SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Cloud Privacy Update:
           What You Need To Know


                             David Fowler
                             July 24, 2012


Proprietary & Confidential
David Fowler
Chief Privacy & Deliverability
Officer
@ActOnSoftware



                          #AOWEB
Today’s Agenda

   Data Breach Updates for 2012
   How to Protect Your Brand
   Commercial Email: State of the State
   Reputation Resources: Tools You Can Use
   Privacy Bill of Rights
   Wrap Up



Proprietary & Confidential   3
Not a day seems to go by without an
 announcement of a brand and a recent
           data compromise.


                             Will yours be next?


Proprietary & Confidential            4
Q: $6.5 Billion
          A: Data breach impact to U.S.
                   businesses



                                     Source: OTA
Proprietary & Confidential   5
2011 Data Breach Highlights

558 breaches

126 million records

76% server exploits

92% avoidable

$318 cost per record

$7.2 million average cost of each breach

$6.5 billion impact to U.S. businesses
                                                                                Source: OTA
                                   © 2012 All rights reserved. Online Trust Alliance (OTA)
What do they have in common?




            © 2012 All rights reserved. Online Trust Alliance (OTA)
© 2012 All rights reserved. Online Trust Alliance (OTA)
Why Care?

“We have spent over 12 years building
our reputation and trust. It is painful to
see us take so many steps back due to a
single incident.”
Zappos CEO, Tony Hsieh




                       © 2012 All rights reserved. Online Trust Alliance (OTA)
Why Care?

What has changed?
   Data driven economy – “Big Data”
   Multi-Channel & blurring of on & off-line data
   Evolving definitions of PII and coverage information
   Complexity and dynamic regulatory environment
   Reliance of service providers & cloud services
   Shift from a PC centric to users with multiple devices
   Increased sophistication of the cyber-criminal



                                 © 2012 All rights reserved. Online Trust Alliance (OTA)
Data breaches, what are they after?
 Organizations who store large amounts of customer data
  are attractive targets for identity thieves
       Data is the new currency for the dark side
 Thieves target personal, financial and other PII:
         Names and Addresses
         Phone Number
         Email Address
         Social Security Numbers
         Bank Account Numbers
         Credit and Debit Card Numbers
         Account Passwords
         Security Questions and Answers

                                                      Source: Zeta Interactive

 Proprietary & Confidential           11
Data breaches, how do they work?

 Attacks can take many forms
        Phishing
        Hacking
        Malware
        Hardware Theft
        Exploiting of Accidental Release
 Data Spill, Improper Disposal of Digital Assets, Other Accidents
 Thieves use stolen data to victimize customers
        Financial Fraud - All Forms and Types
        Use of Stolen Information to Commit Additional Crimes
        Money Laundering
        Criminal Impersonation, Stalking and Harassment
        Terrorism

                                                                 Source: Zeta Interactive

 Proprietary & Confidential             12
What are the privacy laws?

Federal Laws
  • FTC Act
  • Sarbanes-Oxley
  • HIPPA / COPPA
States Laws
  • Breach Notifications
  • Data Encryption
  • SSN Protection
Local Laws
  • Wireless Networks

International Laws
  • EU Data Protection Directive / UK Cookie Tracking

Professional / Trade Protocols
                                                         Source: Zeta Interactive

Proprietary & Confidential                     13
What are the impacts?

Data breaches affect
every aspect of the                       IT
                                            Security audits and scrutiny
company:
                                            Infrastructure changes
        Financial
        Litigation                       Marketing & Communication
                                            PR & crisis management
        Business loss & focus
                                            Brand degradation & mistrust
        Stock devaluation
        Identity protection
                                          Legal
                                            Government regulations
          services & support                Government notifications
        PR & Marketing activity            Class action lawsuits


                                                                  Source: Zeta Interactive

Proprietary & Confidential          14
Protect your brand.
 Technical security is a critical first step
        Review all your potential internal loopholes
 Conduct a comprehensive risk assessment
          Identify threats
          Analyze potential harm
          Identify reasonable mitigation
          Understand the legal landscape
          Implement policies and procedures consistent with above
 Develop a written information security program and incident
  response
        Periodically review the program to guard against new and evolving threats
 Require your vendors to employ best security practices
        Contractual language and penalties for non compliance
 Make privacy a corporate mandate for adoption



Proprietary & Confidential                   15
Tools you can use.

