This document provides an overview of best practices for social marketing that puts consumers first. It discusses considering platforms and programs used, avoiding common myths, and addressing privacy concerns. Best practices include thinking carefully, creating standardized processes, providing disclosures and documentation, and monitoring programs. The current regulatory landscape for privacy is also examined, with the future expected to bring more comprehensive privacy laws in various jurisdictions. Enforcement of regulations is increasing, so marketers must develop a culture of compliance.
This document discusses social media risks and related laws. It covers how conversations on social media can become publications with legal implications. Some key topics discussed include privacy risks from sharing personal information and companies monitoring employees' social media, intellectual property risks like copyright infringement, and defamation risks from making untrue statements about others. The document also examines how various laws like privacy acts, harassment laws, and intellectual property laws apply in the social media context.
This document discusses data protection and risk mitigation under South Africa's Protection of Personal Information Act (POPI). It addresses key issues like identifying personal data and systems impacted by POPI, information security safeguards, records management policies, digital content and app ownership, and considerations for protecting young people's data. The document provides recommendations like conducting a POPI audit, appointing an information officer, and establishing policies regarding privacy, security, and intellectual property.
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
Presentación del Webinar de nuestra hermana Mind Your Privacy y Cardinal Path
En el actual escenario digital, más que nunca los analistas, marketeros y demás profesionales de datos deben conocer los cambios en las normativas nacionales e internacionales así como una serie de principios básicos para respetar la privacidad y la protección de los que sus datos recogen.
Digital Marketing meets Privacy
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
This document discusses social media risks and related laws. It covers how conversations on social media can become publications with legal implications. Some key topics discussed include privacy risks from sharing personal information and companies monitoring employees' social media, intellectual property risks like copyright infringement, and defamation risks from making untrue statements about others. The document also examines how various laws like privacy acts, harassment laws, and intellectual property laws apply in the social media context.
This document discusses data protection and risk mitigation under South Africa's Protection of Personal Information Act (POPI). It addresses key issues like identifying personal data and systems impacted by POPI, information security safeguards, records management policies, digital content and app ownership, and considerations for protecting young people's data. The document provides recommendations like conducting a POPI audit, appointing an information officer, and establishing policies regarding privacy, security, and intellectual property.
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
Presentación del Webinar de nuestra hermana Mind Your Privacy y Cardinal Path
En el actual escenario digital, más que nunca los analistas, marketeros y demás profesionales de datos deben conocer los cambios en las normativas nacionales e internacionales así como una serie de principios básicos para respetar la privacidad y la protección de los que sus datos recogen.
Digital Marketing meets Privacy
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
This document summarizes issues related to privacy and emerging technologies. It discusses how technologies like body cameras, big data, and the internet of things impact privacy based on international human rights standards. Specific concerns addressed include behavioral marketing, data aggregation, metadata collection, and government surveillance partnerships with private companies. The document advocates that any reforms around these issues must consider the close relationship between companies and governments when it comes to accessing people's personal information.
Managing the Risks of User-Generated Content Maanit Zemel
This presentation provides an overview of the legal and reputation risks that website operators and intermediaries face when hosting User-Generated Content (UGC) in Canada and the U.S.
This document discusses key issues related to privacy and the internet. It outlines different approaches to defining and protecting privacy, noting that privacy means different things to different people and cultures. It also discusses the trade-offs associated with privacy regulation and the challenge of controlling information online given factors like digitization, ubiquitous networks, and the user generation of large amounts of content. The document advocates for an alternative approach focused on education, empowerment, and targeted enforcement rather than anticipatory regulation.
Behavioral tracking and targeting provides targeted ads but raises privacy concerns. A study found the average website installed 64 tracking technologies without warning. While behavioral ads can increase revenues, many feel uncomfortable with their data being tracked and shared without consent. Laws aim to protect privacy but concerns remain about data security, secondary use and respecting consumers' right to privacy. Overall it is debated whether behavioral tracking should continue given the economic benefits versus privacy and ethical implications.
This document discusses five moral dimensions of information systems:
1) Information rights and privacy challenges from technology like cookies, web beacons, and spyware.
2) Challenges to intellectual property from easy digital copying and distribution online.
3) Accountability issues around who is liable for technology errors or injuries.
4) Ensuring adequate system quality given limits of perfect software and data input errors.
5) Potential negative social impacts on work-life balance, dependence on systems, rapid job changes, and new forms of computer crime and health issues.
