This document summarizes key points from a presentation on cloud privacy updates and what businesses need to know. It discusses the growing issue of data breaches, providing statistics on the number of breaches and records compromised in 2011. It outlines how brands can protect themselves by implementing technical security measures, conducting risk assessments, and complying with relevant privacy laws. The presentation also reviews tools and resources available to businesses to monitor their online reputation and ensure email marketing compliance.
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
It is up to law firms to protect both themselves and their clients with security measures that keep up with increasing risk. The firm can’t risk losing the trust of its clients. Here are some important ways that individual lawyers, and their firms, can improve the security of the information entrusted to them.
Law firms need to stay sharp because corporate security is getting harder,not easier. At the same time, companies are starting to recognize that information security is a fundamental business issue—one that demands an increased focus on cyber resilience, not just security. The reason is simple: criminals and state-sponsored attackers are targeting intellectual property, customer information, and avenues for business disruption. That makes law firms an ideal target.
To learn how you can locate and get a more complete picture of people and businesses across the U.S., visit http://www.lexisnexis.com/publicrecords.
For more topics that are transforming the legal industry,
visit http://www.thisisreallaw.com.
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
Infosecurity ISACA North America Expo and Conference will debut in New York City’s Javits Convention Center 20-21 November 2019. The event will leverage ISACA’s Cybersecurity Nexus (CSX) community and solutions with Infosecurity Group, Reed Exhibition’s immersive event series staged worldwide for the infosecurity industry.
Download Event Brochure
ISACA will bring experience developed since the 2015 launch of its CSX Conferences, expert workshop series, certification preparation sessions, and latest developments related to the CSX Training Platform, all to the new event programming. Infosecurity, which entered the North American conference arena in 2017, will build on its strengths in industry expositions, media, immersive learning and leadership networks.
Solving the Encryption Conundrum in Financial ServicesEchoworx
Encryption has gone mainstream!
The encryption debate has captured the world’s attention. And coupled with the inevitability of another notable data breach, awareness of encryption as a tool to mitigate threat is at an all-time high. Still confidential financial statements, mortgage documents, and investment information are regularly sent unencrypted.
This white paper sets out some of the key rules, guidelines, best practices and associated risks for FINRA member firms and suggests ways that organizations can use encryption to protect themselves, their customers and representatives. In addition, it looks at some of the issues enterprises encounter when enabling email encryption technologies and ways to avoid them.
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
It is up to law firms to protect both themselves and their clients with security measures that keep up with increasing risk. The firm can’t risk losing the trust of its clients. Here are some important ways that individual lawyers, and their firms, can improve the security of the information entrusted to them.
Law firms need to stay sharp because corporate security is getting harder,not easier. At the same time, companies are starting to recognize that information security is a fundamental business issue—one that demands an increased focus on cyber resilience, not just security. The reason is simple: criminals and state-sponsored attackers are targeting intellectual property, customer information, and avenues for business disruption. That makes law firms an ideal target.
To learn how you can locate and get a more complete picture of people and businesses across the U.S., visit http://www.lexisnexis.com/publicrecords.
For more topics that are transforming the legal industry,
visit http://www.thisisreallaw.com.
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
Infosecurity ISACA North America Expo and Conference will debut in New York City’s Javits Convention Center 20-21 November 2019. The event will leverage ISACA’s Cybersecurity Nexus (CSX) community and solutions with Infosecurity Group, Reed Exhibition’s immersive event series staged worldwide for the infosecurity industry.
Download Event Brochure
ISACA will bring experience developed since the 2015 launch of its CSX Conferences, expert workshop series, certification preparation sessions, and latest developments related to the CSX Training Platform, all to the new event programming. Infosecurity, which entered the North American conference arena in 2017, will build on its strengths in industry expositions, media, immersive learning and leadership networks.
Solving the Encryption Conundrum in Financial ServicesEchoworx
Encryption has gone mainstream!
The encryption debate has captured the world’s attention. And coupled with the inevitability of another notable data breach, awareness of encryption as a tool to mitigate threat is at an all-time high. Still confidential financial statements, mortgage documents, and investment information are regularly sent unencrypted.
This white paper sets out some of the key rules, guidelines, best practices and associated risks for FINRA member firms and suggests ways that organizations can use encryption to protect themselves, their customers and representatives. In addition, it looks at some of the issues enterprises encounter when enabling email encryption technologies and ways to avoid them.