Seek guidance from your legal teams

Consider a third-party privacy seal for compliance

Register cousin domains that look like yours
  • This will protect your brand online and avoid Phishing issues

Keys to consumer trust
  • Notice: Say what you are going to do and do it
  • Consent: Ask for permission
  • Choice: Allow your customers options

Be transparent online - don’t hide your activities

Update your privacy policy regularly
Proprietary & Confidential              16
Commercial email state of the state

   Email Deliverability = Brand Management
   Brand Management = Email Reputation
   Good Email Reputation = Better Deliverability
   Better Deliverability = Builds Consumer TRUST
   Better Consumer Trust = Drives Engagement
   More aggressive filter implementation on ISP level
   More streamlined industry organization/cooperation
   Continued legal/privacy/technology issues remain
   More informed clients as access to information is available
   There are still No Guarantees for delivery to any inbox


Proprietary & Confidential          17
A word on reputation

Majority of deliverability issues are based on reputation

The data that affects reputation includes:
  • Email authentication implementation
  • Email volumes
  • Complaint rates
  • Hard bounce rates
  • Spam trap hits
  • Consumer engagement: clicks / opens / conversions

To protect reputation:
  • Monitor the sends consistently

To repair reputation:
  • Fix the problems data integrity / confirmed opt-in

Proprietary & Confidential                 18
Reputation resources




Proprietary & Confidential   19
The Consumers Privacy Bill of Rights

     Privacy Right                                     Definition
                             A right to exercise control over what personal data companies
Individual control
                             collect and how they use it.
                             A right to readable and accessible information about privacy
Transparency
                             and security practices.
                             A right to expect that companies will collect, use and
Respect for Context          disclosure personal data in ways consistent with the context
                             where data was shared.
Security                     A right to secure and responsible handling of personal data.
                             A right to access and correct personal data in usable formats,
Access and Accuracy
                             in a manner appropriate to data sensitivity.
                             A right to reasonable limits on the personal data that
Focused Collection
                             companies collect and retain.
                             A right to have personal data handled by companies in a
Accountability
                             manner that complies with the Consumer Privacy Bill of Rights.




Proprietary & Confidential                    20
Wrap up

Data breaches will continue to evolve

Protect your brand online

Monitor your online reputation

Be proactive not reactive for your brand
 • Have a plan and execute to it

Manage internal and external expectations
 • Who do you do business with and do they COMPLY?

Obey the law
 • Understand what’s required of you and your online presence

Your online journey will be rewarding when you invest the time and resources

 Proprietary & Confidential                    21
Need Help?




Sign up for a demo
  www.act-on.com
Thank You

                      David.Fowler@Act-On.com




Proprietary & Confidential   23
References
 FTC Act
        http://www.ftc.gov/ogc/ftcact.shtm
 FTC Dot Com Disclosures
        http://business.ftc.gov/documents/bus41-dot-com-disclosures-
         information-about-online-advertising
 Sarbanes Oxley
        http://www.soxlaw.com/
 TRUSTe
        www.truste.org




Proprietary & Confidential           24

Contenu connexe

Tendances

Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trustlmgangi
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowTechSoup
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisThomas Bronack
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Business Development Institute
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Electronic data & record management
Electronic data & record managementElectronic data & record management
Electronic data & record managementGreenLeafInst
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)NAFCU Services Corporation
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 

Tendances (20)

Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Wk White Paper
Wk White PaperWk White Paper
Wk White Paper
 
Electronic data & record management
Electronic data & record managementElectronic data & record management
Electronic data & record management
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Data Breach Response Guide (Whitepaper))
Data Breach Response Guide (Whitepaper))Data Breach Response Guide (Whitepaper))
Data Breach Response Guide (Whitepaper))
 
Ecommerce Chap 10
Ecommerce Chap 10Ecommerce Chap 10
Ecommerce Chap 10
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 

Similaire à Cloud Privacy

DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy ManagementTrustArc
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityDATAVERSITY
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmineEvelyne Oreskovich
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityPrecisely
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data DATAVERSITY
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?IBM Security
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers BDO_Consulting
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowIntegrate
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 

Similaire à Cloud Privacy (20)

DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
CDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdfCDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdf
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 

Plus de Act-On Software

Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps Act-On Software
 
The State of B2B Marketing: New Marketing Automation Stats for 2017
The State of B2B Marketing: New Marketing Automation Stats for 2017The State of B2B Marketing: New Marketing Automation Stats for 2017
The State of B2B Marketing: New Marketing Automation Stats for 2017Act-On Software
 
Why Content Marketers Should Be Making Unicorn Babies
Why Content Marketers Should Be Making Unicorn Babies Why Content Marketers Should Be Making Unicorn Babies
Why Content Marketers Should Be Making Unicorn Babies Act-On Software
 
How to Create a Successful Email Newsletter
How to Create a Successful Email Newsletter How to Create a Successful Email Newsletter
How to Create a Successful Email Newsletter Act-On Software
 
Marketing Quick Start Guide
Marketing Quick Start Guide Marketing Quick Start Guide
Marketing Quick Start Guide Act-On Software
 
INBOUND OR OUTBOUND? HOW ABOUT BOTH?
INBOUND OR OUTBOUND? HOW ABOUT BOTH?INBOUND OR OUTBOUND? HOW ABOUT BOTH?
INBOUND OR OUTBOUND? HOW ABOUT BOTH?Act-On Software
 
Marketing Automation Hacks: The Act-On Edition
Marketing Automation Hacks: The Act-On EditionMarketing Automation Hacks: The Act-On Edition
Marketing Automation Hacks: The Act-On EditionAct-On Software
 
Rethinking the Role of Marketing
Rethinking the Role of MarketingRethinking the Role of Marketing
Rethinking the Role of MarketingAct-On Software
 
Creating Killer Marketing Content
Creating Killer Marketing ContentCreating Killer Marketing Content
Creating Killer Marketing ContentAct-On Software
 
Getting the Buy-In from the C-Suite
Getting the Buy-In from the C-SuiteGetting the Buy-In from the C-Suite
Getting the Buy-In from the C-SuiteAct-On Software
 
SEO in 2014: Fact, Fiction, & Sensationalism
SEO in 2014: Fact, Fiction, & SensationalismSEO in 2014: Fact, Fiction, & Sensationalism
SEO in 2014: Fact, Fiction, & SensationalismAct-On Software
 
What Sales Leaders Should REALLY Expect from Marketing Automation
What Sales Leaders Should REALLY Expect from Marketing AutomationWhat Sales Leaders Should REALLY Expect from Marketing Automation
What Sales Leaders Should REALLY Expect from Marketing AutomationAct-On Software
 
Critical Rules for SEO Success in 2014
Critical Rules for SEO Success in 2014Critical Rules for SEO Success in 2014
Critical Rules for SEO Success in 2014Act-On Software
 
Target marketing improve email pic
Target marketing   improve email picTarget marketing   improve email pic
Target marketing improve email picAct-On Software
 
Creating Killer Marketing Content
Creating Killer Marketing ContentCreating Killer Marketing Content
Creating Killer Marketing ContentAct-On Software
 
