SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Breaking Down Privacy Barriers:
    Strategies to Managing Customer Data

                          Presented by:
David Fowler, Chief Privacy and Deliverability Officer at Marketfish
       Tina Hou, Director of Product Marketing at TRUSTe

Moderator: Heidi Cohen, President, Riverside Marketing Strategies


                          Sponsored by:
Breaking Down Privacy Barriers

                  Strategies for Managing Customer Data




                              March 14, 2012




CONFIDENTIAL                                              2
TRUSTe overview

   Leader in Privacy Management Solutions
   • 14 years of privacy experience
   • Robust technology platform
   • #1 privacy brand & trustmark


   Comprehensive Solution Suite
   • All online channels
   • Global coverage
   • Self- and full-service options


   Large / Loyal Customer Base
   • Over 5,000 clients
   • SMB through Fortune 500
   • Cross vertical solutions
CONFIDENTIAL                                3
Data is a critical asset

               Businesses want to use it, and consumers
                          want to protect it




CONFIDENTIAL                                              4
Privacy mistakes are under the microscope


                                                                                                                                           2012
    2011                                                                                                        2011                       Path social
    Google settles FTC charges over                                                                             OnStar forced to reverse   network app
    “Google Buzz” privacy issues;                                                                               location tracking policy   accessing address
    company gets 20-year oversight           2011                           2011                                following privacy outcry   books without
    period                                   Netflix faces multiple         Acquisition of Borders delayed                                 permission
                                             privacy lawsuits over its      due to questions over privacy
                                             data storage practices.        rights of 46M email subscribers




                          2011
                          Playdom fined $3 million for violating                               2011
                          children’s online privacy                                            nebuAd settles $2.4
                                                                                               million privacy lawsuit
                                                                                               over behavioral targeting
                                                                                               practices
     2011
     Apple and Google weather “location                  2011
     gate” privacy scandal over their                    Broken Thumbs Apps settles FTC
     mobile devices. Apple changes                       charges that it violated children’s                                  2011
     collection practices in response.                   privacy law – company is fined                                       Following media scrutiny
                                                         and forced to destroy the data                                       over privacy practices,
                                                                                                                              Microsoft ceases to use
                                                                                                                              “supercookies” to track
                                                                                                                              users on its website


CONFIDENTIAL                                                                                                                                               5
Business implications: Cloud adoption is
   handicapped due to privacy concerns

         Customer fears…                             become barriers to sale



                Privacy and Compliance

                       Security

                        Legal




               Privacy is one of the top three obstacles to adoption of cloud
                  computing by businesses. •– KPMG 2010 Cloud Computing Survey


CONFIDENTIAL                                                                     6
Impact on Cloud and SaaS providers

     3rd party service providers need to show
         – strict and consistent data handling practices
         – a comprehensive privacy policy and adherence to these policies
         – available recourse for customers should there be a lapse in the way data is
           handled




               Data breaches, location-based services, cloud computing, offshoring,
               context-awareness and regulatory changes will dominate the privacy
               officer's agenda in 2011 and 2012.”
               – Carsten Casper, Gartner




CONFIDENTIAL                                                                             7
Establishing data management practices


                         Types of data collected




                         Access and storage




                         Third-party info sharing




                         Actual Practices

CONFIDENTIAL                                        8
Assure that your partners do the same




               Be sure to:
               • Build privacy into contracts

               • Review partner privacy policies

               • Ensure partners meet a minimum standard
                 of data protection




CONFIDENTIAL                                               9
Streamline your ability to do business

   You handle data responsibly. Prove it upfront.


   • Address the privacy concern before it can slow down sales
   • Differentiate yourself as a privacy-focused business
   • Give peace of mind to customers


   Third-party certification that your privacy practices
    adhere to the highest standards.




CONFIDENTIAL                                                     10
Case Study
 David Fowler,
 Chief Privacy & Deliverability Officer
 March 14, 2012



Proprietary & Confidential
Marketfish Overview

 Marketfish is the only fully automated lead generation platform that
  offers free access to an online marketplace for email and postal lists
  as well as the ability to build and execute marketing campaigns, all
  in under thirty minutes.


