SlideShare une entreprise Scribd logo
1  sur  41
Télécharger pour lire hors ligne
confiden'al	
   1	
  
Protect	
  Your	
  Users’	
  Online	
  
Privacy	
  	
  
confiden'al	
   2	
  
Today’s	
  Presenters	
  	
  
Mark	
  Prince	
  
Senior	
  Business	
  Consultant,	
  
Privacy	
  &	
  Mobile	
  
Ensighten	
  
	
  
Craig	
  Spiezle	
  
Execu've	
  Director	
  
Online	
  Trust	
  Alliance	
  (OTA)	
  
confiden'al	
   3	
  
	
  	
  
Agenda	
  
!   WHY	
  PRIVACY	
  MATTERS	
  
!   LEGISLATION	
  
!   ENHANCING	
  TRUST	
  AND	
  DATA	
  
OWNERSHIP	
  
!   Q&A	
  
confiden'al	
   4	
  
Global	
  Leader	
  in	
  Omni-­‐Channel	
  Data	
  and	
  Tag	
  Management	
  
The	
  Company:	
  
Founded:	
  	
  2009,	
  Chicago	
  
Loca?ons:	
  	
  San	
  Jose,	
  CA	
  (HQ),	
  London	
  
Funding:	
  	
  03/14:	
  $40M	
  Series	
  B,	
  	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Insight	
  Venture	
  Partners	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  09/12:	
  $15.5M	
  Series	
  A,	
  	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Voli'on	
  Capital,	
  Eastern	
  Advisors	
  
Growth:	
  	
  03/14:	
  Acquires	
  TagMan	
  	
  
Number	
  of	
  Employees:	
  185	
  
	
  
	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
	
  	
  
	
  
By	
  the	
  Numbers:	
  
525%	
  	
  ROI	
  according	
  to	
  Forrester	
  
1:1	
  omni-­‐channel	
  marke'ng	
  
100%	
  of	
  devices	
  and	
  channels	
  supported	
  
1	
  line	
  of	
  code	
  implementa'on	
  
40%	
  website	
  page	
  load	
  accelera'on	
  
$1.9	
  trillion	
  in	
  commerce	
  (total	
  revenue	
  of	
  
Ensighten’s	
  Fortune	
  500	
  customers)	
  
150+	
  countries	
  we	
  do	
  business	
  in	
  
300	
  enterprise	
  customers	
  
90%+	
  customer	
  reten'on	
  rates	
  
	
  
	
  
confiden'al	
   5	
  
	
  	
  
Ensighten	
  Manage	
  –	
  Ensighten	
  TMS	
  	
  
!   Fully	
  integrated	
  Tag	
  Management	
  System	
  
(TMS)	
  	
  
!   Deploy,	
  condi'onally	
  load	
  and	
  enrich	
  any	
  
tag	
  	
  
!   Mul'-­‐channel	
  and	
  mul'-­‐device	
  
!   Increases	
  client	
  performance	
  and	
  
responsiveness	
  
“Ensighten	
  Manage	
  gives	
  marketers	
  525%	
  
ROI”	
  
“Ensighten	
  Manage	
  gave	
  us	
  eight	
  digit	
  
ROI."	
  	
  
"We	
  were	
  able	
  to	
  run	
  hundreds	
  of	
  tests	
  
more	
  effecHvely	
  and	
  opHmize	
  for	
  
performance	
  and	
  cost."	
  	
  
confiden'al	
   6	
  
Ensighten	
  Privacy	
  Overview	
  
Real-­‐'me	
  monitoring	
  of	
  data	
  collec'on	
  
! Tracks	
  all	
  3rd-­‐party	
  website	
  tags	
  
! Covers	
  ALL	
  tags	
  on	
  your	
  site,	
  both	
  inside	
  and	
  outside	
  
the	
  TMS	
  
! Checks	
  compliance	
  with	
  your	
  privacy	
  policy	
  
	
  
Supports	
  any	
  privacy	
  prac'ces	
  
! Do	
  Not	
  Track	
  (DNT),	
  UK	
  Cookie	
  Law,	
  Site	
  TOU,	
  
Privacy	
  preferences,	
  etc.	
  
	
  
Detects	
  new	
  tags	
  automa'cally	
  
	
  
6
confiden'al	
   7	
  
! Global	
  consumer	
  electronics	
  manufacturer	
  
•  Top	
  2K	
  Alexa	
  website	
  
•  Ensighten	
  Manage	
  customer	
  
	
  
! Problem:	
  2011	
  Twiier	
  API	
  Malware	
  Outbreak	
  	
  
•  Hacker	
  found	
  way	
  to	
  pass	
  a	
  URL	
  redirect.	
  
•  Small	
  %	
  of	
  visitors	
  were	
  redirected	
  a	
  password	
  phishing	
  site.	
  
	
  
! Solu'on:	
  Listen	
  for	
  the	
  Twiier	
  response,	
  &	
  block	
  malware	
  only.	
  
