SlideShare a Scribd company logo
Cloud Privacy Update:
           What You Need To Know


                             David Fowler
                             July 24, 2012


Proprietary & Confidential
David Fowler
Chief Privacy & Deliverability
Officer
@ActOnSoftware



                          #AOWEB
Today’s Agenda

   Data Breach Updates for 2012
   How to Protect Your Brand
   Commercial Email: State of the State
   Reputation Resources: Tools You Can Use
   Privacy Bill of Rights
   Wrap Up



Proprietary & Confidential   3
Not a day seems to go by without an
 announcement of a brand and a recent
           data compromise.


                             Will yours be next?


Proprietary & Confidential            4
Q: $6.5 Billion
          A: Data breach impact to U.S.
                   businesses



                                     Source: OTA
Proprietary & Confidential   5
2011 Data Breach Highlights

558 breaches

126 million records

76% server exploits

92% avoidable

$318 cost per record

$7.2 million average cost of each breach

$6.5 billion impact to U.S. businesses
                                                                                Source: OTA
                                   © 2012 All rights reserved. Online Trust Alliance (OTA)
What do they have in common?




            © 2012 All rights reserved. Online Trust Alliance (OTA)
© 2012 All rights reserved. Online Trust Alliance (OTA)
Why Care?

“We have spent over 12 years building
our reputation and trust. It is painful to
see us take so many steps back due to a
single incident.”
Zappos CEO, Tony Hsieh




                       © 2012 All rights reserved. Online Trust Alliance (OTA)
Why Care?

What has changed?
   Data driven economy – “Big Data”
   Multi-Channel & blurring of on & off-line data
   Evolving definitions of PII and coverage information
   Complexity and dynamic regulatory environment
   Reliance of service providers & cloud services
   Shift from a PC centric to users with multiple devices
   Increased sophistication of the cyber-criminal



                                 © 2012 All rights reserved. Online Trust Alliance (OTA)
Data breaches, what are they after?
 Organizations who store large amounts of customer data
  are attractive targets for identity thieves
       Data is the new currency for the dark side
 Thieves target personal, financial and other PII:
         Names and Addresses
         Phone Number
         Email Address
         Social Security Numbers
         Bank Account Numbers
         Credit and Debit Card Numbers
         Account Passwords
         Security Questions and Answers

                                                      Source: Zeta Interactive

 Proprietary & Confidential           11
Data breaches, how do they work?

 Attacks can take many forms
        Phishing
        Hacking
        Malware
        Hardware Theft
        Exploiting of Accidental Release
 Data Spill, Improper Disposal of Digital Assets, Other Accidents
 Thieves use stolen data to victimize customers
        Financial Fraud - All Forms and Types
        Use of Stolen Information to Commit Additional Crimes
        Money Laundering
        Criminal Impersonation, Stalking and Harassment
        Terrorism

                                                                 Source: Zeta Interactive

 Proprietary & Confidential             12
What are the privacy laws?

Federal Laws
  • FTC Act
  • Sarbanes-Oxley
  • HIPPA / COPPA
States Laws
  • Breach Notifications
  • Data Encryption
  • SSN Protection
Local Laws
  • Wireless Networks

International Laws
  • EU Data Protection Directive / UK Cookie Tracking

Professional / Trade Protocols
                                                         Source: Zeta Interactive

Proprietary & Confidential                     13
What are the impacts?

Data breaches affect
every aspect of the                       IT
                                            Security audits and scrutiny
company:
                                            Infrastructure changes
        Financial

        Litigation                       Marketing & Communication
                                            PR & crisis management
        Business loss & focus
                                            Brand degradation & mistrust
        Stock devaluation
        Identity protection
                                          Legal
                                            Government regulations
          services & support                Government notifications
        PR & Marketing activity            Class action lawsuits


                                                                  Source: Zeta Interactive

Proprietary & Confidential          14
Protect your brand.
 Technical security is a critical first step
        Review all your potential internal loopholes
 Conduct a comprehensive risk assessment
          Identify threats
          Analyze potential harm
          Identify reasonable mitigation
          Understand the legal landscape
          Implement policies and procedures consistent with above
 Develop a written information security program and incident
  response
        Periodically review the program to guard against new and evolving threats
 Require your vendors to employ best security practices
        Contractual language and penalties for non compliance
 Make privacy a corporate mandate for adoption



Proprietary & Confidential                   15
Tools you can use.