Security and Privacy: What Nonprofits Need to KnowTechSoup
The adage says, "You can't have privacy without security, but you can have security without privacy." What does that really mean, and how can you proactively address both for your organization? With privacy scandals and data breaches grabbing headlines daily, even the smallest organizations must take responsibility for lawful custodianship and protection of personal information. In this 60-minute webinar with Michael Standard, senior corporate counsel at Symantec, we will cover the key elements of privacy and security programs. You will learn
- How privacy and security concerns intersect and differ
- Risks to assess when evaluating your privacy program
- The definition of "personal information"
- Key privacy laws that may impact your organization
- The top three privacy and security threats and how to mitigate them
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
Protecting Intellectual Property and Data Loss Prevention (DLP) – what makes your business unique, different, valuable, and attracts clients and customers - presented at the Boston Business Alliance 9/23/09
Data breach events result in significant losses each year. Our partners at Bonahoom & Bobilya, LLC, created a presentation about understanding the hidden regulatory risks of a data breach so you can keep your company from going out of business.
This presentation has been shared with permission.
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing the Impact of a Breach
Encryption has been viewed as the ultimate way to protect sensitive data for compliance. But it has also been considered very complex to implement. Today, encryption is essential to meet compliance objectives, and has become much simpler to implement. The challenge is knowing when and where to use encryption, how it can simplify compliance, what controls need to be in place, and the options for good encryption key management. This session will cover the options for encryption and key management, what each provides, and their requirements. Encryption and key management topics include application-level encryption for data in use, network encryption of data in motion, and storage encryption for data at rest.
To ensure that electronic documentation & records shall only be accessible to those who are authorized, and be restricted from the rest.
Nevertheless, there is necessity to balance it against the enterprise need to use and share the information
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
Presentation to the Science and Technology Committee of the American Bar Association on legal issues associated with employers enabling employee Bring Your Own Device policies.
Has your credit union considered how member relations, legal compliance and brand reputation might be affected during a data breach? In this 2012 NAFCU Technology & Security Conference session recording you will learn about the risks of data breaches and how they could impact your credit union. http://www.nafcu.org/affinion
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
NetIQ was a Platinum sponsor for “Plugging the Leaks: Finding and Fixing the IT Security Holes in Your Enterprise,” a virtual trade show (VTS) produced by Information Week Magazine and Dark Reading.
This was our presentation deck: "Proven Practices to Protect Critical Data" presented by Matt Mosley, Senior Product Manager, and Matt Ulery, Director of Product Management during a live presentation. They explored some of the most significant problems facing security teams tasked with protecting critical data. And, they will reveal some of the most effective approaches and technology that can be used to quickly identify real threats.
Has your credit union considered how member relations, legal compliance and brand reputation might be affected during a data breach? In this 2012 NAFCU Technology & Security Conference session recording you will learn about the risks of data breaches and how they could impact your credit union.
Security and Privacy: What Nonprofits Need to KnowTechSoup
The adage says, "You can't have privacy without security, but you can have security without privacy." What does that really mean, and how can you proactively address both for your organization? With privacy scandals and data breaches grabbing headlines daily, even the smallest organizations must take responsibility for lawful custodianship and protection of personal information. In this 60-minute webinar with Michael Standard, senior corporate counsel at Symantec, we will cover the key elements of privacy and security programs. You will learn
- How privacy and security concerns intersect and differ
- Risks to assess when evaluating your privacy program
- The definition of "personal information"
- Key privacy laws that may impact your organization
- The top three privacy and security threats and how to mitigate them
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
Protecting Intellectual Property and Data Loss Prevention (DLP) – what makes your business unique, different, valuable, and attracts clients and customers - presented at the Boston Business Alliance 9/23/09
Data breach events result in significant losses each year. Our partners at Bonahoom & Bobilya, LLC, created a presentation about understanding the hidden regulatory risks of a data breach so you can keep your company from going out of business.
This presentation has been shared with permission.
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing the Impact of a Breach
Encryption has been viewed as the ultimate way to protect sensitive data for compliance. But it has also been considered very complex to implement. Today, encryption is essential to meet compliance objectives, and has become much simpler to implement. The challenge is knowing when and where to use encryption, how it can simplify compliance, what controls need to be in place, and the options for good encryption key management. This session will cover the options for encryption and key management, what each provides, and their requirements. Encryption and key management topics include application-level encryption for data in use, network encryption of data in motion, and storage encryption for data at rest.