 Marketfish's cloud-based platform enables users to reach their
  perfect audience in seconds, build a campaign, and then track
  performance using real-time data. With a pay-by-campaign model,
  users only pay for what they use.
Our Privacy Challenge
 Growth in an industry mired in data privacy and compliance issues
 Mistrust due to shady characters in list management business
 Marketfish needed to:
    Differentiate via transparency of data management and privacy practices
    Ensure same privacy standards throughout their network of providers
    Foster corporate leadership with our 200(+) million database
    Change the market and disrupt the norm pertaining to the channel
    Provide marketers with better data to make smarter decisions
Approach

 Provide privacy and transparency from the ground up
 Used certification as a “privacy by design” building block
 Determined up front the privacy value proposition and not an
  afterthought
 Streamlined our privacy position in line with client expectations
 Held partners and vendors accountable for privacy compliance
 Changed the product model in the age of “big data”
Need for 3rd Party Certification

Show upfront that your data management and privacy practices are of
  the highest standard
 Certification of your service platform
 Dispute resolution
 Privacy policy/terms of service
 Regular review/updates
Privacy and Transparency From the Ground Up

    Privacy certification: Service Platform
            Validation of the total data lifecycle
            Ensure clean consumer data and with user permissions
Privacy and Transparency Across the Board

 Privacy Certification: As a
  marketer
   Trust consistent throughout the
    customer experience
   Highest standards in privacy


 Requiring partners to be
  certified as well
      Creating more transparency
Streamlined Our Ability to Do Business


 Lower customer acquisition costs
  by minimizing the back and forth during the due diligence process

 Remove sales barriers
  by addressing one of the top customer concerns up front

 Gain competitive advantage
  by showing your commitment to data privacy

 Focus on growing our business
  and let the experts advise on data privacy
Results

 Ability to address privacy concerns upfront
     More trust from our customers
     More trust from network of partners
 Shorter sales cycles
     Increased revenues
     Ability to win larger network of partners and better data
 Client and partner trust and transparency
 TRUSTe Certification is a CRITICAL compliment for your business
Q&A




CONFIDENTIAL         20

Weitere ähnliche Inhalte

Was ist angesagt?

Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Louise Spiteri
 
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...Aurélie Pols
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)RobertMachin
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
 
An architecture for privacy-enabled user profile portability on the Web of Data
An architecture for privacy-enabled user profile portability on the Web of DataAn architecture for privacy-enabled user profile portability on the Web of Data
An architecture for privacy-enabled user profile portability on the Web of DataBenjamin Heitmann
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperativebutest
 
Compliance and Deliverability Workshop
Compliance and Deliverability WorkshopCompliance and Deliverability Workshop
Compliance and Deliverability WorkshopMatt Vernhout
 
Self-service Linked Government Data
Self-service Linked Government DataSelf-service Linked Government Data
Self-service Linked Government DataFadi Maali
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 

Was ist angesagt? (9)

Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
An architecture for privacy-enabled user profile portability on the Web of Data
An architecture for privacy-enabled user profile portability on the Web of DataAn architecture for privacy-enabled user profile portability on the Web of Data
An architecture for privacy-enabled user profile portability on the Web of Data
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
 
Compliance and Deliverability Workshop
Compliance and Deliverability WorkshopCompliance and Deliverability Workshop
Compliance and Deliverability Workshop
 
Self-service Linked Government Data
Self-service Linked Government DataSelf-service Linked Government Data
Self-service Linked Government Data
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 

Andere mochten auch

Best Practices and New Practices in Insert Media
Best Practices and New Practices in Insert MediaBest Practices and New Practices in Insert Media
Best Practices and New Practices in Insert MediaVivastream
 
Creative Master class
Creative Master classCreative Master class
Creative Master classVivastream
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
How to Use Social Currency to Identify Your Brand Influencers
How to Use Social Currency to Identify Your Brand InfluencersHow to Use Social Currency to Identify Your Brand Influencers
How to Use Social Currency to Identify Your Brand InfluencersVivastream
 
SES Magazine Toronto 2012
SES Magazine Toronto 2012SES Magazine Toronto 2012
SES Magazine Toronto 2012Vivastream
 
Offshoring and outsourcing best practice
Offshoring and outsourcing best practiceOffshoring and outsourcing best practice
Offshoring and outsourcing best practiceEric Tachibana
 