Seek guidance from your legal teams

Consider a third-party privacy seal for compliance

Register cousin domains that look like yours
  • This will protect your brand online and avoid Phishing issues

Keys to consumer trust
  • Notice: Say what you are going to do and do it
  • Consent: Ask for permission
  • Choice: Allow your customers options

Be transparent online - don’t hide your activities

Update your privacy policy regularly
Proprietary & Confidential              16
Commercial email state of the state

   Email Deliverability = Brand Management
   Brand Management = Email Reputation
   Good Email Reputation = Better Deliverability
   Better Deliverability = Builds Consumer TRUST
   Better Consumer Trust = Drives Engagement
   More aggressive filter implementation on ISP level
   More streamlined industry organization/cooperation
   Continued legal/privacy/technology issues remain
   More informed clients as access to information is available
   There are still No Guarantees for delivery to any inbox


Proprietary & Confidential          17
A word on reputation

Majority of deliverability issues are based on reputation

The data that affects reputation includes:
  • Email authentication implementation
  • Email volumes
  • Complaint rates
  • Hard bounce rates
  • Spam trap hits
  • Consumer engagement: clicks / opens / conversions

To protect reputation:
  • Monitor the sends consistently

To repair reputation:
  • Fix the problems data integrity / confirmed opt-in

Proprietary & Confidential                 18
Reputation resources




Proprietary & Confidential   19
The Consumers Privacy Bill of Rights

     Privacy Right                                     Definition
                             A right to exercise control over what personal data companies
Individual control
                             collect and how they use it.
                             A right to readable and accessible information about privacy
Transparency
                             and security practices.
                             A right to expect that companies will collect, use and
Respect for Context          disclosure personal data in ways consistent with the context
                             where data was shared.
Security                     A right to secure and responsible handling of personal data.
                             A right to access and correct personal data in usable formats,
Access and Accuracy
                             in a manner appropriate to data sensitivity.
                             A right to reasonable limits on the personal data that
Focused Collection
                             companies collect and retain.
                             A right to have personal data handled by companies in a
Accountability
                             manner that complies with the Consumer Privacy Bill of Rights.




Proprietary & Confidential                    20
Wrap up

Data breaches will continue to evolve

Protect your brand online

Monitor your online reputation

Be proactive not reactive for your brand
 • Have a plan and execute to it

Manage internal and external expectations
 • Who do you do business with and do they COMPLY?

Obey the law
 • Understand what’s required of you and your online presence

Your online journey will be rewarding when you invest the time and resources

 Proprietary & Confidential                    21
Need Help?




Sign up for a demo
  www.act-on.com
Thank You

                      David.Fowler@Act-On.com




Proprietary & Confidential   23
References
 FTC Act
        http://www.ftc.gov/ogc/ftcact.shtm
 FTC Dot Com Disclosures
        http://business.ftc.gov/documents/bus41-dot-com-disclosures-
         information-about-online-advertising
 Sarbanes Oxley
        http://www.soxlaw.com/
 TRUSTe
        www.truste.org




Proprietary & Confidential           24

More Related Content

What's hot

Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
EamonnORagh
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
lmgangi
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
TechSoup
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
Arpin Consulting
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
Thomas Bronack
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
Lifeline Data Centers
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Business Development Institute
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
IBM Security
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Electronic data & record management
Electronic data & record managementElectronic data & record management
Electronic data & record management
GreenLeafInst
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
NAFCU Services Corporation
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Creus Moreira Carlos
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
 
Data Breach Response Guide (Whitepaper))
Data Breach Response Guide (Whitepaper))Data Breach Response Guide (Whitepaper))
Data Breach Response Guide (Whitepaper))
NAFCU Services Corporation
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
American Chamber of Commerce in Bahrain
 

What's hot (20)

Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Wk White Paper
Wk White PaperWk White Paper
Wk White Paper
 
Electronic data & record management
Electronic data & record managementElectronic data & record management
Electronic data & record management
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Data Breach Response Guide (Whitepaper))
Data Breach Response Guide (Whitepaper))Data Breach Response Guide (Whitepaper))
Data Breach Response Guide (Whitepaper))
 
Ecommerce Chap 10
Ecommerce Chap 10Ecommerce Chap 10
Ecommerce Chap 10
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 

Viewers also liked

Jenny phương bài học
Jenny phương bài họcJenny phương bài học
Jenny phương bài học
Jenny Phương
 
Jenny phương nghèo
Jenny phương nghèoJenny phương nghèo
Jenny phương nghèo
Jenny Phương
 
