SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Digital Privacy Data Security
Best Practices Act (H.R.661) SAFE Data Act. (H.R.2577)
Do Not Track Me Online Act (H.R.654) Data Security & Breach Act (S.1207)
Commercial Privacy BOR (S.799) Data Accountability & Trust Act (H.R.1707 & 1841)
Consumer Privacy Protection (H.R.1528) Personal Data Privacy & Security (S.1151)
Do Not Track Kids Act (H.R.1895) Data Security Act (S.1434)
Do-Not-Track Online Act (S.913) Personal Data Protection & Breach Accountability Act. (S.1535)
Geolocational Privacy and Surveillance Act (H.R.2168/S.1212) Data Security Act (S.1434)
Location Privacy Protection Act (S.1223) Data Security and Breach Notification Act (S.3333)
Social net Online Protection (H.R.5050)
Electronic Communications Privacy Act Amendments Act (S.1011)
Marketers Consumers
VS.
Survey: Perceptions of Marketing Permission
Marketers Consumers
VS.
70%
Require Permission
58%
Purchase Lists
Marketers Consumers
VS.
63%
Require Permission
55%
Purchase Lists
Marketers Consumers
VS.
72%
Don’t Want to Share
51%
Purchase 3rd
Party Data
Marketers Consumers
VS.
85%
Don’t Want to Be
Tracked
41%
Tracking OK
19%
No Answer
Marketers Consumers
VS.
59%
Require Permission
61%
Permission is
Needed
Regulated
Permission
Consumers
How do you get permission
in the first place?
Why change if non-
permission works?
• Expensive
• Inefficient
• Time Consuming
• Inefficient
• Time Consuming
Your Website
iTunes, Google Play
Piggyback
4 Rules
• Be where consumers are already making
decisions
• Partner with contextually relevant brands
• Be transparent with your opt-in process
• Immediately follow up
Classic Ecommerce Piggyback
Piggyback “Co-Registration” – Listing Building & Leads
Piggyback “Co-Liking, Co-Following” – Build Social Media Following
The ethic of reciprocity
“One should treat others as one would like
others to treat oneself”
Ancient Babylon
Ancient China
Ancient Egypt
Ancient Greece
Ancient Judea
Ancient India
Ancient Tamizhagam
Bahá'í Faith
Buddhism
Christianity
Confucianism
Confucianism
Hinduism
Humanism
Islam
Jainism
Judaism
Sikhism
Taoism
Human Rights
Psychology
Sociology
THANK YOU!
Élie Ashery
elie@RegReady.com
http://www.RegReady.com

Weitere ähnliche Inhalte

Ähnlich wie Perceptions of Marketing Permission

C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315
Colin Zick
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
Vivastream
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
DDMA
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
itgsabc
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Vivastream
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Matthew Kurnava
 

Ähnlich wie Perceptions of Marketing Permission (19)

C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS 2015- Assessing the Risk of Identity and Access- Venkat RajajiCIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
Assessing the Risk of Identity and Access
Assessing the Risk of Identity and AccessAssessing the Risk of Identity and Access
Assessing the Risk of Identity and Access
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 
Personal Data Protection in Brazil
Personal Data Protection in BrazilPersonal Data Protection in Brazil
Personal Data Protection in Brazil
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Consumer Privacy Online | JMC 8416
Consumer Privacy Online | JMC 8416Consumer Privacy Online | JMC 8416
Consumer Privacy Online | JMC 8416
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
Technology Trends: Value Office
Technology Trends: Value OfficeTechnology Trends: Value Office
Technology Trends: Value Office
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
 

Kürzlich hochgeladen

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Kürzlich hochgeladen (20)

Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 

Perceptions of Marketing Permission

Hinweis der Redaktion

  1. Permission Marketing. The term encapsulated 15 years ago in the title of Seth Godin’s book is just now having a real meaning. Mr. Godin was way ahead of the curve in 1998, but now he’s caught up. The Golden Age of marketing is also birthing a strong movement toward permission. Why permission marketing? We’re in a time where anything and everything is converted into a marketing channel. Marketers simply have too much
  2. Consumers have had it with intrusive marketing.The same technology that has enabled marketers is now affording consumers the means to ignore and block unwanted messaging. Everything from spam filters to desktop and mobile ad filtering are gradually being adopted by the masses. Even content distributors are testing the waters. I’m sure as many of you know the ad hopper from Dish now lets its users watch some primetime commercial free programming. More importantly, consumers are taking their frustration to their legislators.
  3. There are now over 15 bills pending in Congress that would essentially allow consumers to block or filter a number of various marketing messages. Senator Jay Rockefeller recently reintroduced the “Do Not Track of 2013” essentially giving consumers the power to opt-out of any online tracking greatly reducing the promise of Big Data for marketing purposes. To really comprehend these effects, just ask any CEO or marketer in the bulls eye of the Do-Not-Call Implementation Act of 2003. That was a result of marketers having too much of a good thing.
  4. As a result of enhanced data analysis, marketers are finally realizing that we don’t think like normal consumers – especially in the area of marketing permission. We are a special breed that requires we walk in other people’s shoes however we often forget to do that. This is why RegReady put together a survey asking over 1,000 consumers and 120 marketers about their opinions on marketing permission and how the best way to acquire consumer permission. Some of the findings are to be expected, others not so much.
  5. The first statistic regarding email marketing is not surprising.70% of consumers surveyed generally require that they give their permission before being marketed to via email yet 58% of marketers still purchase email lists. BTW there’s no such thing as purchasing an opt-in email list. Secondary permission in email marketing doesn’t scale well. Just ask anyone from Yahoo or Google’s email divisions if your mail is going to get through. It won’t.
  6. The postal service statistic is not too surprising. Consumers have been conditioned for generations that the postal service is a non-permissioned marketing channel. It’s interesting because consumers indicated environmental concerns as their biggest issue with mail.
  7. 51% of marketers admit to purchasing 3rd party data – I believe this stat is much higher.72% of consumers don’t want to their personal data to be shared amongst marketers.
  8. Tracking has become a new phenomenon and more of a controversial subject. Since marketers can now use big data in conjunction with tracking – targeting is much more precise. It also brings up privacy concerns for consumers. 20% of marketers refused to answer the question. And 85% of consumers felt very strongly that their online activities shouldn’t be tracked.
  9. There was an even split when it came to marketing on a mobile device. We think the reason for this is that mobile devices are regulated and subject to carrier use as well.
  10. To help marketers understand permission better we created a framework called The Permission Marketing Curve. In this curve we classified marketing permission into four prominent categories: explicit, implied, secondary and none with their corresponding marketing activities. For example explicit permission includes marketing activities with a clear opt-in process such as receiving special deals and newsletters. Implied permission includes activities such as general purchases and contest registrations. Secondary permission includes affiliate marketing, list rentals and the purchase of so-called opt-in email lists. And no permission is pretty self explanatory. To understand the permission curve better, we compared each level of permission’s effectiveness to its complexity of acquisition. What we’ve found isn’t surprising. Consumers tend to want explicit permission from all their marketing channels yet marketers continue to hover toward the middle of the curve often confusing implied permission with explicit permission.
  11. Two Innocent questions asked by marketers all the time:Why change if non-permission works?When presented with a choice, consumers always choose permission and in the long run it delivers a higher ROI.Blocking technology and legislation will leave marketers little choice.If I need permission to market, how do I get permission in the first place? (chicken and egg)This is a very fair and important question and the simple answer its some marketing channels yield better for initiating permission.
  12. Time and technology has made it much easier to acquire marketing permission and this graph shows how various pioneering technologies and media models help bend the complexity of acquiring marketing permission. Nevertheless, permission acquisition continues to remain someone elusive.
  13. To acquire permission some marketers use offline marketing channels that can become expensive, inefficient and time consuming.
  14. Another process used by marketers is to spend a lot of money to drive people to their website or app in the hopes of opting-in for further messaging once they leave their site or download their app. This model can be inefficient and usually very time consuming.
  15. The most efficient and cost effective solution for gaining consumer permission is to piggyback from someone else. Obviously other solutions work, but this is by far the most cost effective. I always find it ironic that some industries are opposed to these types of relationships since most brands have a very hard time standing on their own. There are four basic rules to the piggyback: Be where consumers are already making decisions or have just made them. This includes making purchasing, signing up for a newsletter, downloading software or a whitepaper.Partner with strong contextually relevant brands. Very few brands stand on their own and the right permission partnerships will help to make your brand look stronger.Always be transparent with your opt-in process. If subscriber is signing up for a weekly newsletter make sure they don’t wind up on your daily mailings. Always deliver what’s promised.Immediately follow up to confirm permission. When piggybacking, a lot marketers don’t receive their data in real time which is a big no no. By the time you go to send email, the person forgot they opt-ted in.
  16. The travel industry figured out that bundling and paring online works well. This is especially true for multi-homing products and services where choices are abundant for consumers and substitutes are in easy reach. The same concepts and methodologies that the travel industry eloquently uses can be applied to others as well.
  17. Another is a newsletter sign-up. After a website visitor completes any type of registration form, four to five contextually relevant trading partner’s ads appear asking the visitor to opt-in for additional information. All opt-in mechanisms are pre-set to negative. Once a visitor has indicated a positive opt-in, the information they entered into the form is automatically transferred to the advertiser. =
  18. We’re applying the same model for mobile web and apps.
  19. The email one click lead gen is a new methodology that we have been testing and it seems to be working very nicely.
  20. As well as social media. If a visitor likes, tweets or posts, they will have the ability to do the same with other contextually relevant offers.
  21. I leave you today with a reminder of the Golden Rule. The ethic of reciprocity, “treat others as you would like to be treated” transcends every religion, philosophy and civil society. It’s a universal and globally accepted ethic that serves as a litmus test for compassion. This ethic determines how well an individual or company relates to a heterogeneous society – people outside their peer group. To understand how The Golden Rule relates to marketing one just has to wonder how many marketers signed up for the Do Not Call Registry. 21st Century technology has very much made permission marketing part of the Golden Rule. Not only is it It’s a simple rule in marketing to follow, it’s greatly appreciated and is financially agreeable.