SlideShare a Scribd company logo
1 of 22
Download to read offline
Enterprise Tag Management

                                                 PANEL
                               Think Houdini: Untangling
                            Website Privacy & Compliance

                                 Kevin Trilli
                                 VP of Products
                                 TRUSTe

Moderator: Des Cahill            Craig Spiezle
VP Marketing, Ensighten          Executive Director & President
                                 Online Trust Alliance
Our Panelists

 Kevin Trilli

    – VP Product
    – Truste
    – Privacy for Ads, Data, Mobile, Website

 Craig Spiezle

    – Executive Director, Founder and President
    – Online Trust Alliance




#agility2013
Where you want your brand




#agility2013
Privacy - Why Care?

 Data driven economy – “Big Data”
 Blurring of on & off-line data
 Evolving definitions of PII
 Consumer shift to mobile devices
 Reliance on service providers & cloud services.
 Increased sophistication of the cyber-criminal
    – Competitors




#agility2013
Privacy impacts your customers

          94% of Consumers Worry About Their Privacy Online


                                                6%
                                                                                               A really important issue
                                                                                              that I think about often


                                    39%                                                        A somewhat important
                                                                                              issue that I think about
                                                                  55%                         sometimes

                                                                                              Not much of an issue / I
                                                                                              hardly ever think about it




       #agility2013
Source: TRUSTe & Harris Interactive 2012 Consumer Privacy Survey (www.truste.com/resources)
Topic: Data Breach




#agility2013
Data privacy breakdowns hurt your business


2011                                                                                                       2011                       2012
Google settles FTC charges over                                                                            OnStar forced to reverse   Delta sued by CA AG
“Google Buzz” privacy issues;                                                                              location tracking policy   for insufficient privacy
company gets 20-year oversight           2011                           2011                               following privacy outcry   policy disclosures
period                                   Netflix faces multiple         Acquisition of Borders delayed
                                         privacy lawsuits over its      due to questions over privacy
                                         data storage practices.        rights of 46M email subscribers




                      2011
                      Playdom fined $3 million for violating                               2011
                      children’s online privacy                                            nebuAd settles $2.4
                                                                                           million privacy lawsuit
                                                                                           over behavioral targeting
                                                                                           practices
 2011
 Apple and Google weather “location                  2011
 gate” privacy scandal over their                    Broken Thumbs Apps settles FTC
 mobile devices. Apple changes                       charges that it violated children’s
 collection practices in response.                   privacy law – company is fined                                            2012
                                                     and forced to destroy the data                                            Path social
                                                                                                                               network app
                                                                                                                               accessing address
                                                                                                                               books without
  #agility2013                                                                                                                 permission
OTA 2012 Data Breach Highlights

 1478 breaches (Open Security Foundation)
   – 26% due to internal losses
   – 43% targeting non business entities
 62.7 million records exposed (OTA)
 97% avoidable (Symantec)
   – 94% server exploits
   – $194 cost per record
   – $5.5 million average cost of each breach
 $8.1 billion impact to U.S. businesses
(See pages 4-6)




 #agility2013
Consumers Take Actions to Protect
    Themselves
              Frequency of Taking Precautions with Personal Information*

                    Refuse to allow companies to share my                                                 67%
                         information with a 3rd party                                                           76%

     Manage my privacy choices by opting out of Online                                27%
                 Behavioral Advertising                                                             50%

     Check for certification or seal that indicates privacy                                   41%                     2011
            approval by an outside organization                                                     49%
                                                                                                                      2012
            Check to make sure the website has a privacy                                      40%
                            statement                                                            46%

                                                                                              39%
                   Read the privacy statement (if provided)
                                                                                              40%

                                                                          N/A
            Google the site and review their online ratings
                                                                                      28%

                                                                          N/A
                                                                                                            *  Percentage
             Ask friends if they think I should trust the site                                              of respondents
                                                                                  21%
                                                                                                            who answered:
                                                                                                            “most of the
       #agility2013                                                                                         time” / “often”
Source: TRUSTe & Harris Interactive 2012 Consumer Privacy Survey (www.truste.com/resources)
What is the norm?