	
  
! Awarded	
  Fast-­‐Track	
  Patent	
  #8,261,362,	
  Oct.	
  2012	
  
	
  
	
  
Use	
  Case:	
  Malware	
  Spawned	
  Ensighten	
  Privacy	
  
confiden'al	
   8	
  
Why	
  Does	
  Privacy	
  Maier?	
  
confiden'al	
   9	
  
Overload	
  of	
  Devices	
  and	
  Marke'ng	
  Technologies	
  
confiden'al	
   10	
  
Digital	
  Marketers	
  
	
  
ROI	
  vs.	
  Data	
  Stewardship?	
  
Data	
  Stewardship	
  vs	
  
confiden'al	
   11	
  
!   Your	
  company	
  collects	
  data	
  and	
  does	
  not	
  share	
  
it.	
  How	
  comfortable	
  are	
  you	
  with	
  your	
  data	
  
stewardship?	
  
!   Your	
  company	
  collects	
  data	
  and	
  passes	
  it	
  to	
  one	
  
technology	
  partner.	
  How	
  comfortable	
  are	
  you	
  
with	
  your	
  data	
  stewardship?	
  
!   Your	
  company	
  collects	
  data	
  and	
  passes	
  it	
  to	
  five	
  
partners.	
  How	
  comfortable	
  are	
  you	
  with	
  your	
  
data	
  stewardship?	
  
Data	
  Stewardship	
  Ques'ons	
  to	
  Ponder	
  About	
  
confiden'al	
   12	
  
Data	
  Stewardship	
  effect	
  on	
  Brand	
  Equity	
  
confiden'al	
   13	
  
Onset	
  of	
  Privacy	
  Regula'on	
  for	
  Site	
  Visitors	
  
Privacy	
  regula'on	
  in	
  Europe	
  is	
  through	
  the	
  EU	
  ePrivacy	
  
Direc've	
  
	
  
May	
  26,	
  2011	
  
The	
  EEC	
  adopted	
  E-­‐Privacy	
  Direc've	
  (Direc've	
  2009/136/EC)	
  ar'cle	
  
5(3).	
  	
  
	
  
Based	
  on	
  US	
  FIPS	
  principles,	
  the	
  main	
  parts	
  of	
  ar'cle	
  5(3)	
  of	
  
the	
  ePrivacy	
  regula'on	
  are:	
  
!   Disclosure	
  	
  
!   Consent	
  
!   Enforcement	
  
	
  
confiden'al	
   14	
  
Disclosure	
  
Company	
  
Country	
  
1’s	
  Privacy	
  
Laws	
  
Privacy	
  
Policies	
  
Country	
  
2’s	
  Privacy	
  
Laws	
  
confiden'al	
   15	
  
What	
  Cons'tutes	
  Consent?	
  
Implicit	
   Explicit	
  
All	
  Tracking	
  
Allowed	
  
Visitor	
  Offered	
  
Opt	
  Out	
  	
  
Strictly	
  Necessary	
  
Tracking	
  Allowed	
  
Visitor	
  Offered	
  
Opt	
  In	
  
Your Web PageRibbon Text
Overlay
Content
confiden'al	
   16	
  
Enforcement	
  
Unpixeling	
  
Condi'onal	
  Logic	
  
Interface	
  Only	
  
if	
  (consent)	
  then	
  {	
  fire	
  tracking	
  };	
  
-­‐-­‐Opt	
  Out	
  Request-­‐-­‐-­‐>	
  
<-­‐-­‐-­‐3rd	
  Party	
  Opt	
  Out-­‐-­‐	
  	
  
confiden'al	
   17	
  
May	
  25,	
  2011	
  
Estonia	
  
Denmark	
  
Germany	
  
Switzerland	
  
confiden'al	
   18	
  
May	
  26,	
  2012	
  
Austria	
  
Bulgaria	
  
Cyprus	
  
Czech	
  Republic	
  
Denmark	
  
France	
  
Greece	
  
Hungary	
  
Ireland	
  
Latvia	
  
Lituania	
  
Luxembourg	
  
Romania	
  
Slovakia	
  
Spain	
  
Sweden	
  
United	
  Kingdom	
  
confiden'al	
   19	
  
May	
  6,	
  2013	
  
Belgium	
  
Italy	
  
Netherlands	
  
Poland	
  
Portugal	
  
Slovenia	
  
confiden'al	
   20	
  
Todays	
  Privacy	
  Enforcement	
  	
  
Australia	
  
China	
  
India	
  
Japan	
  
Malaysia	
  
Mexico	
  
New	
  Zealand	
  
Norway	
  
Republic	
  of	
  Korea	
  
Singapore	
  
confiden'al	
   21	
  
US	
  Privacy	
  Policy	
  is	
  Through	
  Self-­‐regula'on	
  and	
  Technology	
  
DO	
  NOT	
  
TRACK	
  
confiden'al	
   22	
  
How	
  has	
  the	
  US	
  Policy	
  Fared?	
  