The Evolution of Offshoring
The Evolution of OffshoringThe Evolution of Offshoring
The Evolution of Offshoringswiss IT bridge
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & OffshoringArun Khedwal
 
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...Nesma
 

Andere mochten auch (10)

Best Practices and New Practices in Insert Media
Best Practices and New Practices in Insert MediaBest Practices and New Practices in Insert Media
Best Practices and New Practices in Insert Media
 
Creative Master class
Creative Master classCreative Master class
Creative Master class
 
E mail marketing
E mail marketingE mail marketing
E mail marketing
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
How to Use Social Currency to Identify Your Brand Influencers
How to Use Social Currency to Identify Your Brand InfluencersHow to Use Social Currency to Identify Your Brand Influencers
How to Use Social Currency to Identify Your Brand Influencers
 
SES Magazine Toronto 2012
SES Magazine Toronto 2012SES Magazine Toronto 2012
SES Magazine Toronto 2012
 
Offshoring and outsourcing best practice
Offshoring and outsourcing best practiceOffshoring and outsourcing best practice
Offshoring and outsourcing best practice
 
The Evolution of Offshoring
The Evolution of OffshoringThe Evolution of Offshoring
The Evolution of Offshoring
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & Offshoring
 
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...
 

Ähnlich wie Breaking Down Privacy Barriers: Strategies to Managing Customer Data

Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...NextVision Media
 
7 panel - think houdini untangling website privacy and compliance
7   panel - think houdini untangling website privacy and compliance7   panel - think houdini untangling website privacy and compliance
7 panel - think houdini untangling website privacy and complianceEnsighten
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud finalguest50a642f
 
Agenda21 eu cookie seminar - dominic trigg - rocket fuel
Agenda21   eu cookie seminar - dominic trigg - rocket fuelAgenda21   eu cookie seminar - dominic trigg - rocket fuel
Agenda21 eu cookie seminar - dominic trigg - rocket fuelagenda21
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningMatt Stubbs
 
Do Not Track vs. Affiliate Marketing
Do Not Track vs. Affiliate MarketingDo Not Track vs. Affiliate Marketing
Do Not Track vs. Affiliate MarketingAffiliate Summit
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsAlfonso Sintjago
 
0830 omma data sponsored breakfast trus te
0830 omma data sponsored breakfast trus te0830 omma data sponsored breakfast trus te
0830 omma data sponsored breakfast trus teMediaPost
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfCiente
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
How to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply ChainsHow to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply ChainsSEEBURGER
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 

Ähnlich wie Breaking Down Privacy Barriers: Strategies to Managing Customer Data (20)

Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
 
7 panel - think houdini untangling website privacy and compliance
7   panel - think houdini untangling website privacy and compliance7   panel - think houdini untangling website privacy and compliance
7 panel - think houdini untangling website privacy and compliance
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
Privacy issues in the cloud
Privacy issues in the cloudPrivacy issues in the cloud
Privacy issues in the cloud
 
Agenda21 eu cookie seminar - dominic trigg - rocket fuel
Agenda21   eu cookie seminar - dominic trigg - rocket fuelAgenda21   eu cookie seminar - dominic trigg - rocket fuel
Agenda21 eu cookie seminar - dominic trigg - rocket fuel
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
 
Do Not Track vs. Affiliate Marketing
Do Not Track vs. Affiliate MarketingDo Not Track vs. Affiliate Marketing
Do Not Track vs. Affiliate Marketing
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
0830 omma data sponsored breakfast trus te
0830 omma data sponsored breakfast trus te0830 omma data sponsored breakfast trus te
0830 omma data sponsored breakfast trus te
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
How to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply ChainsHow to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply Chains
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 

Mehr von Vivastream

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceVivastream
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksVivastream
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce ReportVivastream
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014Vivastream
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking SurveyVivastream
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and MobileVivastream
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation CenterVivastream
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition SolutionsVivastream
 
Automation Services
Automation ServicesAutomation Services
Automation ServicesVivastream
 
Company Overview
Company OverviewCompany Overview
Company OverviewVivastream
 

Mehr von Vivastream (20)

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_Ecommerce
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement Roadmap
 
Test
TestTest
Test
 
Tcap
TcapTcap
Tcap
 
SQA
SQASQA
SQA
 
Jeeva jessf
Jeeva jessfJeeva jessf
Jeeva jessf
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
APEX
APEXAPEX
APEX
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce Report
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking Survey
 
