SlideShare une entreprise Scribd logo
1  sur  20
Breaking Down Privacy Barriers:
    Strategies to Managing Customer Data

                          Presented by:
David Fowler, Chief Privacy and Deliverability Officer at Marketfish
       Tina Hou, Director of Product Marketing at TRUSTe

Moderator: Heidi Cohen, President, Riverside Marketing Strategies


                          Sponsored by:
Breaking Down Privacy Barriers

                  Strategies for Managing Customer Data




                              March 14, 2012




CONFIDENTIAL                                              2
TRUSTe overview

   Leader in Privacy Management Solutions
   • 14 years of privacy experience
   • Robust technology platform
   • #1 privacy brand & trustmark


   Comprehensive Solution Suite
   • All online channels
   • Global coverage
   • Self- and full-service options


   Large / Loyal Customer Base
   • Over 5,000 clients
   • SMB through Fortune 500
   • Cross vertical solutions
CONFIDENTIAL                                3
Data is a critical asset

               Businesses want to use it, and consumers
                          want to protect it




CONFIDENTIAL                                              4
Privacy mistakes are under the microscope


                                                                                                                                           2012
    2011                                                                                                        2011                       Path social
    Google settles FTC charges over                                                                             OnStar forced to reverse   network app
    “Google Buzz” privacy issues;                                                                               location tracking policy   accessing address
    company gets 20-year oversight           2011                           2011                                following privacy outcry   books without
    period                                   Netflix faces multiple         Acquisition of Borders delayed                                 permission
                                             privacy lawsuits over its      due to questions over privacy
                                             data storage practices.        rights of 46M email subscribers




                          2011
                          Playdom fined $3 million for violating                               2011
                          children’s online privacy                                            nebuAd settles $2.4
                                                                                               million privacy lawsuit
                                                                                               over behavioral targeting
                                                                                               practices
     2011
     Apple and Google weather “location                  2011
     gate” privacy scandal over their                    Broken Thumbs Apps settles FTC
     mobile devices. Apple changes                       charges that it violated children’s                                  2011
     collection practices in response.                   privacy law – company is fined                                       Following media scrutiny
                                                         and forced to destroy the data                                       over privacy practices,
                                                                                                                              Microsoft ceases to use
                                                                                                                              “supercookies” to track
                                                                                                                              users on its website


CONFIDENTIAL                                                                                                                                               5
Business implications: Cloud adoption is
   handicapped due to privacy concerns

         Customer fears…                             become barriers to sale



                Privacy and Compliance

                       Security

                        Legal




               Privacy is one of the top three obstacles to adoption of cloud
                  computing by businesses. •– KPMG 2010 Cloud Computing Survey


CONFIDENTIAL                                                                     6
Impact on Cloud and SaaS providers

     3rd party service providers need to show
         – strict and consistent data handling practices
         – a comprehensive privacy policy and adherence to these policies
         – available recourse for customers should there be a lapse in the way data is
           handled




               Data breaches, location-based services, cloud computing, offshoring,
               context-awareness and regulatory changes will dominate the privacy
               officer's agenda in 2011 and 2012.”
               – Carsten Casper, Gartner




CONFIDENTIAL                                                                             7
Establishing data management practices


                         Types of data collected




                         Access and storage




                         Third-party info sharing




                         Actual Practices

CONFIDENTIAL                                        8
Assure that your partners do the same




               Be sure to:
               • Build privacy into contracts

               • Review partner privacy policies

               • Ensure partners meet a minimum standard
                 of data protection




CONFIDENTIAL                                               9
Streamline your ability to do business

   You handle data responsibly. Prove it upfront.


   • Address the privacy concern before it can slow down sales
   • Differentiate yourself as a privacy-focused business
   • Give peace of mind to customers


   Third-party certification that your privacy practices
    adhere to the highest standards.




CONFIDENTIAL                                                     10
Case Study
 David Fowler,
 Chief Privacy & Deliverability Officer
 March 14, 2012



Proprietary & Confidential
Marketfish Overview

 Marketfish is the only fully automated lead generation platform that
  offers free access to an online marketplace for email and postal lists
  as well as the ability to build and execute marketing campaigns, all
  in under thirty minutes.