Congress	
  must	
  "make	
  sure	
  standards	
  and	
  rules	
  exist	
  to	
  ensure	
  consumers	
  do	
  not	
  have	
  to	
  be	
  
more	
  tech	
  savvy	
  than	
  cyber	
  criminals	
  to	
  stay	
  safe	
  online.”	
  –	
  Sen.	
  John	
  McCain	
  
confiden'al	
   23	
  
So,	
  What’s	
  the	
  Outlook	
  in	
  the	
  US?	
  
	
  
“Privacy	
  protec'on	
  cannot	
  be	
  achieved	
  
by	
  technical	
  measures	
  alone”	
  
The	
  US	
  Government’s	
  Posi'on	
  on	
  Privacy	
  Regula'on	
  “fundamentally	
  places	
  the	
  
burden	
  of	
  privacy	
  protec'on	
  on	
  the	
  individual”	
  
	
  
“Rules	
  and	
  regula'ons	
  provide	
  both	
  
deterrence	
  of	
  harmful	
  ac'ons	
  and	
  
incen'ves	
  to	
  deploy	
  privacy-­‐
protec'ng	
  technologies”	
  	
  
confiden'al	
   24	
  
40%	
  of	
  the	
  Largest	
  Data	
  Breaches	
  Happened	
  in	
  2013	
  	
  
	
  
Tech	
  	
  
	
  
Government	
  &	
  
Educa'on	
  
Finance	
  &	
  Health	
  
	
  
Bricks	
  &	
  Mortar	
  
	
  
Breaches	
  
confiden'al	
   25	
  
Why	
  are	
  we	
  working	
  with	
  OTA?	
  
	
  
Today	
  we	
  have	
  already	
  spoken	
  about:	
  
•  The	
  Complexity	
  of	
  a	
  Corpora'on’s	
  Web	
  Presence	
  
•  Data	
  Stewardship	
  
•  Effects	
  on	
  your	
  Brand	
  
•  Website	
  Visitor	
  Privacy	
  Regula'on	
  Worldwide	
  
•  Current	
  Events	
  
•  Data	
  Breaches	
  
	
  
We	
  have	
  covered	
  a	
  lot	
  today…	
  
	
  
…the	
  OTA	
  does	
  much	
  more!	
  
	
  
OTA Overview
Enhancing Trust & Data
Stewardship
Craig Spiezle
Executive Director & President, OTA
https://otalliance.org
Who Is OTA?
Mission - To enhance online trust and empowering
users, while promoting innovation and the vitality of
the internet.
•  Goal to help educate businesses, policy makers and stakeholders
while developing and advancing best practices and tools to
enhance the protection of users' security, privacy and identity.
•  OTA supports collaborative public-private partnerships, benchmark
reporting, meaningful self-regulation and data stewardship.
•  IRS approved 501c3 tax-exempt charitable organization
▫  Supported by over 100 leading brands, advertisers, marketers,
technology leaders, non-profits and government agencies.
Online Trust Audit & Honor Roll
Objectives:
•  Move from a “compliance” mindset to “stewardship”
•  Recognize leadership brands, sites & apps that implement
security and privacy practices protecting users’ data
•  Incentivize businesses and developers to enhance their
security, data protection and privacy practices
•  Make security & privacy part of a brand’s value proposition
•  Increase awareness and preference for best practices
© 2014 All rights reserved. Online Trust Alliance (OTA) Slide 28
Brand
Protection
PrivacySecurity
Honor Roll Overview
•  Analysis of ~800 web sites
▫  FDIC Banking 100
▫  Internet Retailer 500
▫  Top 50 Social
▫  Top 50 News
▫  Top 50 Gov’t
▫  OTA Members
•  Up to 100 points @ in category
•  Bonus Points
•  Negative Scoring
▫  Data loss incident
▫  Fines or settlement
▫  Other
© 2014 All rights reserved. Online Trust Alliance (OTA) Slide 5
2014 Highlights
Internet Retailer Top 10
Trends
Lowlights
Privacy
•  Privacy Policy
•  Do Not Track Status
•  Ad / Third Party Tag Mgt
•  Layered Privacy Policies
•  Bi-lingual Policies
•  Public Who Is (vs Private)
•  Data Breach Incidents
•  FTC / State Settlements
Brand
Protection
PrivacySecurity
© 2014. All rights reserved. Online Trust Alliance (OTA) Slide 26
Privacy Highlights
•  Online Trust Honor Roll https://otalliance.org/HonorRoll
•  Mobile Best Practices
https://otalliance.org/resources/mobile.html
•  2014 Data Protection & Breach Readiness Guide
https://otalliance.org/Breach.html
•  Advertising & Content Integrity https://otalliance.org/3Pintegrity.html
•  Email Security https://otalliance.org/auth.html
•  Always On SSL https://otalliance.org/AOSSL.html
•  SSL Best Practices https://otalliance.org/ssl.html
•  SSL Labs https://ssllabs.com
•  Privacy Score http://privacyscore.com/
Craig Spiezle craigs@otalliance.org+1 425-455-7400
Tools & Resources
confiden'al	
   38	
  
