SlideShare a Scribd company logo
Silverpop Webinar:
The EU Privacy Directive
Tracking and Analysing the 'Cookie Law' Changes
+ Best Practice Recommendations on How To Become Compliant
Without Sabotaging Your Online Marketing!
Because perhaps life is too short to read EU Directives?




     Over half of companies have (57%) have read the EU e-Privacy Directive,
     while 43% say they have not. - eConsultancy’s EU e-Privacy Directive Survey
What is the
EU ePrivacy
Directive?                What Does
                          it Mean for
                          Marketers?




         How Can
         Marketers Work                 Q&A Session
         Towards
         Compliance?                    Please type your
                                        questions into the
                                        box above at any
                                        time during the
                                        webinar…
Meet 2 experts who promise us they have read the
directive…




   Andrew McClelland,               Richard Austin,
   Director of Operations at IMRG   eStrategy Consultant, Silverpop
EU Direc-tives are EU-wide laws
pro-posed by the Euro-pean Com-mis-sion
          and enacted jointly by
     the Euro-pean Coun-cil and the
              Par-lia-ment.
Direc-tives only have legal
    effect when trans-posed into law
       by the EU Mem-ber States.

   Trans-po-si-tion is manda-tory, but
Mem-ber States often miss the dead-lines!
Once trans-posed, the
 lan-guage is inter-preted and
enforced by the enforce-ment
author-i-ties of each Mem-ber
   State – in the UK this is the
  Information Commissioners
           Office (ICO).
This webinar looks at the
 guidance published by the ICO
and gives our interpretation on
    emerging recommended
practice for marketers aiming at
        a UK audience…
6 (1) Subject to paragraph (4), a person shall not
     store or gain access to information stored, in the
     terminal equipment of a subscriber or user unless
     the requirements of paragraph (2) are met.



(2) The requirements are that the subscriber or user
of that terminal equipment--



        (a) is provided with clear and comprehensive
        information about the purposes of the storage of,
        or access to, that information; and



         (b) has given his or her consent.
“(3A) For the purposes of paragraph (2), consent may be
signified by a subscriber who amends or sets controls on the
internet browser which the subscriber uses or by using another
application or programme to signify consent.
“(3A) For the purposes of paragraph (2), consent may be
signified by a subscriber who amends or sets controls on the
internet browser which the subscriber uses or by using another
application or programme to signify consent.

                                                     The ICO does not
                                                   consider browsers to
                                                      be sophisticated
                                                    enough, at present,
                                                   to be relied on as the
                                                       mechanism for
                                                          consent.
(4) Paragraph (1) shall not apply to the technical storage of, or access to,
information--
(a) for the sole purpose of carrying out the transmission of a communication over
an electronic communications network; or
(b) where such storage or access is strictly necessary for the provision of an
information society service requested by the subscriber or user.
Effective Implementation
So what should I actually do now?
1. Audit all of your web estate

2. Understand what cookies are being
   served and their level of intrusiveness

3. Develop mechanisms for gaining consent
Find out what cookies are being served on your sites…




Consider using an automated auditing tool such as: http://imrg.cookiereports.com/
Remembering that the Directive states that users should be provided with
“clear and comprehensive information”
Include the name and
                                                        description of ALL cookies
                                                        in your Privacy Policy.

                                                        This could be used as an
                                                        opportunity to show the
                                                        user the benefits of the
                                                        cookie and why this
                                                        results in an enhanced
                                                        experience.




http://www.bbc.co.uk/privacy/bbc-cookies-policy.shtml
Let’s take a look at some examples…
http://www.ico.gov.uk
http://www.allthingsd.com
- Owned by Dow Jones, published of the Wall Street Journal
http://www.cifas.org.uk
Customise the content
Copy & paste the code into your website
We’ve listed Silverpop cookies – so your 3rd party cookies and made this
available to all customers via the Support Portal.

You can easily copy and paste the information into your Privacy Policy.
You can then easily copy and paste the information into your Privacy Policy.
“The Regulations apply to cookies and also to similar technologies for storing
information. This could include, for example, Local Shared Objects.”

“A cookie is a small file, typically of letters and numbers, downloaded on to a
device when the user accesses certain websites. Cookies allow a website to
recognise a user’s device.”