What's Driving the Adoption of Marketing Automation?
What's Driving the Adoption of Marketing Automation?What's Driving the Adoption of Marketing Automation?
What's Driving the Adoption of Marketing Automation?Act-On Software
 
Search Marketing: Optimizing for the Future
Search Marketing: Optimizing for the FutureSearch Marketing: Optimizing for the Future
Search Marketing: Optimizing for the FutureAct-On Software
 
Getting the Most Out of Multichannel Marketing
Getting the Most Out of Multichannel MarketingGetting the Most Out of Multichannel Marketing
Getting the Most Out of Multichannel MarketingAct-On Software
 
The Evolution of the Social Buying Process
The Evolution of the Social Buying ProcessThe Evolution of the Social Buying Process
The Evolution of the Social Buying ProcessAct-On Software
 
Maldoum photo.essay
Maldoum photo.essayMaldoum photo.essay
Maldoum photo.essay
annbanan927
 

Viewers also liked (7)

Jenny phương bài học
Jenny phương bài họcJenny phương bài học
Jenny phương bài học
 
Jenny phương nghèo
Jenny phương nghèoJenny phương nghèo
Jenny phương nghèo
 
What's Driving the Adoption of Marketing Automation?
What's Driving the Adoption of Marketing Automation?What's Driving the Adoption of Marketing Automation?
What's Driving the Adoption of Marketing Automation?
 
Search Marketing: Optimizing for the Future
Search Marketing: Optimizing for the FutureSearch Marketing: Optimizing for the Future
Search Marketing: Optimizing for the Future
 
Getting the Most Out of Multichannel Marketing
Getting the Most Out of Multichannel MarketingGetting the Most Out of Multichannel Marketing
Getting the Most Out of Multichannel Marketing
 
The Evolution of the Social Buying Process
The Evolution of the Social Buying ProcessThe Evolution of the Social Buying Process
The Evolution of the Social Buying Process
 
Maldoum photo.essay
Maldoum photo.essayMaldoum photo.essay
Maldoum photo.essay
 

Similar to Cloud Privacy Update: What You Need to Know

DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
TrustArc
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
DATAVERSITY
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
Resilient Systems
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
aiimnevada
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmineEvelyne Oreskovich
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Business Days
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
Precisely
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Agile Financial Technologies
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data
DATAVERSITY
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
Compliancy Group
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
BDO_Consulting
 
CDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdfCDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdf
Carlos Roberto Paula Soares
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
Integrate
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
Druva
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
Piwik PRO
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 

Similar to Cloud Privacy Update: What You Need to Know (20)

DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
CDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdfCDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdf
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 

More from Act-On Software

Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps
Act-On Software
 
The State of B2B Marketing: New Marketing Automation Stats for 2017
The State of B2B Marketing: New Marketing Automation Stats for 2017The State of B2B Marketing: New Marketing Automation Stats for 2017
The State of B2B Marketing: New Marketing Automation Stats for 2017
Act-On Software
 
Why Content Marketers Should Be Making Unicorn Babies
Why Content Marketers Should Be Making Unicorn Babies Why Content Marketers Should Be Making Unicorn Babies
Why Content Marketers Should Be Making Unicorn Babies
Act-On Software
 
How to Create a Successful Email Newsletter
How to Create a Successful Email Newsletter How to Create a Successful Email Newsletter
How to Create a Successful Email Newsletter
Act-On Software
 
Marketing Quick Start Guide
Marketing Quick Start Guide Marketing Quick Start Guide
Marketing Quick Start Guide
Act-On Software
 
INBOUND OR OUTBOUND? HOW ABOUT BOTH?
INBOUND OR OUTBOUND? HOW ABOUT BOTH?INBOUND OR OUTBOUND? HOW ABOUT BOTH?
INBOUND OR OUTBOUND? HOW ABOUT BOTH?
Act-On Software
 
Marketing Automation Hacks: The Act-On Edition
Marketing Automation Hacks: The Act-On EditionMarketing Automation Hacks: The Act-On Edition
Marketing Automation Hacks: The Act-On Edition
Act-On Software
 
Rethinking the Role of Marketing
Rethinking the Role of MarketingRethinking the Role of Marketing
Rethinking the Role of Marketing
Act-On Software
 
Creating Killer Marketing Content
Creating Killer Marketing ContentCreating Killer Marketing Content
Creating Killer Marketing Content
Act-On Software
 
Getting the Buy-In from the C-Suite
Getting the Buy-In from the C-SuiteGetting the Buy-In from the C-Suite
Getting the Buy-In from the C-Suite
Act-On Software
 