Q&A	
  
confiden'al	
   39	
  
Download	
  the	
  New	
  Forrester	
  White	
  Paper	
  
Forrester:	
  Big	
  Data’s	
  Big	
  Meaning	
  For	
  
Marke?ng	
  
Using	
  Big	
  Data	
  to	
  Deliver	
  Context	
  and	
  
Personaliza'on	
  at	
  Scale	
  
	
  
You’ll	
  be	
  redirected	
  to	
  download	
  the	
  white	
  paper	
  
awer	
  this	
  webinar.	
  	
  
confiden'al	
   40	
  
Thank	
  You	
  &	
  Meet	
  Ensighten	
  
www.ensighten.com	
  	
  
	
  	
  	
  	
  	
  @ensighten	
  
	
  	
  	
  	
  	
  company/ensighten	
  	
  
	
  	
  	
  	
  	
  /ensighten	
  	
  	
  
	
  	
  	
  	
  	
  www.linkedin.com/company/ensighten	
  
Tag	
  Management	
  For	
  Digital	
  Marke'ng,	
  Web	
  
Analy'cs	
  and	
  IT	
  
	
  
	
  
Web	
  
Social	
  
Discuss	
  
confiden'al	
   41	
  
Thank	
  You	
  	
  

Contenu connexe

Tendances

delphix-ebook-using-data-effectively-compliance-banking-1
delphix-ebook-using-data-effectively-compliance-banking-1delphix-ebook-using-data-effectively-compliance-banking-1
delphix-ebook-using-data-effectively-compliance-banking-1Jes Breslaw
 
GDPR: Threat or Opportunity?
GDPR: Threat or Opportunity?GDPR: Threat or Opportunity?
GDPR: Threat or Opportunity?Samuel Pouyt
 
Odi privacy v0.3
Odi privacy v0.3Odi privacy v0.3
Odi privacy v0.3odileeds
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
 
2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1cRaj Goel
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Top 10 GDPR solution providers 2020
Top 10 GDPR solution providers 2020Top 10 GDPR solution providers 2020
Top 10 GDPR solution providers 2020TheCEOViews
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securitySamo Zavašnik
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013Martin Jordan
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012Charmaine Servado
 
Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsThe Economist Media Businesses
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...TrustArc
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure BrochureDave Lloyd
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 

Tendances (20)

delphix-ebook-using-data-effectively-compliance-banking-1
delphix-ebook-using-data-effectively-compliance-banking-1delphix-ebook-using-data-effectively-compliance-banking-1
delphix-ebook-using-data-effectively-compliance-banking-1
 
GDPR: Threat or Opportunity?
GDPR: Threat or Opportunity?GDPR: Threat or Opportunity?
GDPR: Threat or Opportunity?
 
Odi privacy v0.3
Odi privacy v0.3Odi privacy v0.3
Odi privacy v0.3
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Top 10 GDPR solution providers 2020
Top 10 GDPR solution providers 2020Top 10 GDPR solution providers 2020
Top 10 GDPR solution providers 2020
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL security
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
 
Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next steps
 
DMA Data Protection 2014
DMA Data Protection 2014DMA Data Protection 2014
DMA Data Protection 2014
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure Brochure
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 

Similaire à Webinar Deck - Protect Your Users' Online Privacy

Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyTinuiti
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyFLUZO
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023Search Engine Journal
 
Google Solutions for Brands to Build a Privacy-First Strategy
Google Solutions for Brands to Build a Privacy-First StrategyGoogle Solutions for Brands to Build a Privacy-First Strategy
Google Solutions for Brands to Build a Privacy-First StrategyTinuiti
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
GDPR and Data Quality - A Service Objects webinar
GDPR and Data Quality - A Service Objects webinarGDPR and Data Quality - A Service Objects webinar
GDPR and Data Quality - A Service Objects webinarRob Manser
 
7 Steps to Build an Effective Corporate Compliance Strategy
7 Steps to Build an Effective Corporate Compliance Strategy7 Steps to Build an Effective Corporate Compliance Strategy
7 Steps to Build an Effective Corporate Compliance StrategyMaarten Boonen
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperativebutest
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 septRachel Aldighieri
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...confluent
 
deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015David Batch
 
Compliance and Deliverability Workshop
Compliance and Deliverability WorkshopCompliance and Deliverability Workshop
Compliance and Deliverability WorkshopMatt Vernhout
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Web Analytics and Privacy
Web Analytics and Privacy Web Analytics and Privacy
Web Analytics and Privacy Piwik PRO
 

Similaire à Webinar Deck - Protect Your Users' Online Privacy (20)

Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things Privacy
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Google Solutions for Brands to Build a Privacy-First Strategy
Google Solutions for Brands to Build a Privacy-First StrategyGoogle Solutions for Brands to Build a Privacy-First Strategy
Google Solutions for Brands to Build a Privacy-First Strategy
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
GDPR and Data Quality - A Service Objects webinar
GDPR and Data Quality - A Service Objects webinarGDPR and Data Quality - A Service Objects webinar
GDPR and Data Quality - A Service Objects webinar
 
7 Steps to Build an Effective Corporate Compliance Strategy
7 Steps to Build an Effective Corporate Compliance Strategy7 Steps to Build an Effective Corporate Compliance Strategy
7 Steps to Build an Effective Corporate Compliance Strategy
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 sept
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
 
deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015
 
Compliance and Deliverability Workshop
Compliance and Deliverability WorkshopCompliance and Deliverability Workshop
Compliance and Deliverability Workshop
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Web Analytics and Privacy
Web Analytics and Privacy Web Analytics and Privacy
Web Analytics and Privacy
 

Plus de Ensighten

Tag Management : A Key Component of an International Digital Strategy
Tag Management : A Key Component of an International Digital StrategyTag Management : A Key Component of an International Digital Strategy
Tag Management : A Key Component of an International Digital StrategyEnsighten
 
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...Ensighten
 
Beyond The Forecast: Forecasters of Feeling, Influencers of Behavior
Beyond The Forecast: Forecasters of Feeling, Influencers of BehaviorBeyond The Forecast: Forecasters of Feeling, Influencers of Behavior
Beyond The Forecast: Forecasters of Feeling, Influencers of BehaviorEnsighten
 
Scientists & Storytellers: CDW’s Journey Toward 1:1 Marketing
Scientists & Storytellers: CDW’s Journey Toward 1:1 MarketingScientists & Storytellers: CDW’s Journey Toward 1:1 Marketing
Scientists & Storytellers: CDW’s Journey Toward 1:1 MarketingEnsighten
 
Mobile Apps: No Longer a Black Box of Digital Measurement
Mobile Apps: No Longer a Black Box of Digital MeasurementMobile Apps: No Longer a Black Box of Digital Measurement
Mobile Apps: No Longer a Black Box of Digital MeasurementEnsighten
 
How Omni-Channel Data Collection Can Power Marketing Measurement
How Omni-Channel Data Collection Can Power Marketing MeasurementHow Omni-Channel Data Collection Can Power Marketing Measurement
How Omni-Channel Data Collection Can Power Marketing MeasurementEnsighten
 
Using Ensighten to Personalize the Customer Experience
Using Ensighten to Personalize the Customer ExperienceUsing Ensighten to Personalize the Customer Experience
Using Ensighten to Personalize the Customer ExperienceEnsighten
 
Making Your Site Vendor Agnostic via a Modern Data Layer
Making Your Site Vendor Agnostic via a Modern Data LayerMaking Your Site Vendor Agnostic via a Modern Data Layer
Making Your Site Vendor Agnostic via a Modern Data LayerEnsighten
 
Heavyweight Martech Debate
Heavyweight Martech DebateHeavyweight Martech Debate
Heavyweight Martech DebateEnsighten
 
Vision stratégique d’Ensighten
Vision stratégique d’EnsightenVision stratégique d’Ensighten
Vision stratégique d’EnsightenEnsighten
 
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...Ensighten
 
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...Ensighten
 
Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...Ensighten
 
Modernisez votre marketing digital en 4 étapes
Modernisez votre marketing digital en 4 étapesModernisez votre marketing digital en 4 étapes
Modernisez votre marketing digital en 4 étapesEnsighten
 
Rethinking the Consumer Journey
Rethinking the Consumer JourneyRethinking the Consumer Journey
Rethinking the Consumer JourneyEnsighten
 
Hacking Marketing: Marketing Management in a Software World
Hacking Marketing: Marketing Management in a Software WorldHacking Marketing: Marketing Management in a Software World
Hacking Marketing: Marketing Management in a Software WorldEnsighten
 
Building an Effective Data Governance Framework
Building an Effective Data Governance FrameworkBuilding an Effective Data Governance Framework
Building an Effective Data Governance FrameworkEnsighten
 
Enterprise TMS: The Strategic Advantage
Enterprise TMS: The Strategic AdvantageEnterprise TMS: The Strategic Advantage
Enterprise TMS: The Strategic AdvantageEnsighten
 
Tag Management: The Glue that Brings IT and Marketing Together
Tag Management: The Glue that Brings IT and Marketing TogetherTag Management: The Glue that Brings IT and Marketing Together
Tag Management: The Glue that Brings IT and Marketing TogetherEnsighten
 
Changing Human Behavior Through Data-Driven Experiences
Changing Human Behavior Through Data-Driven ExperiencesChanging Human Behavior Through Data-Driven Experiences
Changing Human Behavior Through Data-Driven ExperiencesEnsighten
 

Plus de Ensighten (20)

Tag Management : A Key Component of an International Digital Strategy
Tag Management : A Key Component of an International Digital StrategyTag Management : A Key Component of an International Digital Strategy
Tag Management : A Key Component of an International Digital Strategy
 
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...
 