         #agility2013
© 2012. All rights reserved. Online Trust Alliance (OTA)   Slide 10
Topic: Ad Privacy – Advertiser/Publisher

 Why don’t you (your clients) utilize more targeted
  advertising today?


a) ROI concerns
b) Implementation concerns
c) Privacy concerns
d) Not an issue – over 50% of ads already utilize targeting
e) Not sure



 #agility2013
Consumers Reward Good Privacy Practices
    with More Business


                                    Agreement With Statements Related
                                  To Online Advertising – option to opt out




                                                                             5%                            61%

       I would be inclined to do more business with an
     advertiser or publisher who gives me the option to                               27%           40%           21%
               opt-out of Online Behavioral Advertising

                                                                           7%
          Strongly Disagree         Somewhat Disagree           Neither Agree Nor Disagree    Somewhat Agree   Strongly Agree




       #agility2013
Source: TRUSTe & Harris Interactive 2012 Consumer Privacy Survey (www.truste.com/resources)
Topic: website tags/trackers

TRUSTe 2012 Top UK Website Tracker Analysis Report




 #agility2013
Topic: Mobile




#agility2013
Mobile legislative pressure is increasing




#agility2013
Consumers Take a Variety of Steps to Protect Their
    Personal Information With Apps


                             Steps to Determine Mobile App Privacy Trust


                                  I research the app online                                                     38%

               I check to see if the app has a privacy
                                                                                                            34%
                                 policy

                I read the privacy policy (if provided)                                                   30%

                   I check to see if the app has a third
                                                                                                    21%
                           party trustmark/seal

                                                     I ask friends                              19%

                                                  I trust all apps                            15%



       #agility2013
Source: TRUSTe & Harris Interactive 2012 Consumer Privacy Survey (www.truste.com/resources)
Get a mobile privacy strategy

                        Questions to ask:
                         Do you have a privacy policy for
                          your mobile app/website?
                         Do you offer opt-out mechanisms
                          for mobile tracking?
                         What data are 3rd Party SDK’s
                          actually collecting & using?
                         Do you ask consumers for
                          permission before using their
                          mobile location data for marketing
                          purposes?



 #agility2013
Topic: Kids
                The Children’s Online Privacy
                Protection Act (COPPA)
                 The law requires companies who
                  market to children (under 13) to:
                 Provide notice of what information
                  they collect
                 Obtain verifiable parental consent
                  before collecting or using
                  children’s data
                 Provide parental access to
                  information they’ve collected
                  about their child
                 Don’t forget about new forms of
                  PII (IP Addresses, Persistent IDs
                  etc)
 #agility2013
EU Cookie Directive – consumers expect…
                     Expect companies to comply with the EU cookie directive



                                                                               76%            82%
                               53%                     62%


                              FR                      NL                     GB               DE


                         Plan to only visit websites of companies who comply



                                                                               44%            49%
                                33%                     37%


                              GB                      NL                     FR               DE
       #agility2013
Source: TRUSTe & Harris Interactive 2012 Consumer Privacy Survey (www.truste.com/resources)
Discussion – Q&A


     Kevin Trilli
     VP Product
     Truste
     www.truste.com
     Craig Spiezle
     Chairman and President
     Online Trust Association
     www.otalliance.org


     descahill@ensighten.com

#agility2013
Where are we today?

 Breaches are a daily occurrence, but the lack of
  planning is unacceptable.
 W3C DNT polarization
 Wild West of data collection
 Power of Cloud, Mobile & “Big Data”
 Privacy & surveillance concerns increasing
 Codes of Conduct
 International Pressures (EU, Article 29)

 #agility2013
#agility2013

More Related Content

What's hot

2013 global security report
2013 global security report2013 global security report
2013 global security reportYury Chemerkin
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital youTony Fish
 
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Vivastream
 
Social media reality check: ip does matter | buzzient
Social media reality check: ip does matter | buzzientSocial media reality check: ip does matter | buzzient
Social media reality check: ip does matter | buzzientTBJ Investments, LLC
 
Andrew Pozniak Consumers And Marketing Strategies In The Digital Space
Andrew Pozniak   Consumers And Marketing Strategies In The Digital SpaceAndrew Pozniak   Consumers And Marketing Strategies In The Digital Space
Andrew Pozniak Consumers And Marketing Strategies In The Digital SpaceOnlyWords.ro
 
Digital breakfast with Jack presentation deck
Digital breakfast with Jack presentation deckDigital breakfast with Jack presentation deck
Digital breakfast with Jack presentation deckZoe Cheng
 
Matt Esslinger Presentation
Matt Esslinger PresentationMatt Esslinger Presentation
Matt Esslinger PresentationMediabistro
 
TDWI Inda BI on Cloud Future State Vision
TDWI Inda BI on Cloud Future State VisionTDWI Inda BI on Cloud Future State Vision
TDWI Inda BI on Cloud Future State Visiontdwiindia
 
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012   Wolfgang Nimfuehr - Bringing Big Data to the EnterpriseEDF2012   Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the EnterpriseEuropean Data Forum
 