This document discusses the General Data Protection Regulation (GDPR) and its implications for companies. It begins by explaining what the GDPR is and how it strengthens data privacy for EU citizens. It then discusses some of the top issues companies face in complying with the GDPR, such as the right to be forgotten, consent requirements, and proving compliance. It notes that GDPR compliance is important for US companies too if they have EU customers or their data. Finally, it provides recommendations for steps companies should take to comply with the GDPR, including mapping data processes, identifying gaps, appointing a data protection officer, and integrating privacy practices.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...Adam Thierer
The document discusses the challenges of applying benefit-cost analysis (BCA) to regulations regarding online safety and privacy. It notes that defining harm is difficult, as many privacy and safety issues involve intangible or subjective harms that are hard to quantify. It also outlines the costs that must be considered in BCA, such as lost opportunities from new services or restrictions on data collection. The document argues that alternatives to regulation, such as education, empowering users with privacy-enhancing tools, and targeted enforcement, should be seriously considered in BCA before preemptive regulation is pursued.
1. Behavioral advertising is a form of online advertising where ads are selected based on websites visited, actions taken, or user information to target users.
2. There is debate around whether behavioral advertising violates privacy laws and if self-regulation is sufficient given consumers' growing awareness of privacy issues related to targeted ads.
3. While industry argues that legislation could harm innovation, privacy advocates and lawmakers support regulations to increase transparency around data collection and use for behavioral advertising. Monitoring and evidence are needed to ensure self-regulatory principles are followed.
Trending Topics in Data Collection & Targeted MarketingcdasLLP
Slideshow to accompany co-sponsored panel from IAB Ad Lab and Cowan, DeBaets, Abrahams & Sheppard LLP. Participants: Joshua B. Sessler, Eleanor M. Lackman, Sarah Hudgins. For more entertainment and digital media law analysis, go to: http://cdas.com/legal/
The document discusses how companies are addressing risks associated with social media use. It outlines several approaches companies are taking, including: 1) reviewing existing compliance policies and drafting social media policies; 2) restricting workplace access to social media; 3) utilizing social media monitoring tools; 4) considering actual social media business issues; and 5) reviewing insurance coverage. Common elements of social media policies include identifying when employees are speaking on behalf of the company and requiring accuracy, among other guidelines.
Deloitte Social Media Analytics Event: Social Media legal considerationskamalesl
This document discusses 10 important legal considerations for social media. It covers issues around recruiting, employee use of social media, user generated content and copyright, trademarks, libel, data protection, informed consent, platform responsibility, available remedies, and jurisdiction. Overall, it notes that while technology develops faster than the law, companies should develop social media strategies to address HR, data protection, IP, and other legal issues that can arise.
1. Some businesses engage in unethical practices like spamming to increase sales, as there are limited online laws and enforcement is done by users.
2. It is important for businesses to have ethical policies and protect customer privacy and security in order to build trust with online customers.
3. Laws aim to protect children's privacy and safety online by restricting data collection and requiring schools to use filtering software. Parents can also monitor children's internet use.
This document discusses some of the key issues around big data including potential implications, views on data collection purposes, identity theft concerns, and regulatory challenges. It notes that while big data is often viewed as increasing identity theft risks, the overall rates have actually remained flat since 2005. Additionally, the EU is poised for sweeping changes to data protection laws for member states, while US policy reviews are underway due to Edward Snowden's NSA leaks.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
This document summarizes issues related to privacy and emerging technologies. It discusses how technologies like body cameras, big data, and the internet of things impact privacy based on international human rights standards. Specific concerns addressed include behavioral marketing, data aggregation, metadata collection, and government surveillance partnerships with private companies. The document advocates that any reforms around these issues must consider the close relationship between companies and governments when it comes to accessing people's personal information.
Managing the Risks of User-Generated Content Maanit Zemel
This presentation provides an overview of the legal and reputation risks that website operators and intermediaries face when hosting User-Generated Content (UGC) in Canada and the U.S.
This document discusses key issues related to privacy and the internet. It outlines different approaches to defining and protecting privacy, noting that privacy means different things to different people and cultures. It also discusses the trade-offs associated with privacy regulation and the challenge of controlling information online given factors like digitization, ubiquitous networks, and the user generation of large amounts of content. The document advocates for an alternative approach focused on education, empowerment, and targeted enforcement rather than anticipatory regulation.
Behavioral tracking and targeting provides targeted ads but raises privacy concerns. A study found the average website installed 64 tracking technologies without warning. While behavioral ads can increase revenues, many feel uncomfortable with their data being tracked and shared without consent. Laws aim to protect privacy but concerns remain about data security, secondary use and respecting consumers' right to privacy. Overall it is debated whether behavioral tracking should continue given the economic benefits versus privacy and ethical implications.
This document discusses five moral dimensions of information systems:
1) Information rights and privacy challenges from technology like cookies, web beacons, and spyware.
2) Challenges to intellectual property from easy digital copying and distribution online.
