choices, IP
addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


BIDSWITCH GMBH

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


IPONWEB GMBH

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, User-provided data, Device identifiers, Non-precise location data,
Browsing and interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


NEXTROLL, INC.

Cookie duration: 183 (days).

Data collected and processed: Device characteristics, User-provided data, Device
identifiers, Non-precise location data, Browsing and interaction data, Privacy
choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


TEADS FRANCE SAS

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


STRÖER SSP GMBH (SSP)

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


OS DATA SOLUTIONS GMBH &AMP; CO. KG

Cookie duration: 90 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
User-provided data, Device identifiers, Non-precise location data, Browsing and
interaction data, Privacy choices, Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PERMODO GMBH

Doesn't use cookies.

Data collected and processed: Device characteristics, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


PLATFORM161 B.V.

Cookie duration: 396 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Precise location data, Device identifiers, Non-precise location data, Browsing
and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADACADO TECHNOLOGIES INC. (DBA ADACADO)

Cookie duration: 365 (days).

Data collected and processed: Non-precise location data, Browsing and
interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


BASIS GLOBAL TECHNOLOGIES, INC.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Precise location data, Device identifiers, Non-precise location
data, Browsing and interaction data, Privacy choices, Users’ profiles, IP
addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SMADEX, S.L.U.

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
User-provided data, Device identifiers, Non-precise location data, Privacy
choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


BOMBORA INC.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Device identifiers, Non-precise location data, Browsing and
interaction data, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


EASYMEDIA GMBH

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Precise location data, Device identifiers, Non-precise location data, Browsing
and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


REMERGE GMBH

Doesn't use cookies.

Data collected and processed: Device characteristics, Device identifiers,
Non-precise location data, Browsing and interaction data, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADVANCED STORE GMBH

Cookie duration: 365 (days).

Data collected and processed: Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


MAGNITE CTV, INC.

Cookie duration: 366 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Precise location data, Device identifiers, Non-precise location data, Browsing
and interaction data, Privacy choices, IP addresses

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DELTA PROJECTS AB

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Precise location data,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


USEMAX ADVERTISEMENT (EMEGO GMBH)

Cookie duration: 365 (days).

Data collected and processed: Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


EMETRIQ GMBH

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


PUBLICIS MEDIA GMBH

Cookie duration: 1825 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


M.D. PRIMIS TECHNOLOGIES LTD.

Cookie duration: 25 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
User-provided data, Device identifiers, Non-precise location data, Browsing and
interaction data, Privacy choices, IP addresses

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ONETAG LIMITED

Cookie duration: 396 (days).

Data collected and processed: Device characteristics, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


CLOUD TECHNOLOGIES S.A.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Device identifiers, Non-precise location data, Browsing and
interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


SMARTOLOGY LIMITED

Doesn't use cookies.

Data collected and processed: IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


IMPROVE DIGITAL

Cookie duration: 90 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Precise location data,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADOBE ADVERTISING CLOUD

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
identifiers, Privacy choices, IP addresses

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BANNERFLOW AB

Cookie duration: 366 (days).

Data collected and processed: Device characteristics, Non-precise location data,
Privacy choices, IP addresses

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


TABMO SAS

Doesn't use cookies.

Data collected and processed: Probabilistic identifiers, Device characteristics,
User-provided data, Precise location data, Device identifiers, Non-precise
location data, Browsing and interaction data, Privacy choices, Users’ profiles,
IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


INTEGRAL AD SCIENCE (INCORPORATING ADMANTX)

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
Browsing and interaction data, Privacy choices, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


WIZALY

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Non-precise location data, Browsing and interaction data, Privacy
choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


WEBORAMA

Cookie duration: 393 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


JIVOX CORPORATION

Cookie duration: 30 (days).

Data collected and processed: Precise location data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


SAGE&#43;ARCHER BV

Doesn't use cookies.

Data collected and processed: Non-precise location data

more




View details | Privacy policylaunch
Consent


ON DEVICE RESEARCH LIMITED

Cookie duration: 30 (days).

Data collected and processed: Device characteristics, User-provided data,
Precise location data, Device identifiers, Non-precise location data, Browsing
and interaction data, IP addresses

more




View details | Storage details | Privacy policylaunch
Consent


ROCKABOX MEDIA LTD

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
Browsing and interaction data, IP addresses

more




View details | Storage details | Privacy policylaunch
Legitimate interesthelp_outline


EXACTAG GMBH

Cookie duration: 180 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Device identifiers, Browsing and interaction data, Privacy choices,
IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


CELTRA INC.

Doesn't use cookies.

Data collected and processed: Device characteristics, Precise location data,
Device identifiers, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


MAINADV SRL

Cookie duration: 30 (days).

Data collected and processed: Device characteristics, User-provided data, Device
identifiers, Non-precise location data, Browsing and interaction data, Privacy
choices, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


GEMIUS SA

Cookie duration: 1825 (days).