The power of_mobile_and_social_data_webinar_slides_21_may2012
The power of_mobile_and_social_data_webinar_slides_21_may2012The power of_mobile_and_social_data_webinar_slides_21_may2012
The power of_mobile_and_social_data_webinar_slides_21_may2012Accenture
 
Assignment 1
Assignment 1Assignment 1
Assignment 1NWAce
 
Assignment 1
Assignment 1Assignment 1
Assignment 1NWAce
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleMike Gotta
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Wavelength USA 2012 Making The Web Work For You
Wavelength USA 2012 Making The Web Work For YouWavelength USA 2012 Making The Web Work For You
Wavelength USA 2012 Making The Web Work For YouWavelength
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Itas tweetminster final
Itas tweetminster finalItas tweetminster final
Itas tweetminster finalAndrew Walker
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 

What's hot (20)

2013 global security report
2013 global security report2013 global security report
2013 global security report
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital you
 
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
 
Social media reality check: ip does matter | buzzient
Social media reality check: ip does matter | buzzientSocial media reality check: ip does matter | buzzient
Social media reality check: ip does matter | buzzient
 
Andrew Pozniak Consumers And Marketing Strategies In The Digital Space
Andrew Pozniak   Consumers And Marketing Strategies In The Digital SpaceAndrew Pozniak   Consumers And Marketing Strategies In The Digital Space
Andrew Pozniak Consumers And Marketing Strategies In The Digital Space
 
Digital breakfast with Jack presentation deck
Digital breakfast with Jack presentation deckDigital breakfast with Jack presentation deck
Digital breakfast with Jack presentation deck
 
Matt Esslinger Presentation
Matt Esslinger PresentationMatt Esslinger Presentation
Matt Esslinger Presentation
 
TDWI Inda BI on Cloud Future State Vision
TDWI Inda BI on Cloud Future State VisionTDWI Inda BI on Cloud Future State Vision
TDWI Inda BI on Cloud Future State Vision
 
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012   Wolfgang Nimfuehr - Bringing Big Data to the EnterpriseEDF2012   Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
 
The power of_mobile_and_social_data_webinar_slides_21_may2012
The power of_mobile_and_social_data_webinar_slides_21_may2012The power of_mobile_and_social_data_webinar_slides_21_may2012
The power of_mobile_and_social_data_webinar_slides_21_may2012
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
Digital inheritance final
Digital inheritance finalDigital inheritance final
Digital inheritance final
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Wavelength USA 2012 Making The Web Work For You
Wavelength USA 2012 Making The Web Work For YouWavelength USA 2012 Making The Web Work For You
Wavelength USA 2012 Making The Web Work For You
 
Esecurity e202
Esecurity e202Esecurity e202
Esecurity e202
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Itas tweetminster final
Itas tweetminster finalItas tweetminster final
Itas tweetminster final
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 

Viewers also liked

Optimizing site performance - Agility2013
Optimizing site performance - Agility2013Optimizing site performance - Agility2013
Optimizing site performance - Agility2013Ensighten
 
Omni-Channel Journey of a Financial Services Customer - Nationwide Presentation
Omni-Channel Journey of a Financial Services Customer - Nationwide PresentationOmni-Channel Journey of a Financial Services Customer - Nationwide Presentation
Omni-Channel Journey of a Financial Services Customer - Nationwide PresentationEnsighten
 
More Test&Target – Less Time and Money
More Test&Target – Less Time and MoneyMore Test&Target – Less Time and Money
More Test&Target – Less Time and MoneyEnsighten
 
11 panel - hang on tight mobile has arrived
11   panel - hang on tight mobile has arrived11   panel - hang on tight mobile has arrived
11 panel - hang on tight mobile has arrivedEnsighten
 
Webinar Deck - How to Achieve True Mobile Marketing Agility
Webinar Deck - How to Achieve True Mobile Marketing Agility Webinar Deck - How to Achieve True Mobile Marketing Agility
Webinar Deck - How to Achieve True Mobile Marketing Agility Ensighten
 
9 web analytics demystified - turning it up to 11 advanced website optimiza...
9   web analytics demystified - turning it up to 11 advanced website optimiza...9   web analytics demystified - turning it up to 11 advanced website optimiza...
9 web analytics demystified - turning it up to 11 advanced website optimiza...Ensighten
 
1 j manion - real-time marketing maneuvers
1   j manion - real-time marketing maneuvers1   j manion - real-time marketing maneuvers
1 j manion - real-time marketing maneuversEnsighten
 
Webinar Deck: Five Steps to Becoming an Empowered Marketer
Webinar Deck: Five Steps to Becoming an Empowered MarketerWebinar Deck: Five Steps to Becoming an Empowered Marketer
Webinar Deck: Five Steps to Becoming an Empowered MarketerEnsighten
 
Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Ensighten
 
Accel 2011 sony_brandon_bunker
Accel 2011 sony_brandon_bunkerAccel 2011 sony_brandon_bunker
Accel 2011 sony_brandon_bunkerEnsighten
 
Optimize Experiences Everywhere: How Marketers Leverage Real-Time App Agility...
Optimize Experiences Everywhere: How Marketers Leverage Real-Time App Agility...Optimize Experiences Everywhere: How Marketers Leverage Real-Time App Agility...
Optimize Experiences Everywhere: How Marketers Leverage Real-Time App Agility...Ensighten
 
8 sony - innovating with tag management
8   sony - innovating with tag management8   sony - innovating with tag management
8 sony - innovating with tag managementEnsighten
 
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...Would You Lie to Your Physician? Establishing Privacy Compliance within your ...
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...Ensighten
 
Ensighten Manage 2.0 Tour - Agility2013
Ensighten Manage 2.0 Tour - Agility2013Ensighten Manage 2.0 Tour - Agility2013
Ensighten Manage 2.0 Tour - Agility2013Ensighten
 
Implementing Google Products - Agility2013
Implementing Google Products - Agility2013Implementing Google Products - Agility2013
Implementing Google Products - Agility2013Ensighten
 
UK Cookie Law Compliance: Implications & Answers
 UK Cookie Law Compliance: Implications & Answers  UK Cookie Law Compliance: Implications & Answers
UK Cookie Law Compliance: Implications & Answers Ensighten
 
5 tui - tui travel’s journey to tag control & marketing agility
5   tui - tui travel’s journey to tag control & marketing agility5   tui - tui travel’s journey to tag control & marketing agility
5 tui - tui travel’s journey to tag control & marketing agilityEnsighten
 
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...Ensighten
 
Josh Manion Privacy UnSummit
Josh Manion Privacy UnSummit Josh Manion Privacy UnSummit
Josh Manion Privacy UnSummit Ensighten
 
Webinar Deck: Don't get stuck in the marketing cloud
Webinar Deck: Don't get stuck in the marketing cloud Webinar Deck: Don't get stuck in the marketing cloud
Webinar Deck: Don't get stuck in the marketing cloud Ensighten
 

Viewers also liked (20)

Optimizing site performance - Agility2013
Optimizing site performance - Agility2013Optimizing site performance - Agility2013
Optimizing site performance - Agility2013
 
Omni-Channel Journey of a Financial Services Customer - Nationwide Presentation
Omni-Channel Journey of a Financial Services Customer - Nationwide PresentationOmni-Channel Journey of a Financial Services Customer - Nationwide Presentation
Omni-Channel Journey of a Financial Services Customer - Nationwide Presentation
 
More Test&Target – Less Time and Money
More Test&Target – Less Time and MoneyMore Test&Target – Less Time and Money
More Test&Target – Less Time and Money
 
11 panel - hang on tight mobile has arrived
11   panel - hang on tight mobile has arrived11   panel - hang on tight mobile has arrived
11 panel - hang on tight mobile has arrived
 
Webinar Deck - How to Achieve True Mobile Marketing Agility
Webinar Deck - How to Achieve True Mobile Marketing Agility Webinar Deck - How to Achieve True Mobile Marketing Agility
Webinar Deck - How to Achieve True Mobile Marketing Agility
 
9 web analytics demystified - turning it up to 11 advanced website optimiza...
9   web analytics demystified - turning it up to 11 advanced website optimiza...9   web analytics demystified - turning it up to 11 advanced website optimiza...
9 web analytics demystified - turning it up to 11 advanced website optimiza...
 
1 j manion - real-time marketing maneuvers
1   j manion - real-time marketing maneuvers1   j manion - real-time marketing maneuvers
1 j manion - real-time marketing maneuvers
 
Webinar Deck: Five Steps to Becoming an Empowered Marketer
Webinar Deck: Five Steps to Becoming an Empowered MarketerWebinar Deck: Five Steps to Becoming an Empowered Marketer
Webinar Deck: Five Steps to Becoming an Empowered Marketer
 
Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy
 
Accel 2011 sony_brandon_bunker
Accel 2011 sony_brandon_bunkerAccel 2011 sony_brandon_bunker
Accel 2011 sony_brandon_bunker
 
Optimize Experiences Everywhere: How Marketers Leverage Real-Time App Agility...
Optimize Experiences Everywhere: How Marketers Leverage Real-Time App Agility...Optimize Experiences Everywhere: How Marketers Leverage Real-Time App Agility...
Optimize Experiences Everywhere: How Marketers Leverage Real-Time App Agility...
 