Getting Started with Lead Nurturing
Getting Started with Lead NurturingGetting Started with Lead Nurturing
Getting Started with Lead NurturingAct-On Software
 
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Act-On Software
 
Who Is The Modern Customer? How Do They Want You to Talk to Them?
Who Is The Modern Customer? How Do They Want You to Talk to Them?Who Is The Modern Customer? How Do They Want You to Talk to Them?
Who Is The Modern Customer? How Do They Want You to Talk to Them?Act-On Software
 
Inactive Email Subscribers: Best Practices for Re-Engagement
Inactive Email Subscribers: Best Practices for Re-EngagementInactive Email Subscribers: Best Practices for Re-Engagement
Inactive Email Subscribers: Best Practices for Re-EngagementAct-On Software
 
Brunch and Learn - Direct Marketing on a Shoestring Budget
Brunch and Learn - Direct Marketing on a Shoestring BudgetBrunch and Learn - Direct Marketing on a Shoestring Budget
Brunch and Learn - Direct Marketing on a Shoestring BudgetAct-On Software
 

Plus de Act-On Software (20)

Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps
 
The State of B2B Marketing: New Marketing Automation Stats for 2017
The State of B2B Marketing: New Marketing Automation Stats for 2017The State of B2B Marketing: New Marketing Automation Stats for 2017
The State of B2B Marketing: New Marketing Automation Stats for 2017
 
Why Content Marketers Should Be Making Unicorn Babies
Why Content Marketers Should Be Making Unicorn Babies Why Content Marketers Should Be Making Unicorn Babies
Why Content Marketers Should Be Making Unicorn Babies
 
How to Create a Successful Email Newsletter
How to Create a Successful Email Newsletter How to Create a Successful Email Newsletter
How to Create a Successful Email Newsletter
 
Marketing Quick Start Guide
Marketing Quick Start Guide Marketing Quick Start Guide
Marketing Quick Start Guide
 
INBOUND OR OUTBOUND? HOW ABOUT BOTH?
INBOUND OR OUTBOUND? HOW ABOUT BOTH?INBOUND OR OUTBOUND? HOW ABOUT BOTH?
INBOUND OR OUTBOUND? HOW ABOUT BOTH?
 
Marketing Automation Hacks: The Act-On Edition
Marketing Automation Hacks: The Act-On EditionMarketing Automation Hacks: The Act-On Edition
Marketing Automation Hacks: The Act-On Edition
 
Rethinking the Role of Marketing
Rethinking the Role of MarketingRethinking the Role of Marketing
Rethinking the Role of Marketing
 
Creating Killer Marketing Content
Creating Killer Marketing ContentCreating Killer Marketing Content
Creating Killer Marketing Content
 
Getting the Buy-In from the C-Suite
Getting the Buy-In from the C-SuiteGetting the Buy-In from the C-Suite
Getting the Buy-In from the C-Suite
 
SEO in 2014: Fact, Fiction, & Sensationalism
SEO in 2014: Fact, Fiction, & SensationalismSEO in 2014: Fact, Fiction, & Sensationalism
SEO in 2014: Fact, Fiction, & Sensationalism
 
What Sales Leaders Should REALLY Expect from Marketing Automation
What Sales Leaders Should REALLY Expect from Marketing AutomationWhat Sales Leaders Should REALLY Expect from Marketing Automation
What Sales Leaders Should REALLY Expect from Marketing Automation
 
Critical Rules for SEO Success in 2014
Critical Rules for SEO Success in 2014Critical Rules for SEO Success in 2014
Critical Rules for SEO Success in 2014
 
Target marketing improve email pic
Target marketing   improve email picTarget marketing   improve email pic
Target marketing improve email pic
 
Creating Killer Marketing Content
Creating Killer Marketing ContentCreating Killer Marketing Content
Creating Killer Marketing Content
 
Getting Started with Lead Nurturing
Getting Started with Lead NurturingGetting Started with Lead Nurturing
Getting Started with Lead Nurturing
 
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
 
Who Is The Modern Customer? How Do They Want You to Talk to Them?
Who Is The Modern Customer? How Do They Want You to Talk to Them?Who Is The Modern Customer? How Do They Want You to Talk to Them?
Who Is The Modern Customer? How Do They Want You to Talk to Them?
 