Source “guidance_on_the_new_cookies_regulations - ICO 2012.PDF”
 Audit all cookies used by your website and other web assets e.g. microsites

 Assess all non essential cookies

 Request opt-in for cookies

 Maintain a record of opt-ins

 Include the name and description of ALL cookies in your Privacy Policy
About Silverpop
• Email marketing and
  B2B marketing automation
  software

• 1,500+ customers

• Across 38 countries

• 425 employees

• UK headquarters since 2005
Questions & Answers
• Resource Centre
  at silverpop.com
   –   White papers
   –   Webinars
   –   Blogs
   –   Case studies
   –   Newsletters
• Presentations on SlideShare
   – www.slideshare.net/Silverpop


                      *New e-Privacy Tip Sheet*
Thank you for your time!




  @Silverpop @IMRGupdate

More Related Content

What's hot

Demystifying the Cyber NISTs
Demystifying the Cyber NISTsDemystifying the Cyber NISTs
Demystifying the Cyber NISTs
Schellman & Company
 
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB
 
Any Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsAny Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO Standards
PECB
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
Tharindunuwan9
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
ARMA International
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event Professionals
Hubilo
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Study
we45
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
PECB
 
27001 2015(+a1)
27001 2015(+a1)27001 2015(+a1)
27001 2015(+a1)
Carlos Ayil
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
PECB
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementation
himalya sharma
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
himalya sharma
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Karina Matos
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
PECB
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan Mustafa
Fahmi Albaheth
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
Brad Deflin
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
Arul Nambi
 

What's hot (20)

Demystifying the Cyber NISTs
Demystifying the Cyber NISTsDemystifying the Cyber NISTs
Demystifying the Cyber NISTs
 
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?
 
Any Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsAny Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO Standards
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event Professionals
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Study
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
 
27001 2015(+a1)
27001 2015(+a1)27001 2015(+a1)
27001 2015(+a1)
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementation
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan Mustafa
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 

Similar to The EU ePrivacy Directive - Navigating the UK Cookie Law

International Chamber Of Commerce UK - EU Cookie Directive Guide
International Chamber Of Commerce UK - EU Cookie Directive GuideInternational Chamber Of Commerce UK - EU Cookie Directive Guide
International Chamber Of Commerce UK - EU Cookie Directive Guide
Krishna De
 
Ico advice on_the_new_cookies_regulations_may2011
Ico advice on_the_new_cookies_regulations_may2011Ico advice on_the_new_cookies_regulations_may2011
Ico advice on_the_new_cookies_regulations_may2011
Osnat Ben-Nesher Zaretsky
 
DMA North: The DMA legal update
DMA North: The DMA legal updateDMA North: The DMA legal update
DMA North: The DMA legal updateRachel Aldighieri
 
Cctv code-of-practice
Cctv code-of-practiceCctv code-of-practice
Cctv code-of-practice
Tim Cocks
 
Cookies guidance v3
Cookies guidance v3Cookies guidance v3
Cookies guidance v3Andy Ryu
 
Cookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, BarclaysCookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, Barclaystheidm_quals
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
Castlebridge Associates
 
1. Part 1) Choose your own topic related to web technologiesappl.docx
1. Part 1)  Choose your own topic related to web technologiesappl.docx1. Part 1)  Choose your own topic related to web technologiesappl.docx
1. Part 1) Choose your own topic related to web technologiesappl.docx
jackiewalcutt
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
Miguel A. Amutio
 
120119 ukgc12-cookies
120119 ukgc12-cookies120119 ukgc12-cookies
120119 ukgc12-cookies
Peter McClymont
 
What is GDPR ? by M32
What is GDPR ? by M32What is GDPR ? by M32
What is GDPR ? by M32
Pneus Touchette Distribution inc.
 
Eprivacy issues and standards -- where do we stand?
Eprivacy issues and standards -- where do we stand?Eprivacy issues and standards -- where do we stand?
Eprivacy issues and standards -- where do we stand?
Anna Long
 
Csp IoT dan hyde 18 p16 17
Csp IoT dan hyde 18 p16 17Csp IoT dan hyde 18 p16 17
Csp IoT dan hyde 18 p16 17
dan hyde
 
Bootlaw Cookies
Bootlaw CookiesBootlaw Cookies
Bootlaw Cookies
dbaillieu
 
Cookies and European Union Law
Cookies and European Union LawCookies and European Union Law
Cookies and European Union Law
Reactive, part of Accenture Interactive
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
Lisa Brown
 
EU Cookie Directive Report On Compliance In The UK And Ireland
EU Cookie Directive Report On Compliance In The UK And IrelandEU Cookie Directive Report On Compliance In The UK And Ireland
EU Cookie Directive Report On Compliance In The UK And Ireland
Krishna De
 