To ensure that electronic documentation & records shall only be accessible to those who are authorized, and be restricted from the rest.
Nevertheless, there is necessity to balance it against the enterprise need to use and share the information
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
Presentation to the Science and Technology Committee of the American Bar Association on legal issues associated with employers enabling employee Bring Your Own Device policies.
Has your credit union considered how member relations, legal compliance and brand reputation might be affected during a data breach? In this 2012 NAFCU Technology & Security Conference session recording you will learn about the risks of data breaches and how they could impact your credit union. http://www.nafcu.org/affinion
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
NetIQ was a Platinum sponsor for “Plugging the Leaks: Finding and Fixing the IT Security Holes in Your Enterprise,” a virtual trade show (VTS) produced by Information Week Magazine and Dark Reading.
This was our presentation deck: "Proven Practices to Protect Critical Data" presented by Matt Mosley, Senior Product Manager, and Matt Ulery, Director of Product Management during a live presentation. They explored some of the most significant problems facing security teams tasked with protecting critical data. And, they will reveal some of the most effective approaches and technology that can be used to quickly identify real threats.
Has your credit union considered how member relations, legal compliance and brand reputation might be affected during a data breach? In this 2012 NAFCU Technology & Security Conference session recording you will learn about the risks of data breaches and how they could impact your credit union.
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
To do effective data governance, analysts should preview the amount of data their organization is collecting and consider if it is all necessary information to run the business or just “nice to have” data. Today companies are collecting a variety of Personally identifiable information (PII), combining it with location information, and using it to both personalize their own services and to sell to advertisers for behavioral marketing. Data brokers are tracking cell phone applications and insurance companies are installing devices to monitor driving habits. At the same time, however, hackers are embedding malicious software in company computers, opening a virtual door for criminals to rifle through an organization’s valuable personal and financial information.
This presentation explores:
•What company data should be tagged as “sensitive” data?
•Who within the company has access to personal data?
•Is the company breaking any privacy laws by storing PII data?
•Is the data secure from both internal and external hackers?
•What happens if there is an external data breech?
Whether you're using spreadsheets or the first generation privacy technology tools available - privacy management can still be a time-consuming and manual process for the privacy team and the broader business. Automation and intelligence are the key to streamlining this process but where to start?
In this webinar we've assembled some of the best privacy and security professionals to share their tips to cut out the time-consuming work so that you can focus on strategic input. CONSIDER: Just imagine what you could accomplish and influence if even 25% of your time was freed from manual processes.
This webinar will provide insights into:
-How to determine what activities to automate
-Key considerations for assessing tools and vendors
-Making the business case to increase the efficiencies and effectiveness of the privacy office
How to Strengthen Enterprise Data Governance with Data QualityDATAVERSITY
If your organization is in a highly-regulated industry – or relies on data for competitive advantage – data governance is undoubtedly a top priority. Whether you’re focused on “defensive” data governance (supporting regulatory compliance and risk management) or “offensive” data governance (extracting the maximum value from your data assets, and minimizing the cost of bad data), data quality plays a critical role in ensuring success.
Join our webinar to learn how enterprise data quality drives stronger data governance, including:
The overlaps between data governance and data quality
The “data” dependencies of data governance – and how data quality addresses them
Key considerations for deploying data quality for data governance
Lost laptops, misplaced paper records, cyber theft - breaches are a fact of life. But they don't have to be a disaster. Breach veterans know that the impact of a data loss event is substantially determined by what happens in the 48 hours after you find out about it. Get things right, and even a substantial and public breach can be weathered gracefully. Mess things up, and a small breach can turn into a nightmare.
This webinar will review critical steps organizations can take in the wake of a breach. Our featured speaker will be privacy and compliance expert, Deb Hampson who is an AVP & Assistant General Counsel at The Hartford. Don't miss this opportunity to learn best practices from a proven professional.
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
Adrian Ifrim with more than twelve years of experience in the financial, telecom and IT security sectors, currently serving as Senior Manager within the Cyber Risk Advisory team of Deloitte Romania. In addition, he is an expert in information security with focus on penetration testing services and currently holds the Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), Offensive Security Wireless Professional (OSWP) and System Security Certified Practitioner (SSCP) certifications.
How to Strengthen Enterprise Data Governance with Data QualityPrecisely
If your organization is in a highly-regulated industry – or relies on data for competitive advantage – data governance is undoubtedly a top priority. Whether you’re focused on “defensive” data governance (supporting regulatory compliance and risk management) or “offensive” data governance (extracting the maximum value from your data assets, and minimizing the cost of bad data), data quality plays a critical role in ensuring success.