8 sony - innovating with tag management
8   sony - innovating with tag management8   sony - innovating with tag management
8 sony - innovating with tag management
 
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...Would You Lie to Your Physician? Establishing Privacy Compliance within your ...
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...
 
Ensighten Manage 2.0 Tour - Agility2013
Ensighten Manage 2.0 Tour - Agility2013Ensighten Manage 2.0 Tour - Agility2013
Ensighten Manage 2.0 Tour - Agility2013
 
Implementing Google Products - Agility2013
Implementing Google Products - Agility2013Implementing Google Products - Agility2013
Implementing Google Products - Agility2013
 
UK Cookie Law Compliance: Implications & Answers
 UK Cookie Law Compliance: Implications & Answers  UK Cookie Law Compliance: Implications & Answers
UK Cookie Law Compliance: Implications & Answers
 
5 tui - tui travel’s journey to tag control & marketing agility
5   tui - tui travel’s journey to tag control & marketing agility5   tui - tui travel’s journey to tag control & marketing agility
5 tui - tui travel’s journey to tag control & marketing agility
 
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...
Marketing in the Moment: Trends and Innovations in Real-Time Omni-Channel Mar...
 
Josh Manion Privacy UnSummit
Josh Manion Privacy UnSummit Josh Manion Privacy UnSummit
Josh Manion Privacy UnSummit
 
Webinar Deck: Don't get stuck in the marketing cloud
Webinar Deck: Don't get stuck in the marketing cloud Webinar Deck: Don't get stuck in the marketing cloud
Webinar Deck: Don't get stuck in the marketing cloud
 

Similar to Enterprise Tag Management for Website Privacy & Compliance

Breaking Down Privacy Barriers: Strategies to Managing Customer Data
Breaking Down Privacy Barriers: Strategies to Managing Customer DataBreaking Down Privacy Barriers: Strategies to Managing Customer Data
Breaking Down Privacy Barriers: Strategies to Managing Customer DataVivastream
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityBarry Caplin
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media GovernanceJesse Wilkins
 
iStrategy Toronto Wildfire Social Unleashed keynote
iStrategy Toronto Wildfire Social Unleashed keynoteiStrategy Toronto Wildfire Social Unleashed keynote
iStrategy Toronto Wildfire Social Unleashed keynoteiStrategy
 
Disruptive digital workplace: 3 approaches
Disruptive digital workplace:  3 approachesDisruptive digital workplace:  3 approaches
Disruptive digital workplace: 3 approachesJane McConnell
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationShauna_Cox
 
Designing products and services with GDPR
Designing products and services with GDPRDesigning products and services with GDPR
Designing products and services with GDPRCyber-Duck
 
Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01tjabali
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowExtreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowJohn Mancini
 
Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...John Mancini
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Consumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfConsumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfNoreen Whysel
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionEdelman
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointImperva
 

Similar to Enterprise Tag Management for Website Privacy & Compliance (20)

Breaking Down Privacy Barriers: Strategies to Managing Customer Data
Breaking Down Privacy Barriers: Strategies to Managing Customer DataBreaking Down Privacy Barriers: Strategies to Managing Customer Data
Breaking Down Privacy Barriers: Strategies to Managing Customer Data
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
iStrategy Toronto Wildfire Social Unleashed keynote
iStrategy Toronto Wildfire Social Unleashed keynoteiStrategy Toronto Wildfire Social Unleashed keynote
iStrategy Toronto Wildfire Social Unleashed keynote
 
Disruptive digital workplace: 3 approaches
Disruptive digital workplace:  3 approachesDisruptive digital workplace:  3 approaches
Disruptive digital workplace: 3 approaches
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
Cosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of ByodCosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of Byod
 
Google ZMOT presentation
Google ZMOT presentationGoogle ZMOT presentation
Google ZMOT presentation
 
Designing products and services with GDPR
Designing products and services with GDPRDesigning products and services with GDPR
Designing products and services with GDPR
 
Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowExtreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Ecommerce Chap 10
Ecommerce Chap 10Ecommerce Chap 10
Ecommerce Chap 10
 
Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Consumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfConsumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdf
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePoint
 

More from Ensighten

Tag Management : A Key Component of an International Digital Strategy
Tag Management : A Key Component of an International Digital StrategyTag Management : A Key Component of an International Digital Strategy
Tag Management : A Key Component of an International Digital StrategyEnsighten
 
Beyond The Forecast: Forecasters of Feeling, Influencers of Behavior
Beyond The Forecast: Forecasters of Feeling, Influencers of BehaviorBeyond The Forecast: Forecasters of Feeling, Influencers of Behavior
Beyond The Forecast: Forecasters of Feeling, Influencers of BehaviorEnsighten
 