Similar to The EU ePrivacy Directive - Navigating the UK Cookie Law (20)

International Chamber Of Commerce UK - EU Cookie Directive Guide
International Chamber Of Commerce UK - EU Cookie Directive GuideInternational Chamber Of Commerce UK - EU Cookie Directive Guide
International Chamber Of Commerce UK - EU Cookie Directive Guide
 
Ico advice on_the_new_cookies_regulations_may2011
Ico advice on_the_new_cookies_regulations_may2011Ico advice on_the_new_cookies_regulations_may2011
Ico advice on_the_new_cookies_regulations_may2011
 
DMA North: Legal Update
DMA North: Legal UpdateDMA North: Legal Update
DMA North: Legal Update
 
DMA North: The DMA legal update
DMA North: The DMA legal updateDMA North: The DMA legal update
DMA North: The DMA legal update
 
Cctv code-of-practice
Cctv code-of-practiceCctv code-of-practice
Cctv code-of-practice
 
Cookies guidance v3
Cookies guidance v3Cookies guidance v3
Cookies guidance v3
 
Cookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, BarclaysCookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, Barclays
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
 
1. Part 1) Choose your own topic related to web technologiesappl.docx
1. Part 1)  Choose your own topic related to web technologiesappl.docx1. Part 1)  Choose your own topic related to web technologiesappl.docx
1. Part 1) Choose your own topic related to web technologiesappl.docx
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
 
120119 ukgc12-cookies
120119 ukgc12-cookies120119 ukgc12-cookies
120119 ukgc12-cookies
 
What is GDPR ? by M32
What is GDPR ? by M32What is GDPR ? by M32
What is GDPR ? by M32
 
DMA Cookies update
DMA Cookies updateDMA Cookies update
DMA Cookies update
 
Eprivacy issues and standards -- where do we stand?
Eprivacy issues and standards -- where do we stand?Eprivacy issues and standards -- where do we stand?
Eprivacy issues and standards -- where do we stand?
 
Csp IoT dan hyde 18 p16 17
Csp IoT dan hyde 18 p16 17Csp IoT dan hyde 18 p16 17
Csp IoT dan hyde 18 p16 17
 
Cookies
CookiesCookies
Cookies
 
Bootlaw Cookies
Bootlaw CookiesBootlaw Cookies
Bootlaw Cookies
 
Cookies and European Union Law
Cookies and European Union LawCookies and European Union Law
Cookies and European Union Law
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
 
EU Cookie Directive Report On Compliance In The UK And Ireland
EU Cookie Directive Report On Compliance In The UK And IrelandEU Cookie Directive Report On Compliance In The UK And Ireland
EU Cookie Directive Report On Compliance In The UK And Ireland
 

More from Silverpop

Tactics to integrate social and email marketing silverpop
Tactics to integrate social and email marketing silverpopTactics to integrate social and email marketing silverpop
Tactics to integrate social and email marketing silverpop
Silverpop
 
2014 holiday online shopping mobile trends silverpop
2014 holiday online shopping mobile trends silverpop2014 holiday online shopping mobile trends silverpop
2014 holiday online shopping mobile trends silverpop
Silverpop
 
5 Tips For Automated Happy Birthday Emails
5 Tips For Automated Happy Birthday Emails5 Tips For Automated Happy Birthday Emails
5 Tips For Automated Happy Birthday Emails
Silverpop
 
Holiday retail email marketing tips aima silverpop fabric.com silverpop
Holiday retail email marketing tips aima silverpop fabric.com silverpopHoliday retail email marketing tips aima silverpop fabric.com silverpop
Holiday retail email marketing tips aima silverpop fabric.com silverpop
Silverpop
 
Personalisation silverpop festival of marketing
Personalisation silverpop festival of marketingPersonalisation silverpop festival of marketing
Personalisation silverpop festival of marketing
Silverpop
 
Batch and blast email to behavioural marketing automation silverpop festival ...
Batch and blast email to behavioural marketing automation silverpop festival ...Batch and blast email to behavioural marketing automation silverpop festival ...
Batch and blast email to behavioural marketing automation silverpop festival ...
Silverpop
 
Leveraging behavioural data for success silverpop ibm festival of marketing
Leveraging behavioural data for success silverpop ibm festival of marketingLeveraging behavioural data for success silverpop ibm festival of marketing
Leveraging behavioural data for success silverpop ibm festival of marketingSilverpop
 
4 types of email preference centre
4 types of email preference centre4 types of email preference centre
4 types of email preference centre
Silverpop
 