3) Accountability issues around who is liable for technology errors or injuries.
4) Ensuring adequate system quality given limits of perfect software and data input errors.
5) Potential negative social impacts on work-life balance, dependence on systems, rapid job changes, and new forms of computer crime and health issues.
This document discusses the General Data Protection Regulation (GDPR) and its implications for companies. It begins by explaining what the GDPR is and how it strengthens data privacy for EU citizens. It then discusses some of the top issues companies face in complying with the GDPR, such as the right to be forgotten, consent requirements, and proving compliance. It notes that GDPR compliance is important for US companies too if they have EU customers or their data. Finally, it provides recommendations for steps companies should take to comply with the GDPR, including mapping data processes, identifying gaps, appointing a data protection officer, and integrating privacy practices.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...Adam Thierer
The document discusses the challenges of applying benefit-cost analysis (BCA) to regulations regarding online safety and privacy. It notes that defining harm is difficult, as many privacy and safety issues involve intangible or subjective harms that are hard to quantify. It also outlines the costs that must be considered in BCA, such as lost opportunities from new services or restrictions on data collection. The document argues that alternatives to regulation, such as education, empowering users with privacy-enhancing tools, and targeted enforcement, should be seriously considered in BCA before preemptive regulation is pursued.
1. Behavioral advertising is a form of online advertising where ads are selected based on websites visited, actions taken, or user information to target users.
2. There is debate around whether behavioral advertising violates privacy laws and if self-regulation is sufficient given consumers' growing awareness of privacy issues related to targeted ads.
3. While industry argues that legislation could harm innovation, privacy advocates and lawmakers support regulations to increase transparency around data collection and use for behavioral advertising. Monitoring and evidence are needed to ensure self-regulatory principles are followed.
Trending Topics in Data Collection & Targeted MarketingcdasLLP
Slideshow to accompany co-sponsored panel from IAB Ad Lab and Cowan, DeBaets, Abrahams & Sheppard LLP. Participants: Joshua B. Sessler, Eleanor M. Lackman, Sarah Hudgins. For more entertainment and digital media law analysis, go to: http://cdas.com/legal/
The document discusses how companies are addressing risks associated with social media use. It outlines several approaches companies are taking, including: 1) reviewing existing compliance policies and drafting social media policies; 2) restricting workplace access to social media; 3) utilizing social media monitoring tools; 4) considering actual social media business issues; and 5) reviewing insurance coverage. Common elements of social media policies include identifying when employees are speaking on behalf of the company and requiring accuracy, among other guidelines.
Deloitte Social Media Analytics Event: Social Media legal considerationskamalesl
This document discusses 10 important legal considerations for social media. It covers issues around recruiting, employee use of social media, user generated content and copyright, trademarks, libel, data protection, informed consent, platform responsibility, available remedies, and jurisdiction. Overall, it notes that while technology develops faster than the law, companies should develop social media strategies to address HR, data protection, IP, and other legal issues that can arise.
1. Some businesses engage in unethical practices like spamming to increase sales, as there are limited online laws and enforcement is done by users.
2. It is important for businesses to have ethical policies and protect customer privacy and security in order to build trust with online customers.
3. Laws aim to protect children's privacy and safety online by restricting data collection and requiring schools to use filtering software. Parents can also monitor children's internet use.
This document discusses some of the key issues around big data including potential implications, views on data collection purposes, identity theft concerns, and regulatory challenges. It notes that while big data is often viewed as increasing identity theft risks, the overall rates have actually remained flat since 2005. Additionally, the EU is poised for sweeping changes to data protection laws for member states, while US policy reviews are underway due to Edward Snowden's NSA leaks.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
The document discusses how personalization and dynamic content are becoming increasingly important on websites. It notes that 52% of marketers see content personalization as critical and 75% of consumers like it when brands personalize their content. However, personalization can create issues for search engine optimization as dynamic URLs and content are more difficult for search engines to index than static pages. The document provides tips for SEOs to help address these personalization and SEO challenges, such as using static URLs when possible and submitting accurate sitemaps.
This document summarizes a study of CEO succession events among the largest 100 U.S. corporations between 2005-2015. The study analyzed executives who were passed over for the CEO role ("succession losers") and their subsequent careers. It found that 74% of passed over executives left their companies, with 30% eventually becoming CEOs elsewhere. However, companies led by succession losers saw average stock price declines of 13% over 3 years, compared to gains for companies whose CEO selections remained unchanged. The findings suggest that boards generally identify the most qualified CEO candidates, though differences between internal and external hires complicate comparisons.