Scientists & Storytellers: CDW’s Journey Toward 1:1 Marketing
Scientists & Storytellers: CDW’s Journey Toward 1:1 MarketingScientists & Storytellers: CDW’s Journey Toward 1:1 Marketing
Scientists & Storytellers: CDW’s Journey Toward 1:1 MarketingEnsighten
 
Mobile Apps: No Longer a Black Box of Digital Measurement
Mobile Apps: No Longer a Black Box of Digital MeasurementMobile Apps: No Longer a Black Box of Digital Measurement
Mobile Apps: No Longer a Black Box of Digital MeasurementEnsighten
 
How Omni-Channel Data Collection Can Power Marketing Measurement
How Omni-Channel Data Collection Can Power Marketing MeasurementHow Omni-Channel Data Collection Can Power Marketing Measurement
How Omni-Channel Data Collection Can Power Marketing MeasurementEnsighten
 
Using Ensighten to Personalize the Customer Experience
Using Ensighten to Personalize the Customer ExperienceUsing Ensighten to Personalize the Customer Experience
Using Ensighten to Personalize the Customer ExperienceEnsighten
 
Making Your Site Vendor Agnostic via a Modern Data Layer
Making Your Site Vendor Agnostic via a Modern Data LayerMaking Your Site Vendor Agnostic via a Modern Data Layer
Making Your Site Vendor Agnostic via a Modern Data LayerEnsighten
 
Heavyweight Martech Debate
Heavyweight Martech DebateHeavyweight Martech Debate
Heavyweight Martech DebateEnsighten
 
Vision stratégique d’Ensighten
Vision stratégique d’EnsightenVision stratégique d’Ensighten
Vision stratégique d’EnsightenEnsighten
 
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...Ensighten
 
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...Ensighten
 
Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...Ensighten
 
Modernisez votre marketing digital en 4 étapes
Modernisez votre marketing digital en 4 étapesModernisez votre marketing digital en 4 étapes
Modernisez votre marketing digital en 4 étapesEnsighten
 
Rethinking the Consumer Journey
Rethinking the Consumer JourneyRethinking the Consumer Journey
Rethinking the Consumer JourneyEnsighten
 
Hacking Marketing: Marketing Management in a Software World
Hacking Marketing: Marketing Management in a Software WorldHacking Marketing: Marketing Management in a Software World
Hacking Marketing: Marketing Management in a Software WorldEnsighten
 
Building an Effective Data Governance Framework
Building an Effective Data Governance FrameworkBuilding an Effective Data Governance Framework
Building an Effective Data Governance FrameworkEnsighten
 
Enterprise TMS: The Strategic Advantage
Enterprise TMS: The Strategic AdvantageEnterprise TMS: The Strategic Advantage
Enterprise TMS: The Strategic AdvantageEnsighten
 
Tag Management: The Glue that Brings IT and Marketing Together
Tag Management: The Glue that Brings IT and Marketing TogetherTag Management: The Glue that Brings IT and Marketing Together
Tag Management: The Glue that Brings IT and Marketing TogetherEnsighten
 
Changing Human Behavior Through Data-Driven Experiences
Changing Human Behavior Through Data-Driven ExperiencesChanging Human Behavior Through Data-Driven Experiences
Changing Human Behavior Through Data-Driven ExperiencesEnsighten
 
Convergence: Unlocking the Power of Data for Modern Marketing
Convergence: Unlocking the Power of Data for Modern MarketingConvergence: Unlocking the Power of Data for Modern Marketing
Convergence: Unlocking the Power of Data for Modern MarketingEnsighten
 

More from Ensighten (20)

Tag Management : A Key Component of an International Digital Strategy
Tag Management : A Key Component of an International Digital StrategyTag Management : A Key Component of an International Digital Strategy
Tag Management : A Key Component of an International Digital Strategy
 
Beyond The Forecast: Forecasters of Feeling, Influencers of Behavior
Beyond The Forecast: Forecasters of Feeling, Influencers of BehaviorBeyond The Forecast: Forecasters of Feeling, Influencers of Behavior
Beyond The Forecast: Forecasters of Feeling, Influencers of Behavior
 
Scientists & Storytellers: CDW’s Journey Toward 1:1 Marketing
Scientists & Storytellers: CDW’s Journey Toward 1:1 MarketingScientists & Storytellers: CDW’s Journey Toward 1:1 Marketing
Scientists & Storytellers: CDW’s Journey Toward 1:1 Marketing
 
