SlideShare a Scribd company logo
1 of 23
Digital Privacy Data Security
Best Practices Act (H.R.661) SAFE Data Act. (H.R.2577)
Do Not Track Me Online Act (H.R.654) Data Security & Breach Act (S.1207)
Commercial Privacy BOR (S.799) Data Accountability & Trust Act (H.R.1707 & 1841)
Consumer Privacy Protection (H.R.1528) Personal Data Privacy & Security (S.1151)
Do Not Track Kids Act (H.R.1895) Data Security Act (S.1434)
Do-Not-Track Online Act (S.913) Personal Data Protection & Breach Accountability Act. (S.1535)
Geolocational Privacy and Surveillance Act (H.R.2168/S.1212) Data Security Act (S.1434)
Location Privacy Protection Act (S.1223) Data Security and Breach Notification Act (S.3333)
Social net Online Protection (H.R.5050)
Electronic Communications Privacy Act Amendments Act (S.1011)
Marketers Consumers
VS.
Survey: Perceptions of Marketing Permission
Marketers Consumers
VS.
70%
Require Permission
58%
Purchase Lists
Marketers Consumers
VS.
63%
Require Permission
55%
Purchase Lists
Marketers Consumers
VS.
72%
Don’t Want to Share
51%
Purchase 3rd
Party Data
Marketers Consumers
VS.
85%
Don’t Want to Be
Tracked
41%
Tracking OK
19%
No Answer
Marketers Consumers
VS.
59%
Require Permission
61%
Permission is
Needed
Regulated
Permission
Consumers
How do you get permission
in the first place?
Why change if non-
permission works?
• Expensive
• Inefficient
• Time Consuming
• Inefficient
• Time Consuming
Your Website
iTunes, Google Play
Piggyback
4 Rules
• Be where consumers are already making
decisions
• Partner with contextually relevant brands
• Be transparent with your opt-in process
• Immediately follow up
Classic Ecommerce Piggyback
Piggyback “Co-Registration” – Listing Building & Leads
Piggyback “Co-Liking, Co-Following” – Build Social Media Following
The ethic of reciprocity
“One should treat others as one would like
others to treat oneself”
Ancient Babylon
Ancient China
Ancient Egypt
Ancient Greece
Ancient Judea
Ancient India
Ancient Tamizhagam
Bahá'í Faith
Buddhism
Christianity
Confucianism
Confucianism
Hinduism
Humanism
Islam
Jainism
Judaism
Sikhism
Taoism
Human Rights
Psychology
Sociology
THANK YOU!
Élie Ashery
elie@RegReady.com
http://www.RegReady.com

More Related Content

Similar to Perceptions of Marketing Permission

C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315Colin Zick
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012Vivastream
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...DDMA
 
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...Adler Law Group
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS 2015- Assessing the Risk of Identity and Access- Venkat RajajiCIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS 2015- Assessing the Risk of Identity and Access- Venkat RajajiCloudIDSummit
 
Assessing the Risk of Identity and Access
Assessing the Risk of Identity and AccessAssessing the Risk of Identity and Access
Assessing the Risk of Identity and AccessCourion Corporation
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CloudIDSummit
 
Personal Data Protection in Brazil
Personal Data Protection in BrazilPersonal Data Protection in Brazil
Personal Data Protection in BrazilATMOSPHERE .
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)itgsabc
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 
Consumer Privacy Online | JMC 8416
Consumer Privacy Online | JMC 8416Consumer Privacy Online | JMC 8416
Consumer Privacy Online | JMC 8416Sam Petto
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Jan Carroza
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
Technology Trends: Value Office
Technology Trends: Value OfficeTechnology Trends: Value Office
Technology Trends: Value OfficeSSFIndia1
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperMatthew Kurnava
 

Similar to Perceptions of Marketing Permission (19)

C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
Where You Are Is Who You Are: Legal Trends in Geolocation Data Privacy & Secu...
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS 2015- Assessing the Risk of Identity and Access- Venkat RajajiCIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
Assessing the Risk of Identity and Access
Assessing the Risk of Identity and AccessAssessing the Risk of Identity and Access
Assessing the Risk of Identity and Access
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 
Personal Data Protection in Brazil
Personal Data Protection in BrazilPersonal Data Protection in Brazil
Personal Data Protection in Brazil
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Consumer Privacy Online | JMC 8416
Consumer Privacy Online | JMC 8416Consumer Privacy Online | JMC 8416
Consumer Privacy Online | JMC 8416
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
Technology Trends: Value Office
Technology Trends: Value OfficeTechnology Trends: Value Office
Technology Trends: Value Office
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
 

Recently uploaded

7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 

Recently uploaded (20)

VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 

Perceptions of Marketing Permission

Editor's Notes

  1. Permission Marketing. The term encapsulated 15 years ago in the title of Seth Godin’s book is just now having a real meaning. Mr. Godin was way ahead of the curve in 1998, but now he’s caught up. The Golden Age of marketing is also birthing a strong movement toward permission. Why permission marketing? We’re in a time where anything and everything is converted into a marketing channel. Marketers simply have too much
  2. Consumers have had it with intrusive marketing.The same technology that has enabled marketers is now affording consumers the means to ignore and block unwanted messaging. Everything from spam filters to desktop and mobile ad filtering are gradually being adopted by the masses. Even content distributors are testing the waters. I’m sure as many of you know the ad hopper from Dish now lets its users watch some primetime commercial free programming. More importantly, consumers are taking their frustration to their legislators.
  3. There are now over 15 bills pending in Congress that would essentially allow consumers to block or filter a number of various marketing messages. Senator Jay Rockefeller recently reintroduced the “Do Not Track of 2013” essentially giving consumers the power to opt-out of any online tracking greatly reducing the promise of Big Data for marketing purposes. To really comprehend these effects, just ask any CEO or marketer in the bulls eye of the Do-Not-Call Implementation Act of 2003. That was a result of marketers having too much of a good thing.
  4. As a result of enhanced data analysis, marketers are finally realizing that we don’t think like normal consumers – especially in the area of marketing permission. We are a special breed that requires we walk in other people’s shoes however we often forget to do that. This is why RegReady put together a survey asking over 1,000 consumers and 120 marketers about their opinions on marketing permission and how the best way to acquire consumer permission. Some of the findings are to be expected, others not so much.
  5. The first statistic regarding email marketing is not surprising.70% of consumers surveyed generally require that they give their permission before being marketed to via email yet 58% of marketers still purchase email lists. BTW there’s no such thing as purchasing an opt-in email list. Secondary permission in email marketing doesn’t scale well. Just ask anyone from Yahoo or Google’s email divisions if your mail is going to get through. It won’t.
  6. The postal service statistic is not too surprising. Consumers have been conditioned for generations that the postal service is a non-permissioned marketing channel. It’s interesting because consumers indicated environmental concerns as their biggest issue with mail.
  7. 51% of marketers admit to purchasing 3rd party data – I believe this stat is much higher.72% of consumers don’t want to their personal data to be shared amongst marketers.
  8. Tracking has become a new phenomenon and more of a controversial subject. Since marketers can now use big data in conjunction with tracking – targeting is much more precise. It also brings up privacy concerns for consumers. 20% of marketers refused to answer the question. And 85% of consumers felt very strongly that their online activities shouldn’t be tracked.
  9. There was an even split when it came to marketing on a mobile device. We think the reason for this is that mobile devices are regulated and subject to carrier use as well.
  10. To help marketers understand permission better we created a framework called The Permission Marketing Curve. In this curve we classified marketing permission into four prominent categories: explicit, implied, secondary and none with their corresponding marketing activities. For example explicit permission includes marketing activities with a clear opt-in process such as receiving special deals and newsletters. Implied permission includes activities such as general purchases and contest registrations. Secondary permission includes affiliate marketing, list rentals and the purchase of so-called opt-in email lists. And no permission is pretty self explanatory. To understand the permission curve better, we compared each level of permission’s effectiveness to its complexity of acquisition. What we’ve found isn’t surprising. Consumers tend to want explicit permission from all their marketing channels yet marketers continue to hover toward the middle of the curve often confusing implied permission with explicit permission.
  11. Two Innocent questions asked by marketers all the time:Why change if non-permission works?When presented with a choice, consumers always choose permission and in the long run it delivers a higher ROI.Blocking technology and legislation will leave marketers little choice.If I need permission to market, how do I get permission in the first place? (chicken and egg)This is a very fair and important question and the simple answer its some marketing channels yield better for initiating permission.
  12. Time and technology has made it much easier to acquire marketing permission and this graph shows how various pioneering technologies and media models help bend the complexity of acquiring marketing permission. Nevertheless, permission acquisition continues to remain someone elusive.
  13. To acquire permission some marketers use offline marketing channels that can become expensive, inefficient and time consuming.
  14. Another process used by marketers is to spend a lot of money to drive people to their website or app in the hopes of opting-in for further messaging once they leave their site or download their app. This model can be inefficient and usually very time consuming.
  15. The most efficient and cost effective solution for gaining consumer permission is to piggyback from someone else. Obviously other solutions work, but this is by far the most cost effective. I always find it ironic that some industries are opposed to these types of relationships since most brands have a very hard time standing on their own. There are four basic rules to the piggyback: Be where consumers are already making decisions or have just made them. This includes making purchasing, signing up for a newsletter, downloading software or a whitepaper.Partner with strong contextually relevant brands. Very few brands stand on their own and the right permission partnerships will help to make your brand look stronger.Always be transparent with your opt-in process. If subscriber is signing up for a weekly newsletter make sure they don’t wind up on your daily mailings. Always deliver what’s promised.Immediately follow up to confirm permission. When piggybacking, a lot marketers don’t receive their data in real time which is a big no no. By the time you go to send email, the person forgot they opt-ted in.
  16. The travel industry figured out that bundling and paring online works well. This is especially true for multi-homing products and services where choices are abundant for consumers and substitutes are in easy reach. The same concepts and methodologies that the travel industry eloquently uses can be applied to others as well.
  17. Another is a newsletter sign-up. After a website visitor completes any type of registration form, four to five contextually relevant trading partner’s ads appear asking the visitor to opt-in for additional information. All opt-in mechanisms are pre-set to negative. Once a visitor has indicated a positive opt-in, the information they entered into the form is automatically transferred to the advertiser. =
  18. We’re applying the same model for mobile web and apps.
  19. The email one click lead gen is a new methodology that we have been testing and it seems to be working very nicely.
  20. As well as social media. If a visitor likes, tweets or posts, they will have the ability to do the same with other contextually relevant offers.
  21. I leave you today with a reminder of the Golden Rule. The ethic of reciprocity, “treat others as you would like to be treated” transcends every religion, philosophy and civil society. It’s a universal and globally accepted ethic that serves as a litmus test for compassion. This ethic determines how well an individual or company relates to a heterogeneous society – people outside their peer group. To understand how The Golden Rule relates to marketing one just has to wonder how many marketers signed up for the Do Not Call Registry. 21st Century technology has very much made permission marketing part of the Golden Rule. Not only is it It’s a simple rule in marketing to follow, it’s greatly appreciated and is financially agreeable.