SEO in 2014: Fact, Fiction, & Sensationalism
SEO in 2014: Fact, Fiction, & SensationalismSEO in 2014: Fact, Fiction, & Sensationalism
SEO in 2014: Fact, Fiction, & Sensationalism
Act-On Software
 
What Sales Leaders Should REALLY Expect from Marketing Automation
What Sales Leaders Should REALLY Expect from Marketing AutomationWhat Sales Leaders Should REALLY Expect from Marketing Automation
What Sales Leaders Should REALLY Expect from Marketing Automation
Act-On Software
 
Critical Rules for SEO Success in 2014
Critical Rules for SEO Success in 2014Critical Rules for SEO Success in 2014
Critical Rules for SEO Success in 2014Act-On Software
 
Target marketing improve email pic
Target marketing   improve email picTarget marketing   improve email pic
Target marketing improve email picAct-On Software
 
Creating Killer Marketing Content
Creating Killer Marketing ContentCreating Killer Marketing Content
Creating Killer Marketing Content
Act-On Software
 
Getting Started with Lead Nurturing
Getting Started with Lead NurturingGetting Started with Lead Nurturing
Getting Started with Lead Nurturing
Act-On Software
 
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Act-On Software
 
Who Is The Modern Customer? How Do They Want You to Talk to Them?
Who Is The Modern Customer? How Do They Want You to Talk to Them?Who Is The Modern Customer? How Do They Want You to Talk to Them?
Who Is The Modern Customer? How Do They Want You to Talk to Them?
Act-On Software
 
Inactive Email Subscribers: Best Practices for Re-Engagement
Inactive Email Subscribers: Best Practices for Re-EngagementInactive Email Subscribers: Best Practices for Re-Engagement
Inactive Email Subscribers: Best Practices for Re-Engagement
Act-On Software
 
Brunch and Learn - Direct Marketing on a Shoestring Budget
Brunch and Learn - Direct Marketing on a Shoestring BudgetBrunch and Learn - Direct Marketing on a Shoestring Budget
Brunch and Learn - Direct Marketing on a Shoestring BudgetAct-On Software
 

More from Act-On Software (20)

Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps
 
The State of B2B Marketing: New Marketing Automation Stats for 2017
The State of B2B Marketing: New Marketing Automation Stats for 2017The State of B2B Marketing: New Marketing Automation Stats for 2017
The State of B2B Marketing: New Marketing Automation Stats for 2017
 
Why Content Marketers Should Be Making Unicorn Babies
Why Content Marketers Should Be Making Unicorn Babies Why Content Marketers Should Be Making Unicorn Babies
Why Content Marketers Should Be Making Unicorn Babies
 
How to Create a Successful Email Newsletter
How to Create a Successful Email Newsletter How to Create a Successful Email Newsletter
How to Create a Successful Email Newsletter
 
Marketing Quick Start Guide
Marketing Quick Start Guide Marketing Quick Start Guide
Marketing Quick Start Guide
 
INBOUND OR OUTBOUND? HOW ABOUT BOTH?
INBOUND OR OUTBOUND? HOW ABOUT BOTH?INBOUND OR OUTBOUND? HOW ABOUT BOTH?
INBOUND OR OUTBOUND? HOW ABOUT BOTH?
 
Marketing Automation Hacks: The Act-On Edition
Marketing Automation Hacks: The Act-On EditionMarketing Automation Hacks: The Act-On Edition
Marketing Automation Hacks: The Act-On Edition
 
Rethinking the Role of Marketing
Rethinking the Role of MarketingRethinking the Role of Marketing
Rethinking the Role of Marketing
 
Creating Killer Marketing Content
Creating Killer Marketing ContentCreating Killer Marketing Content
Creating Killer Marketing Content
 
Getting the Buy-In from the C-Suite
Getting the Buy-In from the C-SuiteGetting the Buy-In from the C-Suite
Getting the Buy-In from the C-Suite
 
SEO in 2014: Fact, Fiction, & Sensationalism
SEO in 2014: Fact, Fiction, & SensationalismSEO in 2014: Fact, Fiction, & Sensationalism
SEO in 2014: Fact, Fiction, & Sensationalism
 
What Sales Leaders Should REALLY Expect from Marketing Automation
What Sales Leaders Should REALLY Expect from Marketing AutomationWhat Sales Leaders Should REALLY Expect from Marketing Automation
What Sales Leaders Should REALLY Expect from Marketing Automation
 