 Marketfish's cloud-based platform enables users to reach their
  perfect audience in seconds, build a campaign, and then track
  performance using real-time data. With a pay-by-campaign model,
  users only pay for what they use.
Our Privacy Challenge
 Growth in an industry mired in data privacy and compliance issues
 Mistrust due to shady characters in list management business
 Marketfish needed to:
    Differentiate via transparency of data management and privacy practices
    Ensure same privacy standards throughout their network of providers
    Foster corporate leadership with our 200(+) million database
    Change the market and disrupt the norm pertaining to the channel
    Provide marketers with better data to make smarter decisions
Approach

 Provide privacy and transparency from the ground up
 Used certification as a “privacy by design” building block
 Determined up front the privacy value proposition and not an
  afterthought
 Streamlined our privacy position in line with client expectations
 Held partners and vendors accountable for privacy compliance
 Changed the product model in the age of “big data”
Need for 3rd Party Certification

Show upfront that your data management and privacy practices are of
  the highest standard
 Certification of your service platform
 Dispute resolution
 Privacy policy/terms of service
 Regular review/updates
Privacy and Transparency From the Ground Up

    Privacy certification: Service Platform
            Validation of the total data lifecycle
            Ensure clean consumer data and with user permissions
Privacy and Transparency Across the Board

 Privacy Certification: As a
  marketer
   Trust consistent throughout the
    customer experience
   Highest standards in privacy


 Requiring partners to be
  certified as well
      Creating more transparency
Streamlined Our Ability to Do Business


 Lower customer acquisition costs
  by minimizing the back and forth during the due diligence process

 Remove sales barriers
  by addressing one of the top customer concerns up front

 Gain competitive advantage
  by showing your commitment to data privacy

 Focus on growing our business
  and let the experts advise on data privacy
Results

 Ability to address privacy concerns upfront
     More trust from our customers
     More trust from network of partners
 Shorter sales cycles
     Increased revenues
     Ability to win larger network of partners and better data
 Client and partner trust and transparency
 TRUSTe Certification is a CRITICAL compliment for your business
Q&A




CONFIDENTIAL         20

Contenu connexe

Tendances

Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Louise Spiteri
 
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...Aurélie Pols
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)RobertMachin
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
 
An architecture for privacy-enabled user profile portability on the Web of Data
An architecture for privacy-enabled user profile portability on the Web of DataAn architecture for privacy-enabled user profile portability on the Web of Data
An architecture for privacy-enabled user profile portability on the Web of DataBenjamin Heitmann
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperativebutest
 
Compliance and Deliverability Workshop
Compliance and Deliverability WorkshopCompliance and Deliverability Workshop
Compliance and Deliverability WorkshopMatt Vernhout
 
Self-service Linked Government Data
Self-service Linked Government DataSelf-service Linked Government Data
Self-service Linked Government DataFadi Maali
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 

Tendances (9)

Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
An architecture for privacy-enabled user profile portability on the Web of Data
An architecture for privacy-enabled user profile portability on the Web of DataAn architecture for privacy-enabled user profile portability on the Web of Data
An architecture for privacy-enabled user profile portability on the Web of Data
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
 
Compliance and Deliverability Workshop
Compliance and Deliverability WorkshopCompliance and Deliverability Workshop
Compliance and Deliverability Workshop
 
Self-service Linked Government Data
Self-service Linked Government DataSelf-service Linked Government Data
Self-service Linked Government Data
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 

En vedette

Best Practices and New Practices in Insert Media
Best Practices and New Practices in Insert MediaBest Practices and New Practices in Insert Media
Best Practices and New Practices in Insert MediaVivastream
 
Creative Master class
Creative Master classCreative Master class
Creative Master classVivastream
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
How to Use Social Currency to Identify Your Brand Influencers
How to Use Social Currency to Identify Your Brand InfluencersHow to Use Social Currency to Identify Your Brand Influencers
How to Use Social Currency to Identify Your Brand InfluencersVivastream
 
SES Magazine Toronto 2012
SES Magazine Toronto 2012SES Magazine Toronto 2012
SES Magazine Toronto 2012Vivastream
 
Offshoring and outsourcing best practice
Offshoring and outsourcing best practiceOffshoring and outsourcing best practice
Offshoring and outsourcing best practiceEric Tachibana
 