Inactive Email Subscribers: Best Practices for Re-Engagement
Inactive Email Subscribers: Best Practices for Re-EngagementInactive Email Subscribers: Best Practices for Re-Engagement
Inactive Email Subscribers: Best Practices for Re-Engagement
 
Brunch and Learn - Direct Marketing on a Shoestring Budget
Brunch and Learn - Direct Marketing on a Shoestring BudgetBrunch and Learn - Direct Marketing on a Shoestring Budget
Brunch and Learn - Direct Marketing on a Shoestring Budget
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Cloud Privacy

  • 1. Cloud Privacy Update: What You Need To Know David Fowler July 24, 2012 Proprietary & Confidential
  • 2. David Fowler Chief Privacy & Deliverability Officer @ActOnSoftware #AOWEB
  • 3. Today’s Agenda  Data Breach Updates for 2012  How to Protect Your Brand  Commercial Email: State of the State  Reputation Resources: Tools You Can Use  Privacy Bill of Rights  Wrap Up Proprietary & Confidential 3
  • 4. Not a day seems to go by without an announcement of a brand and a recent data compromise. Will yours be next? Proprietary & Confidential 4
  • 5. Q: $6.5 Billion A: Data breach impact to U.S. businesses Source: OTA Proprietary & Confidential 5
  • 6. 2011 Data Breach Highlights 558 breaches 126 million records 76% server exploits 92% avoidable $318 cost per record $7.2 million average cost of each breach $6.5 billion impact to U.S. businesses Source: OTA © 2012 All rights reserved. Online Trust Alliance (OTA)
  • 7. What do they have in common? © 2012 All rights reserved. Online Trust Alliance (OTA)
  • 8. © 2012 All rights reserved. Online Trust Alliance (OTA)
  • 9. Why Care? “We have spent over 12 years building our reputation and trust. It is painful to see us take so many steps back due to a single incident.” Zappos CEO, Tony Hsieh © 2012 All rights reserved. Online Trust Alliance (OTA)
  • 10. Why Care? What has changed?  Data driven economy – “Big Data”  Multi-Channel & blurring of on & off-line data  Evolving definitions of PII and coverage information  Complexity and dynamic regulatory environment  Reliance of service providers & cloud services  Shift from a PC centric to users with multiple devices  Increased sophistication of the cyber-criminal © 2012 All rights reserved. Online Trust Alliance (OTA)
  • 11. Data breaches, what are they after?  Organizations who store large amounts of customer data are attractive targets for identity thieves  Data is the new currency for the dark side  Thieves target personal, financial and other PII:  Names and Addresses  Phone Number  Email Address  Social Security Numbers  Bank Account Numbers  Credit and Debit Card Numbers  Account Passwords  Security Questions and Answers Source: Zeta Interactive Proprietary & Confidential 11
  • 12. Data breaches, how do they work?  Attacks can take many forms  Phishing  Hacking  Malware  Hardware Theft  Exploiting of Accidental Release  Data Spill, Improper Disposal of Digital Assets, Other Accidents  Thieves use stolen data to victimize customers  Financial Fraud - All Forms and Types  Use of Stolen Information to Commit Additional Crimes  Money Laundering  Criminal Impersonation, Stalking and Harassment  Terrorism Source: Zeta Interactive Proprietary & Confidential 12
  • 13. What are the privacy laws? Federal Laws • FTC Act • Sarbanes-Oxley • HIPPA / COPPA States Laws • Breach Notifications • Data Encryption • SSN Protection Local Laws • Wireless Networks International Laws • EU Data Protection Directive / UK Cookie Tracking Professional / Trade Protocols Source: Zeta Interactive Proprietary & Confidential 13
  • 14. What are the impacts? Data breaches affect every aspect of the  IT  Security audits and scrutiny company:  Infrastructure changes  Financial  Litigation  Marketing & Communication  PR & crisis management  Business loss & focus  Brand degradation & mistrust  Stock devaluation  Identity protection  Legal  Government regulations services & support  Government notifications  PR & Marketing activity  Class action lawsuits Source: Zeta Interactive Proprietary & Confidential 14