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media Rockstar
This document discusses various employment law issues related to social media. It begins by noting the significant risks employers face from the growth of social media, including public relations issues and legal liability. It then addresses legal issues regarding screening candidates' social media, monitoring current employees' social media, and references for former employees. The document provides recommendations for employers, such as having a clear social media policy and training employees on it. It concludes by discussing National Labor Relations Board limits on social media policies.
This document discusses privacy issues related to customer relationship management (CRM). It notes that while consumers complain about privacy, they often do not opt out when given a choice. Organizations only seriously address privacy when pressured by regulators. Both customers and organizations take risks by sharing information, so managing these risks is important for CRM success. The document provides recommendations for what consumers and organizations can do to address privacy concerns in the age of new technologies that capture more personal data.
Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies...HostingCon
In this intensive session you will learn from four top companies how to: sort credible abuse issues from cranky Internet citizens; develop a DMCA plan that works; HIdPPAA compliance leads to increased revenue; how to market your products and comply with the FTC’s new marketing rules; why compliance is central to your business strategy. This session will include three fact based tutorials on DMCA, hacking, subpoenas, HIPPA/HITECH and FTC rules, as well as the opportunity to ask questions of prominent hosting executives who understand both the mechanics and value of compliance.
Data Breach Response is a Team Sport discusses the importance of having a coordinated response plan and team in place to respond to a cybersecurity incident or data breach. It recommends identifying a cybersecurity leader, understanding applicable laws and obligations, determining critical data assets, creating flexible response plans for different scenarios, ensuring the right technology is in place, understanding insurance policies, assessing vendor risks, and learning from past incidents to improve plans. The presentation emphasizes that responding to a breach is complex, time sensitive, and involves many stakeholders, so preparation and cross-functional coordination are essential.
Due to the evolution of personalized, data-driven digital marketing, companies now have infinite amounts of personally identifiable information (PII) about their customers; and this stockpile of information continues to grow—at an exponential rate. In fact, according to the Pew Research Center, the volume of business data worldwide—across all industries—doubles every 1.2 years.
But how should you use this treasure trove of data? And at what point does the information known about your consumers—and the ways you use this information—risk consumer privacy? Is there such thing as too much data?
Attend this webinar to learn:
• What your responsibilities are in today’s ‘big data universe’
• How to use your data and meet compliance laws
• Tips for integrating data across channels and platforms
• How to implement the principles of ‘Privacy by Design’
This document discusses privacy rights and regulations. It provides an overview of key topics covered in a lecture on data privacy and IT risk management, including: the definition of privacy as a major corporate risk; reasons for increased focus on privacy now; ethical and social issues driving privacy regulation; consumer privacy rights like the right to know, correct, portability, delete, and opt-out; additional topics covered in regulations; and an upcoming case study assignment.
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsTrustArc
CCPA is in full effect and - as of July 1, 2020 - is being fully enforced. The “wait and see” game is officially over and organizations must be fully compliant in order to avoid regulatory fines and negative publicity. There are many requirements set forth by the CCPA, and building a strong compliance plan can be daunting. Not only does the compliance plan need to be set-up for future growth and changes, but it also needs the flexibility to produce on-demand, customized reports to provide to stakeholders.
TrustArc has helped organizations of all sizes and maturity with CCPA compliance from simple assessments to full automation. Investing time upfront to perform the proper analysis and planning is key to feeling confident that your CCPA compliance program will efficiently and effectively mitigate risk while meeting business objectives.
Join this webinar to see how TrustArc CCPA solutions help organizations of all sizes and maturity achieve and maintain compliance.
This webinar will review:
-Stages of CCPA program maturity
-TrustArc CCPA solutions for every stage of compliance
The EU’s General Data Protection Regulation (GDPR) takes effect on May 25, 2018. GDPR significantly increases the requirements imposed on companies touching the personal data of EU citizens, and also increases oversight by the EU member states’ data protection authorities. And the consequences of non-compliance under GDPR are massive—the greater of €20 million or four percent of the company’s worldwide turnover.
Legal Issues For Online Communities - David DeakinFeverBee Limited
Hosting an online community raises numerous legal and regulatory challenges. Are you, as the community host, legally responsible for content submitted or shared by your members? This content may infringe other people’s intellectual property rights; might be defamatory; or could amount to some form of criminal activity. But do you know your responsibilities in relation to these types of content and activity, and how do you ensure you protect yourself by taking advantage of the legal defences available to avoid liability? And what about Data Privacy? European Data Protection Laws are changing dramatically over the next 2 years. Collection and exploitation of personal data may be a significant asset and driver for establishing our community. And in any event trust, privacy by design and regulatory compliance should be at the heart of your strategy. These issues, along with key Marketing Regulations and understanding your relationship with and responsibilities to third parties - such as Facebook and YouTube, or your hosting provider, will be summarised.