Critical Rules for SEO Success in 2014
Critical Rules for SEO Success in 2014Critical Rules for SEO Success in 2014
Critical Rules for SEO Success in 2014
 
Target marketing improve email pic
Target marketing   improve email picTarget marketing   improve email pic
Target marketing improve email pic
 
Creating Killer Marketing Content
Creating Killer Marketing ContentCreating Killer Marketing Content
Creating Killer Marketing Content
 
Getting Started with Lead Nurturing
Getting Started with Lead NurturingGetting Started with Lead Nurturing
Getting Started with Lead Nurturing
 
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
 
Who Is The Modern Customer? How Do They Want You to Talk to Them?
Who Is The Modern Customer? How Do They Want You to Talk to Them?Who Is The Modern Customer? How Do They Want You to Talk to Them?
Who Is The Modern Customer? How Do They Want You to Talk to Them?
 
Inactive Email Subscribers: Best Practices for Re-Engagement
Inactive Email Subscribers: Best Practices for Re-EngagementInactive Email Subscribers: Best Practices for Re-Engagement
Inactive Email Subscribers: Best Practices for Re-Engagement
 
Brunch and Learn - Direct Marketing on a Shoestring Budget
Brunch and Learn - Direct Marketing on a Shoestring BudgetBrunch and Learn - Direct Marketing on a Shoestring Budget
Brunch and Learn - Direct Marketing on a Shoestring Budget
 