View this webinar on-demand to learn how enterprise data quality drives stronger data governance, including:
• The overlaps between data governance and data quality
• The “data” dependencies of data governance – and how data quality addresses them
• Key considerations for deploying data quality for data governance
Outlines the regulatory, privacy and security risks faced by FinTech companies and Financial Services firms if their digital strategy is not thought through.
The explosive growth of data and the value it creates calls on data professionals to level up their programs to build, demonstrate, and maintain trust. The days of fine print, pre-ticked boxes, and data hoarding are gone and strong collaboration from data, privacy, marketing and ethics teams is necessary to design trustworthy data-driven practices.
Join for a discussion on the latest trends in trusted data and how you can take critical steps to build trust in data practices by:
- Embedding privacy by design into data operations
- Respecting individual choice and optimizing the ongoing relationship with consumers
- Preparing for future data challenges including responsible AI and sustainability
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
The Compliancy Group offers FREE HIPAA education with industry experts from across the industry. This months webinar with Axis Technology focuses on Health IT and the challenges that come with it. Register for our upcoming webinars at www.compliancy-group.com/webinar
Securing Your "Crown Jewels": Do You Have What it Takes?IBM Security
Securing Your "Crown Jewels": Do You Have What it Takes to Go From Start to Finish?
Protecting Your Most Valuable Data: Organizations face many data protection challenges, but one of the biggest is identifying and prioritizing the 0.01% - 2% of the data that is most important to your organization's survival and success. IBM Data Security Services can help by providing you with a 5-stage strategy designed to ensure that your "Crown Jewels" are protected and kept safe from loss, hackers, and being compromised. Attend this session and learn about processes to identify and prioritize your critical data, and services available from IBM to protect it.
The Unseen Enemy - Protecting the Brand, the Assets and the Customers BDO_Consulting
Michael Barba and Jeff Hall discuss the most pressing cyber-threats facing retailers and what companies can do in the event of a cyber breach, data loss or claim. Mr. Barba is a managing director and Mr. Hall is a senior manager with BDO Consulting.
Preparing for GDPR: What Every B2B Marketer Must KnowIntegrate
Considering the consequences of non-compliance (up to €20M/$24M or 4% worldwide annual revenue), this translates to a major problem for B2B marketers.
How can your team ensure its lead gen processes are GDPR-compliant without undermining demand generation performance?
View this deck to see how Julian Archer (Sr. Research Director, SiriusDecisions) and Scott Vaughan (CMO, Integrate) educate B2B marketers on: developing a comprehensive GDPR compliance strategy, putting your compliance strategy into action, and applying software to support your compliance measures.
To watch the on-demand version of the webinar, click here:
https://www.integrate.com/gdpr-compliance-b2b-marketing-webinar
Consumers rely on businesses to keep their personal information safe. Too few of those businesses are actively protecting that data. Here’s what’s gone wrong, and how businesses should be responding. Full blog here: http://bit.ly/1Jtzym5
Data privacy awareness is on the rise. Users become more and more concerned with how online service providers collect and protect their personal information. And so should you. Discover how to balance the risks and benefits of collecting data in the age of customer centricity.
As privacy and security professionals it's true: we simply can't get enough data on the costs of a data breach. This is primarily driven, of course, by our desire to quantify the risks associated with our profession in terms that organizations can understand and measure. Our quest is complicated, however, by the fact that breach cost data is so hard to come by.
This unique webinar will take data breach analysis to the next level. First we'll define our terms and review of some of the best known, publicly available data breach research. But then, we'll dive into a more detailed, exhaustive, quantitative review of breach data. This will include both case studies of a few seminal data breaches and statistical analysis of data breaches in the aggregate.
Our featured speaker for this timely webinar is Patrick Florer, Co-Founder & CTO of Risk Centric Security. Patrick, who is also a Fellow and Chief Research Analyst at the Ponemon Institute, has decades of experience in risk analysis and analytics and is considered an expert in data breach analysis.
Similar to Cloud Privacy Update: What You Need to Know (20)
The State of B2B Marketing: New Marketing Automation Stats for 2017Act-On Software
Many of the available marketing automation stats we regularly
use – to make strategic decisions, craft presentations, prepare
for sales calls – are getting a bit long in the tooth. So we set
off to uncover the most recent marketing stats by surveying
more than 350 marketing professionals in North America and
Europe to get their take on how investing in marketing
automation impacts business performance. The most
noteworthy results are included below.