Serano
SeranoSerano
Serano
 
Accura XV
Accura XVAccura XV
Accura XV
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and Mobile
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation Center
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition Solutions
 
Automation Services
Automation ServicesAutomation Services
Automation Services
 
Company Overview
Company OverviewCompany Overview
Company Overview
 

Kürzlich hochgeladen

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Kürzlich hochgeladen (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

Breaking Down Privacy Barriers: Strategies to Managing Customer Data

  • 1. Breaking Down Privacy Barriers: Strategies to Managing Customer Data Presented by: David Fowler, Chief Privacy and Deliverability Officer at Marketfish Tina Hou, Director of Product Marketing at TRUSTe Moderator: Heidi Cohen, President, Riverside Marketing Strategies Sponsored by:
  • 2. Breaking Down Privacy Barriers Strategies for Managing Customer Data March 14, 2012 CONFIDENTIAL 2
  • 3. TRUSTe overview Leader in Privacy Management Solutions • 14 years of privacy experience • Robust technology platform • #1 privacy brand & trustmark Comprehensive Solution Suite • All online channels • Global coverage • Self- and full-service options Large / Loyal Customer Base • Over 5,000 clients • SMB through Fortune 500 • Cross vertical solutions CONFIDENTIAL 3
  • 4. Data is a critical asset Businesses want to use it, and consumers want to protect it CONFIDENTIAL 4
  • 5. Privacy mistakes are under the microscope 2012 2011 2011 Path social Google settles FTC charges over OnStar forced to reverse network app “Google Buzz” privacy issues; location tracking policy accessing address company gets 20-year oversight 2011 2011 following privacy outcry books without period Netflix faces multiple Acquisition of Borders delayed permission privacy lawsuits over its due to questions over privacy data storage practices. rights of 46M email subscribers 2011 Playdom fined $3 million for violating 2011 children’s online privacy nebuAd settles $2.4 million privacy lawsuit over behavioral targeting practices 2011 Apple and Google weather “location 2011 gate” privacy scandal over their Broken Thumbs Apps settles FTC mobile devices. Apple changes charges that it violated children’s 2011 collection practices in response. privacy law – company is fined Following media scrutiny and forced to destroy the data over privacy practices, Microsoft ceases to use “supercookies” to track users on its website CONFIDENTIAL 5
  • 6. Business implications: Cloud adoption is handicapped due to privacy concerns Customer fears… become barriers to sale Privacy and Compliance Security Legal Privacy is one of the top three obstacles to adoption of cloud computing by businesses. •– KPMG 2010 Cloud Computing Survey CONFIDENTIAL 6
  • 7. Impact on Cloud and SaaS providers 3rd party service providers need to show – strict and consistent data handling practices – a comprehensive privacy policy and adherence to these policies – available recourse for customers should there be a lapse in the way data is handled Data breaches, location-based services, cloud computing, offshoring, context-awareness and regulatory changes will dominate the privacy officer's agenda in 2011 and 2012.” – Carsten Casper, Gartner CONFIDENTIAL 7
  • 8. Establishing data management practices Types of data collected Access and storage Third-party info sharing Actual Practices CONFIDENTIAL 8
  • 9. Assure that your partners do the same Be sure to: • Build privacy into contracts • Review partner privacy policies • Ensure partners meet a minimum standard of data protection CONFIDENTIAL 9
  • 10. Streamline your ability to do business You handle data responsibly. Prove it upfront. • Address the privacy concern before it can slow down sales • Differentiate yourself as a privacy-focused business • Give peace of mind to customers Third-party certification that your privacy practices adhere to the highest standards. CONFIDENTIAL 10
  • 11. Case Study David Fowler, Chief Privacy & Deliverability Officer March 14, 2012 Proprietary & Confidential
  • 12. Marketfish Overview  Marketfish is the only fully automated lead generation platform that offers free access to an online marketplace for email and postal lists as well as the ability to build and execute marketing campaigns, all in under thirty minutes.  Marketfish's cloud-based platform enables users to reach their perfect audience in seconds, build a campaign, and then track performance using real-time data. With a pay-by-campaign model, users only pay for what they use.
  • 13. Our Privacy Challenge  Growth in an industry mired in data privacy and compliance issues  Mistrust due to shady characters in list management business  Marketfish needed to:  Differentiate via transparency of data management and privacy practices  Ensure same privacy standards throughout their network of providers  Foster corporate leadership with our 200(+) million database  Change the market and disrupt the norm pertaining to the channel  Provide marketers with better data to make smarter decisions
  • 14. Approach  Provide privacy and transparency from the ground up  Used certification as a “privacy by design” building block  Determined up front the privacy value proposition and not an afterthought  Streamlined our privacy position in line with client expectations  Held partners and vendors accountable for privacy compliance  Changed the product model in the age of “big data”
  • 15. Need for 3rd Party Certification Show upfront that your data management and privacy practices are of the highest standard  Certification of your service platform  Dispute resolution  Privacy policy/terms of service  Regular review/updates
  • 16. Privacy and Transparency From the Ground Up  Privacy certification: Service Platform  Validation of the total data lifecycle  Ensure clean consumer data and with user permissions
  • 17. Privacy and Transparency Across the Board  Privacy Certification: As a marketer  Trust consistent throughout the customer experience  Highest standards in privacy  Requiring partners to be certified as well  Creating more transparency
  • 18. Streamlined Our Ability to Do Business  Lower customer acquisition costs by minimizing the back and forth during the due diligence process  Remove sales barriers by addressing one of the top customer concerns up front  Gain competitive advantage by showing your commitment to data privacy  Focus on growing our business and let the experts advise on data privacy
  • 19. Results  Ability to address privacy concerns upfront  More trust from our customers  More trust from network of partners  Shorter sales cycles  Increased revenues  Ability to win larger network of partners and better data  Client and partner trust and transparency  TRUSTe Certification is a CRITICAL compliment for your business