Mobile Apps: No Longer a Black Box of Digital Measurement
Mobile Apps: No Longer a Black Box of Digital MeasurementMobile Apps: No Longer a Black Box of Digital Measurement
Mobile Apps: No Longer a Black Box of Digital Measurement
 
How Omni-Channel Data Collection Can Power Marketing Measurement
How Omni-Channel Data Collection Can Power Marketing MeasurementHow Omni-Channel Data Collection Can Power Marketing Measurement
How Omni-Channel Data Collection Can Power Marketing Measurement
 
Using Ensighten to Personalize the Customer Experience
Using Ensighten to Personalize the Customer ExperienceUsing Ensighten to Personalize the Customer Experience
Using Ensighten to Personalize the Customer Experience
 
Making Your Site Vendor Agnostic via a Modern Data Layer
Making Your Site Vendor Agnostic via a Modern Data LayerMaking Your Site Vendor Agnostic via a Modern Data Layer
Making Your Site Vendor Agnostic via a Modern Data Layer
 
Heavyweight Martech Debate
Heavyweight Martech DebateHeavyweight Martech Debate
Heavyweight Martech Debate
 
Vision stratégique d’Ensighten
Vision stratégique d’EnsightenVision stratégique d’Ensighten
Vision stratégique d’Ensighten
 
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...
Le Tag Management, ingrédient indispensable d’une stratégie digitale internat...
 
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...
IBM et Ensighten s’associent pour la mise en œuvre d’expériences client conne...
 
Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...
 
Modernisez votre marketing digital en 4 étapes
Modernisez votre marketing digital en 4 étapesModernisez votre marketing digital en 4 étapes
Modernisez votre marketing digital en 4 étapes
 
Rethinking the Consumer Journey
Rethinking the Consumer JourneyRethinking the Consumer Journey
Rethinking the Consumer Journey
 
Hacking Marketing: Marketing Management in a Software World
Hacking Marketing: Marketing Management in a Software WorldHacking Marketing: Marketing Management in a Software World
Hacking Marketing: Marketing Management in a Software World
 
Building an Effective Data Governance Framework
Building an Effective Data Governance FrameworkBuilding an Effective Data Governance Framework
Building an Effective Data Governance Framework
 
Enterprise TMS: The Strategic Advantage
Enterprise TMS: The Strategic AdvantageEnterprise TMS: The Strategic Advantage
Enterprise TMS: The Strategic Advantage
 
Tag Management: The Glue that Brings IT and Marketing Together
Tag Management: The Glue that Brings IT and Marketing TogetherTag Management: The Glue that Brings IT and Marketing Together
Tag Management: The Glue that Brings IT and Marketing Together
 
Changing Human Behavior Through Data-Driven Experiences
Changing Human Behavior Through Data-Driven ExperiencesChanging Human Behavior Through Data-Driven Experiences
Changing Human Behavior Through Data-Driven Experiences
 
Convergence: Unlocking the Power of Data for Modern Marketing
Convergence: Unlocking the Power of Data for Modern MarketingConvergence: Unlocking the Power of Data for Modern Marketing
Convergence: Unlocking the Power of Data for Modern Marketing
 