Why Content Marketers Should Be Making Unicorn Babies Act-On Software
In this episode of the Rethink Podcast, we interview Larry Kim, CEO of Mobile Monkey, and founder of Wordstream. Larry is recognized as among the Top 50 Most Influential People in Digital Marketing. In this conversation, he talks about the differences between unicorn and donkey content, and how marketers can create unicorn babies.
Trust is a crucial part of attracting, converting, and retaining customers, and email newsletters are a great way to build that trust. A successful newsletter that is regular, reliable, and consistently delivers useful, interesting information can help you effectively nurture existing and future customers.
Getting started with marketing automation may seem complicated, but with a little preparation, you’ll see results right away. In fact, 44% of companies achieve a positive ROI within only six months - with a whopping 28% average overall return.
Our quick start guide will give you a 6-step strategy to prepare your organization for adopting marketing automation and help you accelerate your return on investment.
Marketing Automation Hacks: The Act-On EditionAct-On Software
If you’re already using Act-On, then you know that marketing automation is an indispensable tool for executing on your B2B marketing strategy. But the majority of B2B marketers still feel that they’re not using the technology to its full potential.
Act-On's Director of Digital Marketing, Linda West shares various #MAHacks to help you get ahead!
Rethinking the Role of Marketing, reveals that top performing marketing teams are taking full control of the customer lifecycle – everything from customer acquisition, to the more lucrative customer retention and expansion.
Looking to make a lasting impression on potential buyers? Check out this presentation for the tips & tricks you need to really dazzle with your content!
Having a tough time selling your C-suite on the benefits of marketing automation? Give this presentation a gander for the tips, tricks, and best practices necessary to build the strongest possible business case for marketing automation!
Learn to separate the signals from the noise when it comes to search engine marketing in this exciting presentation on SEO basics, brought to you by Website Magazine!
What Sales Leaders Should REALLY Expect from Marketing AutomationAct-On Software
Having trouble selling your sales leadership on the benefits of marketing automation? Don't miss this exciting presentation from Ian Michiels of Gleanster Research on the returns you and your business can expect from automated programs!
Ever wondered what makes for exceptional marketing content, or struggled to strike a proper balance between selling and serving? Lucky for you, Act-On's top demand gen personnel have tips and tricks to share that are sure to help your online offers really resonate! Get to know the ins and outs of crafting killer content in this exciting presentation.
Looking to move beyond a batch-and-blast approach when it comes to emails you send? Find out how to create more targeted offers with our crash course on lead nurturing basics!
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Act-On Software
Get to know the ins & outs of Canada's latest anti-spam legislation in this exciting webinar led by David Fowler, Act-On's Chief Deliverability Officer!
Who Is The Modern Customer? How Do They Want You to Talk to Them?Act-On Software
Ever wondered what makes the modern customer tick? See what some of today's top brands have done to engage buyers (and what buyers themselves have to say about brands) in this exciting presentation on leveraging social for brand awareness!
3. Today’s Agenda
Data Breach Updates for 2012
How to Protect Your Brand
Commercial Email: State of the State
Reputation Resources: Tools You Can Use
Privacy Bill of Rights
Wrap Up
Proprietary & Confidential 3
4. Not a day seems to go by without an
announcement of a brand and a recent
data compromise.
Will yours be next?
Proprietary & Confidential 4
5. Q: $6.5 Billion
A: Data breach impact to U.S.
businesses
Source: OTA
Proprietary & Confidential 5
11. Data breaches, what are they after?
Organizations who store large amounts of customer data
are attractive targets for identity thieves
Data is the new currency for the dark side
Thieves target personal, financial and other PII:
Names and Addresses
Phone Number
Email Address
Social Security Numbers
Bank Account Numbers
Credit and Debit Card Numbers
Account Passwords
Security Questions and Answers
Source: Zeta Interactive
Proprietary & Confidential 11
12. Data breaches, how do they work?
Attacks can take many forms
Phishing
Hacking
Malware
Hardware Theft
Exploiting of Accidental Release
Data Spill, Improper Disposal of Digital Assets, Other Accidents
Thieves use stolen data to victimize customers
Financial Fraud - All Forms and Types
Use of Stolen Information to Commit Additional Crimes
Money Laundering
Criminal Impersonation, Stalking and Harassment
Terrorism
Source: Zeta Interactive
Proprietary & Confidential 12
13. What are the privacy laws?
Federal Laws
• FTC Act
• Sarbanes-Oxley
• HIPPA / COPPA
States Laws
• Breach Notifications
• Data Encryption
• SSN Protection
Local Laws
• Wireless Networks
International Laws
• EU Data Protection Directive / UK Cookie Tracking
Professional / Trade Protocols
Source: Zeta Interactive
Proprietary & Confidential 13
14. What are the impacts?
Data breaches affect
every aspect of the IT
Security audits and scrutiny
company:
Infrastructure changes
Financial
Litigation Marketing & Communication
PR & crisis management
Business loss & focus
Brand degradation & mistrust
Stock devaluation
Identity protection
Legal
Government regulations
services & support Government notifications
PR & Marketing activity Class action lawsuits
Source: Zeta Interactive
Proprietary & Confidential 14
15. Protect your brand.
Technical security is a critical first step
Review all your potential internal loopholes
Conduct a comprehensive risk assessment
Identify threats
Analyze potential harm
Identify reasonable mitigation
Understand the legal landscape
Implement policies and procedures consistent with above
Develop a written information security program and incident
response
Periodically review the program to guard against new and evolving threats
Require your vendors to employ best security practices
Contractual language and penalties for non compliance
Make privacy a corporate mandate for adoption
Proprietary & Confidential 15
16. Tools you can use.
Seek guidance from your legal teams
Consider a third-party privacy seal for compliance
Register cousin domains that look like yours
• This will protect your brand online and avoid Phishing issues
Keys to consumer trust
• Notice: Say what you are going to do and do it
• Consent: Ask for permission
• Choice: Allow your customers options
Be transparent online - don’t hide your activities
Update your privacy policy regularly
Proprietary & Confidential 16
17. Commercial email state of the state
Email Deliverability = Brand Management
Brand Management = Email Reputation
Good Email Reputation = Better Deliverability
Better Deliverability = Builds Consumer TRUST
Better Consumer Trust = Drives Engagement
More aggressive filter implementation on ISP level
More streamlined industry organization/cooperation
Continued legal/privacy/technology issues remain
More informed clients as access to information is available
There are still No Guarantees for delivery to any inbox
Proprietary & Confidential 17
18. A word on reputation
Majority of deliverability issues are based on reputation
The data that affects reputation includes:
• Email authentication implementation
• Email volumes
• Complaint rates
• Hard bounce rates
• Spam trap hits
• Consumer engagement: clicks / opens / conversions
To protect reputation:
• Monitor the sends consistently
To repair reputation:
• Fix the problems data integrity / confirmed opt-in
Proprietary & Confidential 18
20. The Consumers Privacy Bill of Rights
Privacy Right Definition
A right to exercise control over what personal data companies
Individual control
collect and how they use it.
A right to readable and accessible information about privacy
Transparency
and security practices.
A right to expect that companies will collect, use and
Respect for Context disclosure personal data in ways consistent with the context
where data was shared.
Security A right to secure and responsible handling of personal data.
A right to access and correct personal data in usable formats,
Access and Accuracy
in a manner appropriate to data sensitivity.
A right to reasonable limits on the personal data that
Focused Collection
companies collect and retain.
A right to have personal data handled by companies in a
Accountability
manner that complies with the Consumer Privacy Bill of Rights.
Proprietary & Confidential 20
21. Wrap up
Data breaches will continue to evolve
Protect your brand online
Monitor your online reputation
Be proactive not reactive for your brand
• Have a plan and execute to it
Manage internal and external expectations
• Who do you do business with and do they COMPLY?
Obey the law
• Understand what’s required of you and your online presence
Your online journey will be rewarding when you invest the time and resources
Proprietary & Confidential 21
Hello, I’m thrilled to be here today! I’m going to give you an overview on the Best Practices in list Segmentation. So Who am I… My name is Jeff Linton – Manager, Product Marketing with Act-On Software – Little about me …I have not always been in Marketing I actually started here in SALES on January 2nd of 2011 as number 16th in the company. I tell this to you because I may be one of the only people in marketing that likes sales and the only sales guy that liked marketing…. Really, I’m in a great spot with a great company – in fact Today our new hire training class ( that’s in our conference room as we speak ) consists of 27 new individuals to acton, yes we have be very very busy to say the least… Before we get started I’d like to cover a few details about today session. For those on twitter you follow us and tweet during the session using the hash tag A O W E B.One more thing….