Beyond The Forecast: Forecasters of Feeling, Influencers of Behavior
Beyond The Forecast: Forecasters of Feeling, Influencers of BehaviorBeyond The Forecast: Forecasters of Feeling, Influencers of Behavior
Beyond The Forecast: Forecasters of Feeling, Influencers of Behavior
 
Scientists & Storytellers: CDW’s Journey Toward 1:1 Marketing
Scientists & Storytellers: CDW’s Journey Toward 1:1 MarketingScientists & Storytellers: CDW’s Journey Toward 1:1 Marketing
Scientists & Storytellers: CDW’s Journey Toward 1:1 Marketing
 
Mobile Apps: No Longer a Black Box of Digital Measurement
Mobile Apps: No Longer a Black Box of Digital MeasurementMobile Apps: No Longer a Black Box of Digital Measurement
Mobile Apps: No Longer a Black Box of Digital Measurement
 
How Omni-Channel Data Collection Can Power Marketing Measurement
How Omni-Channel Data Collection Can Power Marketing MeasurementHow Omni-Channel Data Collection Can Power Marketing Measurement
How Omni-Channel Data Collection Can Power Marketing Measurement
 
Using Ensighten to Personalize the Customer Experience
Using Ensighten to Personalize the Customer ExperienceUsing Ensighten to Personalize the Customer Experience
Using Ensighten to Personalize the Customer Experience
 
Making Your Site Vendor Agnostic via a Modern Data Layer
Making Your Site Vendor Agnostic via a Modern Data LayerMaking Your Site Vendor Agnostic via a Modern Data Layer
Making Your Site Vendor Agnostic via a Modern Data Layer
 
Heavyweight Martech Debate
Heavyweight Martech DebateHeavyweight Martech Debate
Heavyweight Martech Debate
 
Vision stratégique d’Ensighten
Vision stratégique d’EnsightenVision stratégique d’Ensighten
Vision stratégique d’Ensighten
 
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...
 
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...
 
Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...
 
Modernisez votre marketing digital en 4 étapes
Modernisez votre marketing digital en 4 étapesModernisez votre marketing digital en 4 étapes
Modernisez votre marketing digital en 4 étapes
 
Rethinking the Consumer Journey
Rethinking the Consumer JourneyRethinking the Consumer Journey
Rethinking the Consumer Journey
 
Hacking Marketing: Marketing Management in a Software World
Hacking Marketing: Marketing Management in a Software WorldHacking Marketing: Marketing Management in a Software World
Hacking Marketing: Marketing Management in a Software World
 
Building an Effective Data Governance Framework
Building an Effective Data Governance FrameworkBuilding an Effective Data Governance Framework
Building an Effective Data Governance Framework
 
Enterprise TMS: The Strategic Advantage
Enterprise TMS: The Strategic AdvantageEnterprise TMS: The Strategic Advantage
Enterprise TMS: The Strategic Advantage
 
Tag Management: The Glue that Brings IT and Marketing Together
Tag Management: The Glue that Brings IT and Marketing TogetherTag Management: The Glue that Brings IT and Marketing Together
Tag Management: The Glue that Brings IT and Marketing Together
 
Changing Human Behavior Through Data-Driven Experiences
Changing Human Behavior Through Data-Driven ExperiencesChanging Human Behavior Through Data-Driven Experiences
Changing Human Behavior Through Data-Driven Experiences
 

Dernier

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Dernier (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Webinar Deck - Protect Your Users' Online Privacy