Data collected and processed: Device characteristics, Device identifiers,
Browsing and interaction data, Privacy choices, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


THE KANTAR GROUP LIMITED

Cookie duration: 914 (days).

Data collected and processed: Device characteristics, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


NIELSEN MEDIA RESEARCH LTD.

Cookie duration: 120 (days).

Data collected and processed: Device characteristics, Device identifiers,
Browsing and interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SOLOCAL SA

Cookie duration: 396 (days).

Data collected and processed: Device characteristics, User-provided data,
Precise location data, Device identifiers, Non-precise location data, Browsing
and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PIXALATE, INC.

Doesn't use cookies.

Data collected and processed: Device characteristics, Device identifiers,
Non-precise location data, Browsing and interaction data, IP addresses

more




View details | Storage details | Privacy policylaunch
Consent


ORACLE ADVERTISING

Cookie duration: 180 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, User-provided data, Device identifiers, Non-precise location data,
Browsing and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


NUMBERLY

Cookie duration: 180 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, User-provided data, Device identifiers, Non-precise location data,
Browsing and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


AUDIENCEPROJECT A/S

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DEMANDBASE, INC.

Cookie duration: 730 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
User-provided data, Precise location data, Device identifiers, Non-precise
location data, Browsing and interaction data, Privacy choices, Users’ profiles,
IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


EFFILIATION / EFFINITY

Cookie duration: 30 (days).

Data collected and processed: Device characteristics

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ARRIVALIST CO.

Cookie duration: 365 (days).

Data collected and processed: Non-precise location data, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


SEENTHIS AB

Doesn't use cookies.

Data collected and processed: Device characteristics, IP addresses

more




View details | Privacy policylaunch


COMMANDERS ACT

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, IP addresses

more




View details | Storage details | Privacy policylaunch
Consent


TRAVEL AUDIENCE GMBH

Cookie duration: 397 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Device identifiers,
Non-precise location data, Browsing and interaction data, Users’ profiles, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


HUMAN

Doesn't use cookies.

Data collected and processed: Probabilistic identifiers, Device characteristics,
Device identifiers, Non-precise location data, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


ADLUDIO LTD.

Doesn't use cookies.

Data collected and processed: Device characteristics

more




View details | Privacy policylaunch
Consent


BLENDEE SRL

Cookie duration: 366 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, User-provided data, Device identifiers, Non-precise location data,
Browsing and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


INNOVID LLC

Cookie duration: 90 (days).

Data collected and processed: Device characteristics, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices, IP
addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PAPIRFLY AS

Doesn't use cookies.

Data collected and processed: Device characteristics

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


NEUSTAR, INC., A TRANSUNION COMPANY

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


VERVE GROUP EUROPE GMBH

Doesn't use cookies.

Data collected and processed: Device characteristics, Authentication-derived
identifiers, User-provided data, Precise location data, Device identifiers,
Non-precise location data, Browsing and interaction data, Privacy choices,
Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


OTTO (GMBH &AMP; CO KG)

Cookie duration: 365 (days).

Data collected and processed: User-provided data, Device identifiers, Browsing
and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADOBE AUDIENCE MANAGER, ADOBE EXPERIENCE PLATFORM

Cookie duration: 180 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, User-provided data, Precise location data,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


LOCALSENSOR B.V.

Doesn't use cookies.

Data collected and processed: Device characteristics, Precise location data,
Device identifiers, Non-precise location data, Privacy choices, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


ONLINE SOLUTION

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
User-provided data, Precise location data, Device identifiers, Non-precise
location data, Browsing and interaction data, Privacy choices, Users’ profiles,
IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


RELAY42 NETHERLANDS B.V.

Cookie duration: 730 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
User-provided data, Device identifiers, Browsing and interaction data, Privacy
choices, Users’ profiles, IP addresses

more




View details | Storage details | Privacy policylaunch
Consent


GP ONE GMBH

Cookie duration: Uses session cookies.

Data collected and processed: Device characteristics, User-provided data,
Non-precise location data, Browsing and interaction data, Privacy choices, IP
addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


THE MEDIAGRID INC.

Cookie duration: 365 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Precise location data, Device identifiers, Non-precise location data, Browsing
and interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


MINDTAKE RESEARCH GMBH

Cookie duration: 180 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Device identifiers, Browsing and interaction data, Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


CINT AB

Cookie duration: 730 (days).

Data collected and processed: Device characteristics, Device identifiers,
Browsing and interaction data, Privacy choices, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


GOOGLE ADVERTISING PRODUCTS

Cookie duration: 396 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, User-provided data, Device identifiers, Non-precise location data,
Browsing and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


GFK GMBH

Cookie duration: 730 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, User-provided data, Device identifiers, Non-precise location data,
Browsing and interaction data, Privacy choices, Users’ profiles, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


REVJET

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Non-precise location data,
Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


PROTECTED MEDIA LTD

Doesn't use cookies.

Data collected and processed: Probabilistic identifiers, Device characteristics,
Device identifiers, Browsing and interaction data, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


CLINCH LABS LTD

Cookie duration: 730 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Device identifiers, Non-precise location data, Browsing and interaction data,
Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ORACLE DATA CLOUD - MOAT

Doesn't use cookies.