Stephen Whitney Slides:
On January 28, 2016, Canada, along with many countries, will celebrate Data Privacy Day. Recognized by privacy professionals, corporations, government officials, academics and students around the world, Data Privacy Day highlights the impact that technology is having on our privacy rights and underlines the importance of valuing and protecting personal information.
MaRS Discovery District and Privacy Horizon have teamed up to offer this special program for entrepreneurs and startup companies. Learn what you need to know to turn privacy into a competitive advantage.
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
One North’s Managing Director of Technology Ryan Horner and legal process and technology consultant Bob Beach share details on how the EU’s General Data Protection Regulation (GDPR) could impact digital assets.
This webinar is designed to educate digital marketers, share actionable examples, and provide an overview of how One North can help clients ensure their digital properties are in compliance with the regulation and execute on those efforts. Beyond GDPR compliance, the session will also highlight important information for marketers as data privacy continues to become a critical and strategic component of digital.
Access the recording: https://youtu.be/ruQpN70LGt0
Can the Law Keep Up with Tech? Can Self Regulation Help?NayakStrategies
Presentation for a recent discussion on the role of self-regulation in defining online privacy frameworks. I moderated this panel discussion at the ABA\'s 2011 Annual Meeting which was held in Toronto, Canada. Our all star panel - FTC Cmr. Brill, Canada\'s Privacy Stoddart, Stu Ingis and Paolo Balboni.
Gdpr demystified - making sense of the regulationJames Mulhern
Slightly out dated introduction to GDPR, that tries to move away from the headlines on fines and emphasises the global nature of the regulation, the numerous forms of lawful processing and the absolute need to manage privacy and be transparent. Goes on to show how using public cloud can help solve part of the problem.
Talk by Polina Zvyagina, Airbnb (San Francisco), at Stanford Engineering on February 25 2019, Session #6: 'Growing ‘Bitcoin Cities’ Across the Globe from Slovenia || GDPR Compliance Case Study || EU Digital Economy Policy'.
Website: http://www.StanfordEuropreneurs.org
YouTube Channel: https://www.youtube.com/user/StanfordEuropreneurs
Twitter: @Europreneurs
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. The panel will also discuss the evolving regulatory approaches of the European Union, United States Federal government and significant developments in U.S. state regimes, including California. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
Part of the webinar series: CORPORATE & REGULATORY COMPLIANCE BOOTCAMP 2022 - PART I
See more at https://www.financialpoise.com/webinars/
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
Part of the webinar series: CYBERSECURITY & DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
The presentation is all about the issues in professional ethics. This talks about the failures of ethics in Information Technology. Sliding thru the powerpoint gives you a hint what are the ethical and social issues in information systems
This document discusses social media and its use in enterprises. It covers topics like defining social media, how enterprises use it, related ethics and impacts on privacy and intellectual property. Case studies of companies like Facebook are discussed. The document also covers managing ethical issues around information systems, including principles of privacy, property rights, accountability and quality of life. Fair information practices and their application to privacy laws are summarized.
The Customer Engagement Roadmap - The Key to Increasing the Value of Your Membership Base
Want to increase your subscription site’s profitability? The Customer Engagement Roadmap will show you how!
This document contains a list of 14 single words, each beginning with a different letter, ranging from A to T. The words include various materials, colors, audio equipment and other nouns. Overall, the document presents an alphabetical listing of short single words from different semantic categories.
This document provides an overview of software quality assurance. It discusses key quality concepts, quality control, the cost of quality, and software quality assurance. It also describes formal technical reviews, statistical quality assurance, software reliability, and the components of a software quality assurance plan. The goal of software quality assurance is to achieve a high-quality software product through standards, reviews, testing, and other quality control measures.
The document describes JEEVA, a mobile application for recognizing, collecting, sharing, surveying, and exploring flora and fauna. The app allows users to take photos of plants and animals and upload them to the system for identification. If the photo is of a new species, the user can start a new section for it. Otherwise, the user can update existing details. The app is intended for academic, conservation, exploration, and nature lovers to study nature. It has features like image recognition of species, location-based species reporting, automatic species notifications, guides and checklists, article writing and sharing, and discussions. Potential users include students, researchers, tourists, Ayurvedic practitioners, conservation organizations, nature lovers
This document provides tutorials for learning Apex programming using the Force.com platform. The tutorials cover topics such as creating custom objects, using the Developer Console, creating sample data, defining classes, Apex language fundamentals like data types and variables, executing transactions, adding triggers, writing unit tests, and integrating Apex with Visualforce. The goal is to provide hands-on exercises to help developers learn the Apex language and how to develop applications using the Force.com platform. Completing the tutorials will equip developers with essential Apex programming skills.