  • 1. confiden'al   1   Protect  Your  Users’  Online   Privacy    
  • 2. confiden'al   2   Today’s  Presenters     Mark  Prince   Senior  Business  Consultant,   Privacy  &  Mobile   Ensighten     Craig  Spiezle   Execu've  Director   Online  Trust  Alliance  (OTA)  
  • 3. confiden'al   3       Agenda   !   WHY  PRIVACY  MATTERS   !   LEGISLATION   !   ENHANCING  TRUST  AND  DATA   OWNERSHIP   !   Q&A  
  • 4. confiden'al   4   Global  Leader  in  Omni-­‐Channel  Data  and  Tag  Management   The  Company:   Founded:    2009,  Chicago   Loca?ons:    San  Jose,  CA  (HQ),  London   Funding:    03/14:  $40M  Series  B,                                        Insight  Venture  Partners                                      09/12:  $15.5M  Series  A,                                        Voli'on  Capital,  Eastern  Advisors   Growth:    03/14:  Acquires  TagMan     Number  of  Employees:  185                                       By  the  Numbers:   525%    ROI  according  to  Forrester   1:1  omni-­‐channel  marke'ng   100%  of  devices  and  channels  supported   1  line  of  code  implementa'on   40%  website  page  load  accelera'on   $1.9  trillion  in  commerce  (total  revenue  of   Ensighten’s  Fortune  500  customers)   150+  countries  we  do  business  in   300  enterprise  customers   90%+  customer  reten'on  rates      
  • 5. confiden'al   5       Ensighten  Manage  –  Ensighten  TMS     !   Fully  integrated  Tag  Management  System   (TMS)     !   Deploy,  condi'onally  load  and  enrich  any   tag     !   Mul'-­‐channel  and  mul'-­‐device   !   Increases  client  performance  and   responsiveness   “Ensighten  Manage  gives  marketers  525%   ROI”   “Ensighten  Manage  gave  us  eight  digit   ROI."     "We  were  able  to  run  hundreds  of  tests   more  effecHvely  and  opHmize  for   performance  and  cost."    
  • 6. confiden'al   6   Ensighten  Privacy  Overview   Real-­‐'me  monitoring  of  data  collec'on   ! Tracks  all  3rd-­‐party  website  tags   ! Covers  ALL  tags  on  your  site,  both  inside  and  outside   the  TMS   ! Checks  compliance  with  your  privacy  policy     Supports  any  privacy  prac'ces   ! Do  Not  Track  (DNT),  UK  Cookie  Law,  Site  TOU,   Privacy  preferences,  etc.     Detects  new  tags  automa'cally     6
  • 7. confiden'al   7   ! Global  consumer  electronics  manufacturer   •  Top  2K  Alexa  website   •  Ensighten  Manage  customer     ! Problem:  2011  Twiier  API  Malware  Outbreak     •  Hacker  found  way  to  pass  a  URL  redirect.   •  Small  %  of  visitors  were  redirected  a  password  phishing  site.     ! Solu'on:  Listen  for  the  Twiier  response,  &  block  malware  only.     ! Awarded  Fast-­‐Track  Patent  #8,261,362,  Oct.  2012       Use  Case:  Malware  Spawned  Ensighten  Privacy  
  • 8. confiden'al   8   Why  Does  Privacy  Maier?  
  • 9. confiden'al   9   Overload  of  Devices  and  Marke'ng  Technologies  
  • 10. confiden'al   10   Digital  Marketers     ROI  vs.  Data  Stewardship?   Data  Stewardship  vs  
  • 11. confiden'al   11   !   Your  company  collects  data  and  does  not  share   it.  How  comfortable  are  you  with  your  data   stewardship?   !   Your  company  collects  data  and  passes  it  to  one   technology  partner.  How  comfortable  are  you   with  your  data  stewardship?   !   Your  company  collects  data  and  passes  it  to  five   partners.  How  comfortable  are  you  with  your   data  stewardship?   Data  Stewardship  Ques'ons  to  Ponder  About  
  • 12. confiden'al   12   Data  Stewardship  effect  on  Brand  Equity  
  • 13. confiden'al   13   Onset  of  Privacy  Regula'on  for  Site  Visitors   Privacy  regula'on  in  Europe  is  through  the  EU  ePrivacy   Direc've     May  26,  2011   The  EEC  adopted  E-­‐Privacy  Direc've  (Direc've  2009/136/EC)  ar'cle   5(3).       Based  on  US  FIPS  principles,  the  main  parts  of  ar'cle  5(3)  of   the  ePrivacy  regula'on  are:   !   Disclosure     !   Consent   !   Enforcement    
  • 14. confiden'al   14   Disclosure   Company   Country   1’s  Privacy   Laws   Privacy   Policies   Country   2’s  Privacy   Laws  
  • 15. confiden'al   15   What  Cons'tutes  Consent?   Implicit   Explicit   All  Tracking   Allowed   Visitor  Offered   Opt  Out     Strictly  Necessary   Tracking  Allowed   Visitor  Offered   Opt  In   Your Web PageRibbon Text Overlay Content
  • 16. confiden'al   16   Enforcement   Unpixeling   Condi'onal  Logic   Interface  Only   if  (consent)  then  {  fire  tracking  };   -­‐-­‐Opt  Out  Request-­‐-­‐-­‐>   <-­‐-­‐-­‐3rd  Party  Opt  Out-­‐-­‐    
  • 17. confiden'al   17   May  25,  2011   Estonia   Denmark   Germany   Switzerland  
  • 18. confiden'al   18   May  26,  2012   Austria   Bulgaria   Cyprus   Czech  Republic   Denmark   France   Greece   Hungary   Ireland   Latvia   Lituania   Luxembourg   Romania   Slovakia   Spain   Sweden   United  Kingdom  