The Evolution of Offshoring
The Evolution of OffshoringThe Evolution of Offshoring
The Evolution of Offshoringswiss IT bridge
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & OffshoringArun Khedwal
 
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...Nesma
 

En vedette (10)

Best Practices and New Practices in Insert Media
Best Practices and New Practices in Insert MediaBest Practices and New Practices in Insert Media
Best Practices and New Practices in Insert Media
 
Creative Master class
Creative Master classCreative Master class
Creative Master class
 
E mail marketing
E mail marketingE mail marketing
E mail marketing
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
How to Use Social Currency to Identify Your Brand Influencers
How to Use Social Currency to Identify Your Brand InfluencersHow to Use Social Currency to Identify Your Brand Influencers
How to Use Social Currency to Identify Your Brand Influencers
 
SES Magazine Toronto 2012
SES Magazine Toronto 2012SES Magazine Toronto 2012
SES Magazine Toronto 2012
 
Offshoring and outsourcing best practice
Offshoring and outsourcing best practiceOffshoring and outsourcing best practice
Offshoring and outsourcing best practice
 
The Evolution of Offshoring
The Evolution of OffshoringThe Evolution of Offshoring
The Evolution of Offshoring
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & Offshoring
 
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...
Nesma autumn conference - Deep Dive into the true cost of offshoring - Darja ...
 

Similaire à Breaking Down Privacy Barriers: Strategies to Managing Customer Data

Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...NextVision Media
 
7 panel - think houdini untangling website privacy and compliance
7   panel - think houdini untangling website privacy and compliance7   panel - think houdini untangling website privacy and compliance
7 panel - think houdini untangling website privacy and complianceEnsighten
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud finalguest50a642f
 
Agenda21 eu cookie seminar - dominic trigg - rocket fuel
Agenda21   eu cookie seminar - dominic trigg - rocket fuelAgenda21   eu cookie seminar - dominic trigg - rocket fuel
Agenda21 eu cookie seminar - dominic trigg - rocket fuelagenda21
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningMatt Stubbs
 
Do Not Track vs. Affiliate Marketing
Do Not Track vs. Affiliate MarketingDo Not Track vs. Affiliate Marketing
Do Not Track vs. Affiliate MarketingAffiliate Summit
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsAlfonso Sintjago
 
0830 omma data sponsored breakfast trus te
0830 omma data sponsored breakfast trus te0830 omma data sponsored breakfast trus te
0830 omma data sponsored breakfast trus teMediaPost
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfCiente
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
How to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply ChainsHow to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply ChainsSEEBURGER
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 

Similaire à Breaking Down Privacy Barriers: Strategies to Managing Customer Data (20)

Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
 
7 panel - think houdini untangling website privacy and compliance
7   panel - think houdini untangling website privacy and compliance7   panel - think houdini untangling website privacy and compliance
7 panel - think houdini untangling website privacy and compliance
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
Privacy issues in the cloud
Privacy issues in the cloudPrivacy issues in the cloud
Privacy issues in the cloud
 
Agenda21 eu cookie seminar - dominic trigg - rocket fuel
Agenda21   eu cookie seminar - dominic trigg - rocket fuelAgenda21   eu cookie seminar - dominic trigg - rocket fuel
Agenda21 eu cookie seminar - dominic trigg - rocket fuel
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
 
Do Not Track vs. Affiliate Marketing
Do Not Track vs. Affiliate MarketingDo Not Track vs. Affiliate Marketing
Do Not Track vs. Affiliate Marketing
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
0830 omma data sponsored breakfast trus te
0830 omma data sponsored breakfast trus te0830 omma data sponsored breakfast trus te
0830 omma data sponsored breakfast trus te
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
How to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply ChainsHow to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply Chains
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 

Plus de Vivastream

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceVivastream
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksVivastream
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce ReportVivastream
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014Vivastream
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking SurveyVivastream
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and MobileVivastream
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation CenterVivastream
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition SolutionsVivastream
 
Automation Services
Automation ServicesAutomation Services
Automation ServicesVivastream
 
Company Overview
Company OverviewCompany Overview
Company OverviewVivastream
 

Plus de Vivastream (20)

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_Ecommerce
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement Roadmap
 