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksVivastream
This document discusses small businesses' reliance on checks and the challenges they face in adopting electronic payments. It notes that small businesses write billions of checks per year at high costs. While checks meet their needs of being easy to use and widely accepted, electronic payments could offer benefits like cost savings and fraud protection. However, small businesses are often too busy with core operations to prioritize alternatives. The document also outlines hurdles small businesses face in using ACH or credit cards, such as navigating bank requirements and understanding fees. It suggests that businesses more open to electronic payments tend to have standardized payment processes or receive remittance data with payments.
Banks see Smart Commerce as a growing threat that could distance them from customers. Smart Commerce is defined as involving digital payment methods that simplify purchases and enriched communication between merchants and consumers using mobile technology. It is driven by demand from both consumers and merchants, and by large profit pools outside of just payments, particularly merchant sales promotions. Many banks believe Smart Commerce will become widespread within two years and pose the main risk of intermediating banks and reducing their relevance in consumer commerce.
This document summarizes key findings from a global consumer banking survey conducted by EY. Some of the main points include:
1. Customer advocacy and trust in their primary banking provider is high, driven largely by positive customer experiences. However, banks still have opportunities to improve certain aspects of the customer experience.
2. Convenience through digital banking channels is important to customers, but mobile banking features still lag online banking. Simplifying fees and communications remains a top priority.
3. Customers are generally satisfied with their primary bank but open to switching for better service or advice. Segmenting customers reveals opportunities for banks to better meet different needs.
4. Banks should focus on making banking simple and clear
This document summarizes the key findings from EY's 2014 Global Consumer Banking Survey. Some of the main points include:
1. Customer trust and advocacy are important drivers of growth for banks. Customers with complete trust in their primary bank are much more likely to recommend them.
2. Customer experience is a key factor influencing trust and advocacy. Customers cited how they are treated and quality of communications as important reasons for trust. Experience also influenced account openings and closings.
3. Banks can improve the customer experience by making banking simple and clear, providing helpful advice, and resolving problems well. Specifically, banks should improve fee transparency, mobile and online banking, and customer service.
Sereno is a fraud detection solution that uses image analysis and multi-source correlation modeling to identify check fraud. It integrates with existing image processing systems and analyzes check images using multiple recognition engines to flag potential fraud. Sereno reduces false positives and focuses analysts on a small number of suspect transactions. It builds databases of check stock and signatures over time to improve accuracy. Sereno provides cost savings through reduced manual review and losses from fraud while allowing banks to expand their fraud detection capabilities.
Orbograph's new Accura XV solution leverages Next Generation Recognition (NGR) Technology to provide virtually 100% check processing performance at the teller. The solution achieves read rates as high as 95% and can attain 100% read rates on small transactions using V100 mode. It provides tangible benefits like reducing data entry costs and recognition errors as well as intangible benefits like highly reliable technology and streamlined processes. Accura XV is the foundation for all of Orbograph's centralized and distributed recognition solutions and services.
Growth in remote deposit capture is driving additional requirements in check recognition. Orbograph provides a scalable check recognition solution for RDC that uses multiple recognition engines to achieve read rates from 90-98%. The solution can identify alterations, validate fields, and ensure image quality to reduce fraud while streamlining the deposit process. Orbograph offers flexible licensing and deployment options to meet the needs of various sized financial institutions supporting desktop, consumer, and mobile RDC.
The document introduces Orbograph's Healthcare Payments Automation Center (HPAC), a cloud-based platform that hosts two services: P2Post for converting paper explanation of benefit forms into electronic files for practice management systems, and E2Post for matching electronic funds transfer payments to remittance advices. By leveraging image processing and recognition technologies, HPAC can convert claims at high volumes while reducing costs up to 60% by eliminating manual data entry and exceptions. The platform provides adaptive onboarding of forms, HIPAA compliance, and guaranteed performance.
The document discusses next generation check recognition technologies that can improve teller image capture (TIC) and remote deposit capture (RDC) workflows. It outlines several business problems with early generation technologies like low read rates, balancing issues, and fraud risks. Next generation technologies aim to solve these by using multi-engine correlation, dynamic thresholding, item verification, and check box detection to achieve near 100% recognition performance and reduce errors. The benefits include cost savings, improved efficiency, customer experience, and reduced fraud.
Orbograph introduces Automation Services and Automation Services LE, innovative recognition solutions that provide up to 40% labor cost savings through high levels of automation and accuracy. Automation Services achieves 98% automation and 99%+ accuracy, while Automation Services LE attains 90% automation with 99% accuracy. Both solutions support various check processing workflows and can be implemented on Orbograph's legacy OrboCAR platform or new G6 Enterprise Recognition Technology platform. Orbograph also offers managed recognition services to continuously monitor performance and ensure solutions meet guaranteed service levels.