  • 19. confiden'al   19   May  6,  2013   Belgium   Italy   Netherlands   Poland   Portugal   Slovenia  
  • 20. confiden'al   20   Todays  Privacy  Enforcement     Australia   China   India   Japan   Malaysia   Mexico   New  Zealand   Norway   Republic  of  Korea   Singapore  
  • 21. confiden'al   21   US  Privacy  Policy  is  Through  Self-­‐regula'on  and  Technology   DO  NOT   TRACK  
  • 22. confiden'al   22   How  has  the  US  Policy  Fared?   Congress  must  "make  sure  standards  and  rules  exist  to  ensure  consumers  do  not  have  to  be   more  tech  savvy  than  cyber  criminals  to  stay  safe  online.”  –  Sen.  John  McCain  
  • 23. confiden'al   23   So,  What’s  the  Outlook  in  the  US?     “Privacy  protec'on  cannot  be  achieved   by  technical  measures  alone”   The  US  Government’s  Posi'on  on  Privacy  Regula'on  “fundamentally  places  the   burden  of  privacy  protec'on  on  the  individual”     “Rules  and  regula'ons  provide  both   deterrence  of  harmful  ac'ons  and   incen'ves  to  deploy  privacy-­‐ protec'ng  technologies”    
  • 24. confiden'al   24   40%  of  the  Largest  Data  Breaches  Happened  in  2013       Tech       Government  &   Educa'on   Finance  &  Health     Bricks  &  Mortar     Breaches  
  • 25. confiden'al   25   Why  are  we  working  with  OTA?     Today  we  have  already  spoken  about:   •  The  Complexity  of  a  Corpora'on’s  Web  Presence   •  Data  Stewardship   •  Effects  on  your  Brand   •  Website  Visitor  Privacy  Regula'on  Worldwide   •  Current  Events   •  Data  Breaches     We  have  covered  a  lot  today…     …the  OTA  does  much  more!    
  • 26. OTA Overview Enhancing Trust & Data Stewardship Craig Spiezle Executive Director & President, OTA https://otalliance.org
  • 27. Who Is OTA? Mission - To enhance online trust and empowering users, while promoting innovation and the vitality of the internet. •  Goal to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users' security, privacy and identity. •  OTA supports collaborative public-private partnerships, benchmark reporting, meaningful self-regulation and data stewardship. •  IRS approved 501c3 tax-exempt charitable organization ▫  Supported by over 100 leading brands, advertisers, marketers, technology leaders, non-profits and government agencies.
  • 28. Online Trust Audit & Honor Roll Objectives: •  Move from a “compliance” mindset to “stewardship” •  Recognize leadership brands, sites & apps that implement security and privacy practices protecting users’ data •  Incentivize businesses and developers to enhance their security, data protection and privacy practices •  Make security & privacy part of a brand’s value proposition •  Increase awareness and preference for best practices © 2014 All rights reserved. Online Trust Alliance (OTA) Slide 28
  • 29. Brand Protection PrivacySecurity Honor Roll Overview •  Analysis of ~800 web sites ▫  FDIC Banking 100 ▫  Internet Retailer 500 ▫  Top 50 Social ▫  Top 50 News ▫  Top 50 Gov’t ▫  OTA Members •  Up to 100 points @ in category •  Bonus Points •  Negative Scoring ▫  Data loss incident ▫  Fines or settlement ▫  Other © 2014 All rights reserved. Online Trust Alliance (OTA) Slide 5
  • 32.
  • 35. Privacy •  Privacy Policy •  Do Not Track Status •  Ad / Third Party Tag Mgt •  Layered Privacy Policies •  Bi-lingual Policies •  Public Who Is (vs Private) •  Data Breach Incidents •  FTC / State Settlements Brand Protection PrivacySecurity © 2014. All rights reserved. Online Trust Alliance (OTA) Slide 26
  • 37. •  Online Trust Honor Roll https://otalliance.org/HonorRoll •  Mobile Best Practices https://otalliance.org/resources/mobile.html •  2014 Data Protection & Breach Readiness Guide https://otalliance.org/Breach.html •  Advertising & Content Integrity https://otalliance.org/3Pintegrity.html •  Email Security https://otalliance.org/auth.html •  Always On SSL https://otalliance.org/AOSSL.html •  SSL Best Practices https://otalliance.org/ssl.html •  SSL Labs https://ssllabs.com •  Privacy Score http://privacyscore.com/ Craig Spiezle craigs@otalliance.org+1 425-455-7400 Tools & Resources
  • 38. confiden'al   38   Q&A  
  • 39. confiden'al   39   Download  the  New  Forrester  White  Paper   Forrester:  Big  Data’s  Big  Meaning  For   Marke?ng   Using  Big  Data  to  Deliver  Context  and   Personaliza'on  at  Scale     You’ll  be  redirected  to  download  the  white  paper   awer  this  webinar.    
  • 40. confiden'al   40   Thank  You  &  Meet  Ensighten   www.ensighten.com              @ensighten            company/ensighten              /ensighten                www.linkedin.com/company/ensighten   Tag  Management  For  Digital  Marke'ng,  Web   Analy'cs  and  IT       Web   Social   Discuss  
  • 41. confiden'al   41   Thank  You