  • 15. Protect your brand.  Technical security is a critical first step  Review all your potential internal loopholes  Conduct a comprehensive risk assessment  Identify threats  Analyze potential harm  Identify reasonable mitigation  Understand the legal landscape  Implement policies and procedures consistent with above  Develop a written information security program and incident response  Periodically review the program to guard against new and evolving threats  Require your vendors to employ best security practices  Contractual language and penalties for non compliance  Make privacy a corporate mandate for adoption Proprietary & Confidential 15
  • 16. Tools you can use. Seek guidance from your legal teams Consider a third-party privacy seal for compliance Register cousin domains that look like yours • This will protect your brand online and avoid Phishing issues Keys to consumer trust • Notice: Say what you are going to do and do it • Consent: Ask for permission • Choice: Allow your customers options Be transparent online - don’t hide your activities Update your privacy policy regularly Proprietary & Confidential 16
  • 17. Commercial email state of the state  Email Deliverability = Brand Management  Brand Management = Email Reputation  Good Email Reputation = Better Deliverability  Better Deliverability = Builds Consumer TRUST  Better Consumer Trust = Drives Engagement  More aggressive filter implementation on ISP level  More streamlined industry organization/cooperation  Continued legal/privacy/technology issues remain  More informed clients as access to information is available  There are still No Guarantees for delivery to any inbox Proprietary & Confidential 17
  • 18. A word on reputation Majority of deliverability issues are based on reputation The data that affects reputation includes: • Email authentication implementation • Email volumes • Complaint rates • Hard bounce rates • Spam trap hits • Consumer engagement: clicks / opens / conversions To protect reputation: • Monitor the sends consistently To repair reputation: • Fix the problems data integrity / confirmed opt-in Proprietary & Confidential 18
  • 20. The Consumers Privacy Bill of Rights Privacy Right Definition A right to exercise control over what personal data companies Individual control collect and how they use it. A right to readable and accessible information about privacy Transparency and security practices. A right to expect that companies will collect, use and Respect for Context disclosure personal data in ways consistent with the context where data was shared. Security A right to secure and responsible handling of personal data. A right to access and correct personal data in usable formats, Access and Accuracy in a manner appropriate to data sensitivity. A right to reasonable limits on the personal data that Focused Collection companies collect and retain. A right to have personal data handled by companies in a Accountability manner that complies with the Consumer Privacy Bill of Rights. Proprietary & Confidential 20
  • 21. Wrap up Data breaches will continue to evolve Protect your brand online Monitor your online reputation Be proactive not reactive for your brand • Have a plan and execute to it Manage internal and external expectations • Who do you do business with and do they COMPLY? Obey the law • Understand what’s required of you and your online presence Your online journey will be rewarding when you invest the time and resources Proprietary & Confidential 21
  • 22. Need Help? Sign up for a demo www.act-on.com
  • 23. Thank You David.Fowler@Act-On.com Proprietary & Confidential 23
  • 24. References  FTC Act  http://www.ftc.gov/ogc/ftcact.shtm  FTC Dot Com Disclosures  http://business.ftc.gov/documents/bus41-dot-com-disclosures- information-about-online-advertising  Sarbanes Oxley  http://www.soxlaw.com/  TRUSTe  www.truste.org Proprietary & Confidential 24