Data collected and processed: Non-precise location data, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


HEARTS AND SCIENCE MÜNCHEN GMBH

Cookie duration: 60 (days).

Data collected and processed: IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


AMAZON ADVERTISING

Cookie duration: 396 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Device identifiers, Non-precise location data, Browsing and
interaction data, Privacy choices, Users’ profiles, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


MOLOCO, INC.

Cookie duration: 730 (days).

Data collected and processed: Device characteristics, Device identifiers,
Non-precise location data, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADTRIBA GMBH

Cookie duration: 730 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Device identifiers, Non-precise location data, Browsing and
interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


OBJECTIVE PARTNERS BV

Cookie duration: 90 (days).

Data collected and processed: Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ENSIGHTEN

Cookie duration: 1825 (days).

Data collected and processed: Device characteristics, Device identifiers,
Browsing and interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Legitimate interesthelp_outline


EBAY INC

Cookie duration: 90 (days).

Data collected and processed: Device characteristics, Privacy choices, IP
addresses

more




View details | Storage details | Privacy policylaunch
Consent


HURRA COMMUNICATIONS GMBH

Cookie duration: 366 (days).

Data collected and processed: Probabilistic identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Device identifiers,
Non-precise location data, Browsing and interaction data, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent

Ad partners

help_outline


GSKINNER

Privacy policylaunch
Consent


AKAMAI

Privacy policylaunch
Consent


META

Privacy policylaunch
Consent


AUNICA

Privacy policylaunch
Consent


BOOKING.COM

Privacy policylaunch
Consent


C3 METRICS

Privacy policylaunch
Consent


IBM

Privacy policylaunch
Consent


EVIDON

Privacy policylaunch
Consent


CUBED

Privacy policylaunch
Consent


OPTOMATON

Privacy policylaunch
Consent


INTELLIAD

Privacy policylaunch
Consent


ANALIGHTS

Privacy policylaunch
Consent


DSTILLERY

Privacy policylaunch
Consent


MEDIAMATH

Privacy policylaunch
Consent


ZMS

Privacy policylaunch
Consent


DENTSU AEGIS NETWORK

Privacy policylaunch
Consent


OMNICOM MEDIA GROUP

Privacy policylaunch
Consent


DIGISEG

Privacy policylaunch
Consent


RESONATE

Privacy policylaunch
Consent


SOJERN

Privacy policylaunch
Consent


HAENSEL AMS

Privacy policylaunch
Consent


BDSK HANDELS GMBH & CO. KG

Privacy policylaunch
Consent


TRADEDOUBLER AB

Privacy policylaunch
Consent


TRUSTARC

Privacy policylaunch
Consent


TRUEFFECT

Privacy policylaunch
Consent


MARKETING SCIENCE CONSULTING GROUP, INC.

Privacy policylaunch
Consent


DENTSU

Privacy policylaunch
Consent


KOBLER

Privacy policylaunch
Consent


TRAVEL DATA COLLECTIVE

Privacy policylaunch
Consent


ADVOLUTION.CONTROL

Privacy policylaunch
Consent


WIDESPACE

Privacy policylaunch
Consent


LIFESTREET

Privacy policylaunch
Consent


VIMEO

Privacy policylaunch
Consent


ADMAXIM

Privacy policylaunch
Consent


BATCH MEDIA

Privacy policylaunch
Consent


VODAFONE GMBH

Privacy policylaunch
Consent


MAGNITE

Privacy policylaunch
Consent


SCENESTEALER

Privacy policylaunch
Consent


NETQUEST

Privacy policylaunch
Consent


MANAGE.COM

Privacy policylaunch
Consent


CLOUDFLARE

Privacy policylaunch
Consent


SALESFORCE DMP

Privacy policylaunch
Consent


NETFLIX

Privacy policylaunch
Consent


MACROMILL GROUP

Privacy policylaunch
Consent


EBUILDERS

Privacy policylaunch
Consent


APPLOVIN CORP.

Privacy policylaunch
Consent


FRACTIONAL MEDIA

Privacy policylaunch
Consent


RACKSPACE

Privacy policylaunch
Consent


LIFTOFF

Privacy policylaunch
Consent


MSI-ACI

Privacy policylaunch
Consent


NAVEGG

Privacy policylaunch
Consent


ADMEDO

Privacy policylaunch
Consent


KOCHAVA

Privacy policylaunch
Consent


MOBITRANS

Privacy policylaunch
Consent


ADEX

Privacy policylaunch
Consent


IMPACT

Privacy policylaunch
Consent


SPOTAD

Privacy policylaunch
Consent


AARKI

Privacy policylaunch
Consent


SFR

Privacy policylaunch
Consent


CABLATO

Privacy policylaunch
Consent


WAYSTACK

Privacy policylaunch
Consent


TRESENSA

Privacy policylaunch
Consent

Accept all



Confirm choices

Close