Orbograph is a provider of electronic solutions for healthcare revenue cycle management and check processing recognition software. It has over 1,500 financial institution and biller clients that process billions of documents annually using Orbograph's technologies. Orbograph converts paper-based documents like EOBs into electronic files to automate payment data reconciliation and provide reporting tools. It is a subsidiary of Orbotech and was founded in 1996, employing over 50 people who serve the banking, financial, and healthcare industries.
4. Agenda
• Quick look at some important items
– What should you be thinking about?
– Common Myths
– What Should Be Your Concerns?
– How Are People Addressing Privacy?
– Best Practices
• The Current State of Privacy
• The Future of Privacy
• Enforcement
• Options For Help
• Q&A
5. Why We Are Here
• Business is moving to social media
• Open & transparent / Real-time
• Scaling efforts with efficiency
• Protecting brand trust & brand equity
• Avoid common pitfalls
• Create a culture of compliance
• Regulation is here to stay
9. Common Myths
• Only bloggers / only Tweets
• Only online programs are at risk
• The rules are different for digital marketing
• My agency will handle it
• Build a buzz
• Just a comment
• Fines & penalties
10. What Are The Concerns?
• Public Backlash
• Mainstream Media Criticism
• Regulatory Action
• Two-Way Communications
• Scaling efforts (technical & human resources)
• Brand Trust & Brand Equity
11. How Are People Addressing This?
• Ignorance is not bliss
• Your agency *might* handle it
• Ad-hoc compliance solutions?
• Site-wide disclosures
• Affiliate marketing programs
12. Best Practices
• Think first
• Create a process
• Standardize and streamline
• Disclose and inform
• Document and monitor
• Follow up and takedown
• Open and transparent
• Ask for help
13. The Past In Digital Marketing
• Grab whatever you wanted
• Opt-out
• Gave choice
• Privacy policy
15. Current State of Privacy
• US
– Not a fundamental human right
– Patchwork of industry, local, state and federal laws.
– Typically an opt-out scheme with a dash of opt-in and notice.
– Privacy is a process of need by sector
• Canada
– Fundamental human right
– Personal Information Protection and Electronic Documents Act (PIPEDA)
– Privacy law, not an email law
– Opt-in in model
– Give clear notices on why the need, uses, and secures data.
– Gives control of opt-out and inaccurate data
– PIPEDA follows an ombudsman model
• Europe
– Fundamental human right
– Privacy law, not an email law
– Opt-in in model
– E.U. Data Protection Directive
– Member nations are compelled to enact data protection laws and create supervisory bodies.
– Applies to processing of personal data by automatic means in a filing system
16. Privacy Fundamentals
• Notice – When data is used
• Purpose – What data being used for
• Consent – Not disclosed without permission
• Security – Kept secure from abuse and sight
• Disclosure – Informed who is collecting
• Access- Ability to correct or remove
• Accountability – Data collectors held
accountable
17. Role of privacy in my email program
• Notice: Opt-in in most cases
• Choice: Provide opt-out or preference center
• Purpose: Use data for only what you said you
would use it for
• Disclosure: In some countries, you can’t track
by default
• Don’t sign up customer for whatever you feel
• Don’t use to much PII in email programs
• Don’t link to customer accounts
18. Privacy practices
• Privacy is becoming an increasingly important topic for
both brands and consumers
– Facebook changes without permission
• In the relationship between the advertiser and customer,
sensitive information can be transmitted, whether
financial or personal
– Single Sign On
19. A Global Perspective is Needed
LEGEND (as of September 2008)
National privacy or data protection law in place
Other significant privacy laws in place *Courtesy of the IAPP
Emerging privacy or data protection laws
23. Privacy in the future for US
• Looking at umbrella system like Canada and EU
– Notice and consent for covered/sensitive information
– Over broad definition
– Transferring information to third parties
– Notices needs to be on home page
– Used for any purpose
– Consent for tracking
– Opt-out needs to be clear
2
23
3
24. Moving Forward Into The Future-
Canada
• Fighting Internet and Wireless Spam Act or C28
o Opt-in
o Prohibits Commercial Messages
o Prohibit installation of programs without consent
o No false information - Sender or Subject Lines
o No harvesting or dictionary attacks
o More than email: IM; SMS; social media; voice,
o Other requirements: identification; contact information; unsubscribe
mechanism
o Certain messages exempted altogether: family or personal relationship;
business inquiry/relationship
o Proper identification
o No more no-reply@ - Unsubscription method
o Private Right of Action Included
o Enforcement cross border - Can’t hide under HQ location
o Protection for “Honest” Mistakes
2
24
4
26. Regulatory Environment
As a practical matter, social media is now a regulated industry;
and all stakeholders are responsible for compliance with the
FTC Guides. As a result, all marketers, agencies, and brands must
develop a 'culture of compliance' where the vocabulary of risk
management is a central aspect of an advertising strategy.”