Test
TestTest
Test
 
Tcap
TcapTcap
Tcap
 
SQA
SQASQA
SQA
 
Jeeva jessf
Jeeva jessfJeeva jessf
Jeeva jessf
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
APEX
APEXAPEX
APEX
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce Report
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking Survey
 
Serano
SeranoSerano
Serano
 
Accura XV
Accura XVAccura XV
Accura XV
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and Mobile
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation Center
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition Solutions
 
Automation Services
Automation ServicesAutomation Services
Automation Services
 
Company Overview
Company OverviewCompany Overview
Company Overview
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Breaking Down Privacy Barriers: Strategies to Managing Customer Data

  • 1. Breaking Down Privacy Barriers: Strategies to Managing Customer Data Presented by: David Fowler, Chief Privacy and Deliverability Officer at Marketfish Tina Hou, Director of Product Marketing at TRUSTe Moderator: Heidi Cohen, President, Riverside Marketing Strategies Sponsored by:
  • 2. Breaking Down Privacy Barriers Strategies for Managing Customer Data March 14, 2012 CONFIDENTIAL 2
  • 3. TRUSTe overview Leader in Privacy Management Solutions • 14 years of privacy experience • Robust technology platform • #1 privacy brand & trustmark Comprehensive Solution Suite • All online channels • Global coverage • Self- and full-service options Large / Loyal Customer Base • Over 5,000 clients • SMB through Fortune 500 • Cross vertical solutions CONFIDENTIAL 3
  • 4. Data is a critical asset Businesses want to use it, and consumers want to protect it CONFIDENTIAL 4
  • 5. Privacy mistakes are under the microscope 2012 2011 2011 Path social Google settles FTC charges over OnStar forced to reverse network app “Google Buzz” privacy issues; location tracking policy accessing address company gets 20-year oversight 2011 2011 following privacy outcry books without period Netflix faces multiple Acquisition of Borders delayed permission privacy lawsuits over its due to questions over privacy data storage practices. rights of 46M email subscribers 2011 Playdom fined $3 million for violating 2011 children’s online privacy nebuAd settles $2.4 million privacy lawsuit over behavioral targeting practices 2011 Apple and Google weather “location 2011 gate” privacy scandal over their Broken Thumbs Apps settles FTC mobile devices. Apple changes charges that it violated children’s 2011 collection practices in response. privacy law – company is fined Following media scrutiny and forced to destroy the data over privacy practices, Microsoft ceases to use “supercookies” to track users on its website CONFIDENTIAL 5
  • 6. Business implications: Cloud adoption is handicapped due to privacy concerns Customer fears… become barriers to sale Privacy and Compliance Security Legal Privacy is one of the top three obstacles to adoption of cloud computing by businesses. •– KPMG 2010 Cloud Computing Survey CONFIDENTIAL 6
  • 7. Impact on Cloud and SaaS providers 3rd party service providers need to show – strict and consistent data handling practices – a comprehensive privacy policy and adherence to these policies – available recourse for customers should there be a lapse in the way data is handled Data breaches, location-based services, cloud computing, offshoring, context-awareness and regulatory changes will dominate the privacy officer's agenda in 2011 and 2012.” – Carsten Casper, Gartner CONFIDENTIAL 7
  • 8. Establishing data management practices Types of data collected Access and storage Third-party info sharing Actual Practices CONFIDENTIAL 8
  • 9. Assure that your partners do the same Be sure to: • Build privacy into contracts • Review partner privacy policies • Ensure partners meet a minimum standard of data protection CONFIDENTIAL 9
  • 10. Streamline your ability to do business You handle data responsibly. Prove it upfront. • Address the privacy concern before it can slow down sales • Differentiate yourself as a privacy-focused business • Give peace of mind to customers Third-party certification that your privacy practices adhere to the highest standards. CONFIDENTIAL 10
  • 11. Case Study David Fowler, Chief Privacy & Deliverability Officer March 14, 2012 Proprietary & Confidential
  • 12. Marketfish Overview  Marketfish is the only fully automated lead generation platform that offers free access to an online marketplace for email and postal lists as well as the ability to build and execute marketing campaigns, all in under thirty minutes.  Marketfish's cloud-based platform enables users to reach their perfect audience in seconds, build a campaign, and then track performance using real-time data. With a pay-by-campaign model, users only pay for what they use.
  • 13. Our Privacy Challenge  Growth in an industry mired in data privacy and compliance issues  Mistrust due to shady characters in list management business  Marketfish needed to:  Differentiate via transparency of data management and privacy practices  Ensure same privacy standards throughout their network of providers  Foster corporate leadership with our 200(+) million database  Change the market and disrupt the norm pertaining to the channel  Provide marketers with better data to make smarter decisions
  • 14. Approach  Provide privacy and transparency from the ground up  Used certification as a “privacy by design” building block  Determined up front the privacy value proposition and not an afterthought  Streamlined our privacy position in line with client expectations  Held partners and vendors accountable for privacy compliance  Changed the product model in the age of “big data”
  • 15. Need for 3rd Party Certification Show upfront that your data management and privacy practices are of the highest standard  Certification of your service platform  Dispute resolution  Privacy policy/terms of service  Regular review/updates
  • 16. Privacy and Transparency From the Ground Up  Privacy certification: Service Platform  Validation of the total data lifecycle  Ensure clean consumer data and with user permissions
  • 17. Privacy and Transparency Across the Board  Privacy Certification: As a marketer  Trust consistent throughout the customer experience  Highest standards in privacy  Requiring partners to be certified as well  Creating more transparency
  • 18. Streamlined Our Ability to Do Business  Lower customer acquisition costs by minimizing the back and forth during the due diligence process  Remove sales barriers by addressing one of the top customer concerns up front  Gain competitive advantage by showing your commitment to data privacy  Focus on growing our business and let the experts advise on data privacy
  • 19. Results  Ability to address privacy concerns upfront  More trust from our customers  More trust from network of partners  Shorter sales cycles  Increased revenues  Ability to win larger network of partners and better data  Client and partner trust and transparency  TRUSTe Certification is a CRITICAL compliment for your business