Cloud Privacy Update: What You Need to Know

  • 1. Cloud Privacy Update: What You Need To Know David Fowler July 24, 2012 Proprietary & Confidential
  • 2. David Fowler Chief Privacy & Deliverability Officer @ActOnSoftware #AOWEB
  • 3. Today’s Agenda  Data Breach Updates for 2012  How to Protect Your Brand  Commercial Email: State of the State  Reputation Resources: Tools You Can Use  Privacy Bill of Rights  Wrap Up Proprietary & Confidential 3
  • 4. Not a day seems to go by without an announcement of a brand and a recent data compromise. Will yours be next? Proprietary & Confidential 4
  • 5. Q: $6.5 Billion A: Data breach impact to U.S. businesses Source: OTA Proprietary & Confidential 5
  • 6. 2011 Data Breach Highlights 558 breaches 126 million records 76% server exploits 92% avoidable $318 cost per record $7.2 million average cost of each breach $6.5 billion impact to U.S. businesses Source: OTA © 2012 All rights reserved. Online Trust Alliance (OTA)
  • 7. What do they have in common? © 2012 All rights reserved. Online Trust Alliance (OTA)
  • 8. © 2012 All rights reserved. Online Trust Alliance (OTA)
  • 9. Why Care? “We have spent over 12 years building our reputation and trust. It is painful to see us take so many steps back due to a single incident.” Zappos CEO, Tony Hsieh © 2012 All rights reserved. Online Trust Alliance (OTA)
  • 10. Why Care? What has changed?  Data driven economy – “Big Data”  Multi-Channel & blurring of on & off-line data  Evolving definitions of PII and coverage information  Complexity and dynamic regulatory environment  Reliance of service providers & cloud services  Shift from a PC centric to users with multiple devices  Increased sophistication of the cyber-criminal © 2012 All rights reserved. Online Trust Alliance (OTA)
  • 11. Data breaches, what are they after?  Organizations who store large amounts of customer data are attractive targets for identity thieves  Data is the new currency for the dark side  Thieves target personal, financial and other PII:  Names and Addresses  Phone Number  Email Address  Social Security Numbers  Bank Account Numbers  Credit and Debit Card Numbers  Account Passwords  Security Questions and Answers Source: Zeta Interactive Proprietary & Confidential 11
  • 12. Data breaches, how do they work?  Attacks can take many forms  Phishing  Hacking  Malware  Hardware Theft  Exploiting of Accidental Release  Data Spill, Improper Disposal of Digital Assets, Other Accidents  Thieves use stolen data to victimize customers  Financial Fraud - All Forms and Types  Use of Stolen Information to Commit Additional Crimes  Money Laundering  Criminal Impersonation, Stalking and Harassment  Terrorism Source: Zeta Interactive Proprietary & Confidential 12
  • 13. What are the privacy laws? Federal Laws • FTC Act • Sarbanes-Oxley • HIPPA / COPPA States Laws • Breach Notifications • Data Encryption • SSN Protection Local Laws • Wireless Networks International Laws • EU Data Protection Directive / UK Cookie Tracking Professional / Trade Protocols Source: Zeta Interactive Proprietary & Confidential 13
  • 14. What are the impacts? Data breaches affect every aspect of the  IT  Security audits and scrutiny company:  Infrastructure changes  Financial  Litigation  Marketing & Communication  PR & crisis management  Business loss & focus  Brand degradation & mistrust  Stock devaluation  Identity protection  Legal  Government regulations services & support  Government notifications  PR & Marketing activity  Class action lawsuits Source: Zeta Interactive Proprietary & Confidential 14
  • 15. Protect your brand.  Technical security is a critical first step  Review all your potential internal loopholes  Conduct a comprehensive risk assessment  Identify threats  Analyze potential harm  Identify reasonable mitigation  Understand the legal landscape  Implement policies and procedures consistent with above  Develop a written information security program and incident response  Periodically review the program to guard against new and evolving threats  Require your vendors to employ best security practices  Contractual language and penalties for non compliance  Make privacy a corporate mandate for adoption Proprietary & Confidential 15
  • 16. Tools you can use. Seek guidance from your legal teams Consider a third-party privacy seal for compliance Register cousin domains that look like yours • This will protect your brand online and avoid Phishing issues Keys to consumer trust • Notice: Say what you are going to do and do it • Consent: Ask for permission • Choice: Allow your customers options Be transparent online - don’t hide your activities Update your privacy policy regularly Proprietary & Confidential 16
  • 17. Commercial email state of the state  Email Deliverability = Brand Management  Brand Management = Email Reputation  Good Email Reputation = Better Deliverability  Better Deliverability = Builds Consumer TRUST  Better Consumer Trust = Drives Engagement  More aggressive filter implementation on ISP level  More streamlined industry organization/cooperation  Continued legal/privacy/technology issues remain  More informed clients as access to information is available  There are still No Guarantees for delivery to any inbox Proprietary & Confidential 17
  • 18. A word on reputation Majority of deliverability issues are based on reputation The data that affects reputation includes: • Email authentication implementation • Email volumes • Complaint rates • Hard bounce rates • Spam trap hits • Consumer engagement: clicks / opens / conversions To protect reputation: • Monitor the sends consistently To repair reputation: • Fix the problems data integrity / confirmed opt-in Proprietary & Confidential 18
  • 20. The Consumers Privacy Bill of Rights Privacy Right Definition A right to exercise control over what personal data companies Individual control collect and how they use it. A right to readable and accessible information about privacy Transparency and security practices. A right to expect that companies will collect, use and Respect for Context disclosure personal data in ways consistent with the context where data was shared. Security A right to secure and responsible handling of personal data. A right to access and correct personal data in usable formats, Access and Accuracy in a manner appropriate to data sensitivity. A right to reasonable limits on the personal data that Focused Collection companies collect and retain. A right to have personal data handled by companies in a Accountability manner that complies with the Consumer Privacy Bill of Rights. Proprietary & Confidential 20
  • 21. Wrap up Data breaches will continue to evolve Protect your brand online Monitor your online reputation Be proactive not reactive for your brand • Have a plan and execute to it Manage internal and external expectations • Who do you do business with and do they COMPLY? Obey the law • Understand what’s required of you and your online presence Your online journey will be rewarding when you invest the time and resources Proprietary & Confidential 21
  • 22. Need Help? Sign up for a demo www.act-on.com
  • 23. Thank You David.Fowler@Act-On.com Proprietary & Confidential 23
  • 24. References  FTC Act  http://www.ftc.gov/ogc/ftcact.shtm  FTC Dot Com Disclosures  http://business.ftc.gov/documents/bus41-dot-com-disclosures- information-about-online-advertising  Sarbanes Oxley  http://www.soxlaw.com/  TRUSTe  www.truste.org Proprietary & Confidential 24

Editor's Notes

  1. Hello, I’m thrilled to be here today! I’m going to give you an overview on the Best Practices in list Segmentation. So Who am I… My name is Jeff Linton – Manager, Product Marketing with Act-On Software – Little about me …I have not always been in Marketing I actually started here in SALES on January 2nd of 2011 as number 16th in the company. I tell this to you because I may be one of the only people in marketing that likes sales and the only sales guy that liked marketing…. Really, I’m in a great spot with a great company – in fact Today our new hire training class ( that’s in our conference room as we speak ) consists of 27 new individuals to acton, yes we have be very very busy to say the least… Before we get started I’d like to cover a few details about today session. For those on twitter you follow us and tweet during the session using the hash tag A O W E B.One more thing….