– Tony DiResta, Partner at Winston & Strawn
General Counsel of WOMMA
"If law enforcement becomes necessary, our focus will be
advertisers, not endorsers – just as it’s always been.”
– FTC Factsheet on Update to Endorsement Guides
26
27. FTC Requirements
All material connections must be disclosed with documented process
• Inform & Disclose
– Disclosures must be clear & conspicuous
– Advertisers and agencies are liable
– Create a process that ensures a culture of
compliance between advertisers, employees,
agencies and influencers
• Document & Monitor
– Must know what your influencers are saying
– Process & procedures must be documented
• Follow Up & Takedown
– Expectation is not that you will catch everything
but you must be responsive and proactive in
addressing required compliance
27
29. FTC Further Clarification
• November 2011: Hyundai, and an agency were investigated by the FTC for blogging campaign
designed to build interest in ads premiering during Super Bowl XLV (45)
– An advertiser's provision of a gift to a blogger for posting specific content promoting the advertiser's
products or services is likely to constitute a material connection that would not be reasonably expected by
readers of the blog.
– Investigation was closed
• Hyundai did not know in advance about the incentives, which were offered by an employee of Hyundai's marketing
agency.
• Offering an incentive to post about or endorse a Hyundai product was contrary to the social media policies of both
Hyundai and its marketing agency.
• The “3 M’s” Mnemonic:
1. Mandate a disclosure policy that complies with the law;
2. Make sure people who work for you or with you know what the rules are; and
3. Monitor what they're doing on your behalf
Key takeaways: Have a documented policy and process; monitoring and follow up is a key
factor in compliance
30. Risks of Non-Compliance
• Court of Public Opinion
– Consumers, bloggers,
– Social media backlash
– Blacklisting
• PR Nightmares
– Scandals, reports & investigations
– Bad press & negative opinions
• Regulatory Action /
Investigations
– Significant legal costs
– Penalties and settlement terms
– Potential for erosion of brand trust
• Legal Exposure / Liability
– 3rd party lawsuits / consumer actions
– Responsibility for representatives
– Lack of documentation
30
31. First FTC Investigation
“…Bloggers who attend will receive a
special gift, and those who post
coverage from the event will be entered
in a mystery gift card drawing…”
“…the [Ann Taylor] case serves to
let marketers know that the FTC is
keeping a close eye on their
interactions with bloggers.”
32. Connections Must Be Disclosed
• Tweeted from CES, encouraging his
followers to purchase stock
• He owned a substantial stake in that
company
• A 13D disclosure of ownership was filed
with the SEC
• He failed to disclose his connection in
Tweets under FTC guidelines
33. OFT Actions in UK
• UK’s OFT took action for Sponsored Tweet programs
Handpicked Media - December 2010
– Sponsored Tweet programs lacked disclosure
– It is prohibited to use editorial content in the media to promote a product,
where the trader has paid for the promotion, without making that clear in
the content.
– It is also prohibited to mislead consumers by act or omission (for example
in relation to any endorsement of the product), where this is likely to have
an impact on the consumer's decision making about the product.
– These rules apply to any trader involved in the promotion, sale or supply
of products to or from consumers.
34. Vendor help
• CMP.LY
– Product line that addresses compliance requirements
for SEC, FINRA, FDA, as well as other regulatory needs
– Enables companies to create, document, measure and
monitor disclosures and other “fine print” in social
marketing and communication efforts.
– Identifiable icons and URLs, provides a universally
recognizable convention that communicates required
disclosures across platforms such as Facebook,
Twitter, blogs, and other digital media channels
35. Coalition help
• Word of Mouth Marketing Association (WOMMA)
– Organization dedicated to advancing and advocating the discipline of credible
word of mouth marketing
– Social Media Marketing Privacy Guidelines
• Brands should be open and honest about PII that they are collecting, using and
sharing from consumers.
• Brands should use PII collected from or about consumers for the purposes that they
have clearly communicated.
• Brands should collect PII that is relevant and necessary to accomplish the specified
purposes.
• Brands should not retain PII for longer than necessary to fulfill the specified
purposes or to otherwise meet legal requirements.
• Brands should employ relevant and reasonable measures to protect PII.
• Brands should be accountable for complying with these principles, by providing
consumers with a readily accessible means to express concerns or complaints.