Notes de l'éditeur

  1. TRUSTe can help you with your Privacy Management StrategyWe are the leader in Privacy Management SolutionsHave over a decade of experienceMany of you in attendance today are TRUSTe customersYou also probably know us by our famous Certified Privacy Seal – seen on thousands of websites, billions of consumer impressions per yearThe gold standard for companies to demonstrate their commitment to managing customer privacyWe work with companies of all sizesAcross all industriesAnd have extensive international experienceWe can help you assess your needs and put together a solution for youYou can start by visiting TRUSTe.comWe have lots of resources including our consumer research reports and past / upcoming educational webinarsIf we can help you, give us a call.I will turn things back over to Chris for some closing comments.
  2. Impact to your business:We’ve established the focus that the industry has on privacy and data management and how you can ensure that your practices are above board. You should be set right? Unfortunately, no. The fear around relinquishing control of a company’s bread and butter, their data, is still there, blocking service adoption.Even the most buttoned up businesses still find themselves jumping through hoops to prove to prospects that their business practices are sound, thereby increasing the cost and time to sale
  3. Online privacy are being scrutinized by businesses, by the media, by regulators and by consumers. And businesses are being held accountable.The EU has proposed measures ranging from regular audits of cloud services, and the Dutch government is banning usage of US cloud services due to concerns around the Patriot Act (w/in the dutchgov’t).http://www.euractiv.com/specialreport-cloud-computing/digital-cloud-providers-face-eu-privacy-audits-news-509133http://www.zdnet.com/blog/btl/dutch-government-to-ban-us-providers-over-patriot-act-concerns/58342
  4. Have a clear and detailed understanding of what information is being captured, stored and processed by your service.Types of data collectedPersonally identifiableAggregated dataHighly regulated data (ie: healthcare)Access and storageend-user access to their informationreasonable security measuresdata governance polices data retention service provider management (e.g. restrictions on what service can do)restrictions & monitoring processes to prevent app developers from abusing the platform and stored data (e.g. only offering limited feature set, monitoring data use)Third-party info sharingThe data flows (e.g. is data being shared with third parties)Contractual provisions w/ other 3rd parties to deliver platform servicesPracticeWritten policy is consistent with actual practicesplatform practicesMake sure the right measures are in place to ensure consistent handling of access permissions, storage, and deletion of data.
  5. Why does partner trust matter? Your customers have a relationship with you, not your business partners – if your partners mishandle the data you will get blamed. Customer data is one of your company’s most valuable assets and, no matter whose hands it’s in, it should be protected.