Enterprise Tag Management for Website Privacy & Compliance

  • 1. Enterprise Tag Management PANEL Think Houdini: Untangling Website Privacy & Compliance Kevin Trilli VP of Products TRUSTe Moderator: Des Cahill Craig Spiezle VP Marketing, Ensighten Executive Director & President Online Trust Alliance
  • 2. Our Panelists  Kevin Trilli – VP Product – Truste – Privacy for Ads, Data, Mobile, Website  Craig Spiezle – Executive Director, Founder and President – Online Trust Alliance #agility2013
  • 3. Where you want your brand #agility2013
  • 4. Privacy - Why Care?  Data driven economy – “Big Data”  Blurring of on & off-line data  Evolving definitions of PII  Consumer shift to mobile devices  Reliance on service providers & cloud services.  Increased sophistication of the cyber-criminal – Competitors #agility2013
  • 5. Privacy impacts your customers 94% of Consumers Worry About Their Privacy Online 6% A really important issue that I think about often 39% A somewhat important issue that I think about 55% sometimes Not much of an issue / I hardly ever think about it #agility2013 Source: TRUSTe & Harris Interactive 2012 Consumer Privacy Survey (www.truste.com/resources)
  • 7. Data privacy breakdowns hurt your business 2011 2011 2012 Google settles FTC charges over OnStar forced to reverse Delta sued by CA AG “Google Buzz” privacy issues; location tracking policy for insufficient privacy company gets 20-year oversight 2011 2011 following privacy outcry policy disclosures period Netflix faces multiple Acquisition of Borders delayed privacy lawsuits over its due to questions over privacy data storage practices. rights of 46M email subscribers 2011 Playdom fined $3 million for violating 2011 children’s online privacy nebuAd settles $2.4 million privacy lawsuit over behavioral targeting practices 2011 Apple and Google weather “location 2011 gate” privacy scandal over their Broken Thumbs Apps settles FTC mobile devices. Apple changes charges that it violated children’s collection practices in response. privacy law – company is fined 2012 and forced to destroy the data Path social network app accessing address books without #agility2013 permission
  • 8. OTA 2012 Data Breach Highlights  1478 breaches (Open Security Foundation) – 26% due to internal losses – 43% targeting non business entities  62.7 million records exposed (OTA)  97% avoidable (Symantec) – 94% server exploits – $194 cost per record – $5.5 million average cost of each breach  $8.1 billion impact to U.S. businesses (See pages 4-6) #agility2013
  • 9. Consumers Take Actions to Protect Themselves Frequency of Taking Precautions with Personal Information* Refuse to allow companies to share my 67% information with a 3rd party 76% Manage my privacy choices by opting out of Online 27% Behavioral Advertising 50% Check for certification or seal that indicates privacy 41% 2011 approval by an outside organization 49% 2012 Check to make sure the website has a privacy 40% statement 46% 39% Read the privacy statement (if provided) 40% N/A Google the site and review their online ratings 28% N/A * Percentage Ask friends if they think I should trust the site of respondents 21% who answered: “most of the #agility2013 time” / “often” Source: TRUSTe & Harris Interactive 2012 Consumer Privacy Survey (www.truste.com/resources)
  • 10. What is the norm? #agility2013 © 2012. All rights reserved. Online Trust Alliance (OTA) Slide 10
  • 11. Topic: Ad Privacy – Advertiser/Publisher  Why don’t you (your clients) utilize more targeted advertising today? a) ROI concerns b) Implementation concerns c) Privacy concerns d) Not an issue – over 50% of ads already utilize targeting e) Not sure #agility2013
  • 12. Consumers Reward Good Privacy Practices with More Business Agreement With Statements Related To Online Advertising – option to opt out 5% 61% I would be inclined to do more business with an advertiser or publisher who gives me the option to 27% 40% 21% opt-out of Online Behavioral Advertising 7% Strongly Disagree Somewhat Disagree Neither Agree Nor Disagree Somewhat Agree Strongly Agree #agility2013 Source: TRUSTe & Harris Interactive 2012 Consumer Privacy Survey (www.truste.com/resources)
  • 13. Topic: website tags/trackers TRUSTe 2012 Top UK Website Tracker Analysis Report #agility2013
  • 15. Mobile legislative pressure is increasing #agility2013
  • 16. Consumers Take a Variety of Steps to Protect Their Personal Information With Apps Steps to Determine Mobile App Privacy Trust I research the app online 38% I check to see if the app has a privacy 34% policy I read the privacy policy (if provided) 30% I check to see if the app has a third 21% party trustmark/seal I ask friends 19% I trust all apps 15% #agility2013 Source: TRUSTe & Harris Interactive 2012 Consumer Privacy Survey (www.truste.com/resources)
  • 17. Get a mobile privacy strategy Questions to ask:  Do you have a privacy policy for your mobile app/website?  Do you offer opt-out mechanisms for mobile tracking?  What data are 3rd Party SDK’s actually collecting & using?  Do you ask consumers for permission before using their mobile location data for marketing purposes? #agility2013
  • 18. Topic: Kids The Children’s Online Privacy Protection Act (COPPA)  The law requires companies who market to children (under 13) to:  Provide notice of what information they collect  Obtain verifiable parental consent before collecting or using children’s data  Provide parental access to information they’ve collected about their child  Don’t forget about new forms of PII (IP Addresses, Persistent IDs etc) #agility2013
  • 19. EU Cookie Directive – consumers expect… Expect companies to comply with the EU cookie directive 76% 82% 53% 62% FR NL GB DE Plan to only visit websites of companies who comply 44% 49% 33% 37% GB NL FR DE #agility2013 Source: TRUSTe & Harris Interactive 2012 Consumer Privacy Survey (www.truste.com/resources)
  • 20. Discussion – Q&A Kevin Trilli VP Product Truste www.truste.com Craig Spiezle Chairman and President Online Trust Association www.otalliance.org descahill@ensighten.com #agility2013
  • 21. Where are we today?  Breaches are a daily occurrence, but the lack of planning is unacceptable.  W3C DNT polarization  Wild West of data collection  Power of Cloud, Mobile & “Big Data”  Privacy & surveillance concerns increasing  Codes of Conduct  International Pressures (EU, Article 29) #agility2013