Hinweis der Redaktion

  1. TRUSTe can help you with your Privacy Management StrategyWe are the leader in Privacy Management SolutionsHave over a decade of experienceMany of you in attendance today are TRUSTe customersYou also probably know us by our famous Certified Privacy Seal – seen on thousands of websites, billions of consumer impressions per yearThe gold standard for companies to demonstrate their commitment to managing customer privacyWe work with companies of all sizesAcross all industriesAnd have extensive international experienceWe can help you assess your needs and put together a solution for youYou can start by visiting TRUSTe.comWe have lots of resources including our consumer research reports and past / upcoming educational webinarsIf we can help you, give us a call.I will turn things back over to Chris for some closing comments.
  2. Impact to your business:We’ve established the focus that the industry has on privacy and data management and how you can ensure that your practices are above board. You should be set right? Unfortunately, no. The fear around relinquishing control of a company’s bread and butter, their data, is still there, blocking service adoption.Even the most buttoned up businesses still find themselves jumping through hoops to prove to prospects that their business practices are sound, thereby increasing the cost and time to sale
  3. Online privacy are being scrutinized by businesses, by the media, by regulators and by consumers. And businesses are being held accountable.The EU has proposed measures ranging from regular audits of cloud services, and the Dutch government is banning usage of US cloud services due to concerns around the Patriot Act (w/in the dutchgov’t).http://www.euractiv.com/specialreport-cloud-computing/digital-cloud-providers-face-eu-privacy-audits-news-509133http://www.zdnet.com/blog/btl/dutch-government-to-ban-us-providers-over-patriot-act-concerns/58342
  4. Have a clear and detailed understanding of what information is being captured, stored and processed by your service.Types of data collectedPersonally identifiableAggregated dataHighly regulated data (ie: healthcare)Access and storageend-user access to their informationreasonable security measuresdata governance polices data retention service provider management (e.g. restrictions on what service can do)restrictions & monitoring processes to prevent app developers from abusing the platform and stored data (e.g. only offering limited feature set, monitoring data use)Third-party info sharingThe data flows (e.g. is data being shared with third parties)Contractual provisions w/ other 3rd parties to deliver platform servicesPracticeWritten policy is consistent with actual practicesplatform practicesMake sure the right measures are in place to ensure consistent handling of access permissions, storage, and deletion of data.
  5. Why does partner trust matter? Your customers have a relationship with you, not your business partners – if your partners mishandle the data you will get blamed. Customer data is one of your company’s most valuable assets and, no matter whose hands it’s in, it should be protected.