Smartphone mobile browse to buy email tactics silverpop etail
Smartphone mobile browse to buy email tactics silverpop etailSmartphone mobile browse to buy email tactics silverpop etail
Smartphone mobile browse to buy email tactics silverpop etail
Silverpop
 
7 email marketing programs to automate silverpop dma14
7 email marketing programs to automate silverpop dma147 email marketing programs to automate silverpop dma14
7 email marketing programs to automate silverpop dma14
Silverpop
 
Humanization content b2 b email marketing silverpop marketingprofs
Humanization content b2 b email marketing silverpop marketingprofsHumanization content b2 b email marketing silverpop marketingprofs
Humanization content b2 b email marketing silverpop marketingprofs
Silverpop
 
Holiday retail email marketing tips silverpop
Holiday retail email marketing tips silverpopHoliday retail email marketing tips silverpop
Holiday retail email marketing tips silverpopSilverpop
 
Measuring engagement and revenue throughout the customer lifecycle by Silverpop
Measuring engagement and revenue throughout the customer lifecycle by SilverpopMeasuring engagement and revenue throughout the customer lifecycle by Silverpop
Measuring engagement and revenue throughout the customer lifecycle by Silverpop
Silverpop
 
Beyond gmail tabs increasing email marketing engagement silverpop
Beyond gmail tabs increasing email marketing engagement silverpopBeyond gmail tabs increasing email marketing engagement silverpop
Beyond gmail tabs increasing email marketing engagement silverpopSilverpop
 
Send a blast kill a hamster email marketing silverpop
Send a blast kill a hamster email marketing silverpopSend a blast kill a hamster email marketing silverpop
Send a blast kill a hamster email marketing silverpopSilverpop
 
Email remarketing cart browse abandonment webtrends uk silverpop
Email remarketing cart browse abandonment webtrends uk silverpopEmail remarketing cart browse abandonment webtrends uk silverpop
Email remarketing cart browse abandonment webtrends uk silverpopSilverpop
 
Gmail tabs promotions to primary tab emails silverpop
Gmail tabs promotions to primary tab emails silverpopGmail tabs promotions to primary tab emails silverpop
Gmail tabs promotions to primary tab emails silverpop
Silverpop
 
10 email marketing tactics silverpop
10 email marketing tactics silverpop10 email marketing tactics silverpop
10 email marketing tactics silverpop
Silverpop
 
Shopping cart abandonment real time webtrends silverpop
Shopping cart abandonment real time webtrends silverpopShopping cart abandonment real time webtrends silverpop
Shopping cart abandonment real time webtrends silverpop
Silverpop
 
7 email marketing ideas tactics uk
7 email marketing ideas tactics uk7 email marketing ideas tactics uk
7 email marketing ideas tactics ukSilverpop
 

More from Silverpop (20)

Tactics to integrate social and email marketing silverpop
Tactics to integrate social and email marketing silverpopTactics to integrate social and email marketing silverpop
Tactics to integrate social and email marketing silverpop
 
2014 holiday online shopping mobile trends silverpop
2014 holiday online shopping mobile trends silverpop2014 holiday online shopping mobile trends silverpop
2014 holiday online shopping mobile trends silverpop
 
5 Tips For Automated Happy Birthday Emails
5 Tips For Automated Happy Birthday Emails5 Tips For Automated Happy Birthday Emails
5 Tips For Automated Happy Birthday Emails
 
Holiday retail email marketing tips aima silverpop fabric.com silverpop
Holiday retail email marketing tips aima silverpop fabric.com silverpopHoliday retail email marketing tips aima silverpop fabric.com silverpop
Holiday retail email marketing tips aima silverpop fabric.com silverpop
 
Personalisation silverpop festival of marketing
Personalisation silverpop festival of marketingPersonalisation silverpop festival of marketing
Personalisation silverpop festival of marketing
 
Batch and blast email to behavioural marketing automation silverpop festival ...
Batch and blast email to behavioural marketing automation silverpop festival ...Batch and blast email to behavioural marketing automation silverpop festival ...
Batch and blast email to behavioural marketing automation silverpop festival ...
 
Leveraging behavioural data for success silverpop ibm festival of marketing
Leveraging behavioural data for success silverpop ibm festival of marketingLeveraging behavioural data for success silverpop ibm festival of marketing
Leveraging behavioural data for success silverpop ibm festival of marketing
 
4 types of email preference centre
4 types of email preference centre4 types of email preference centre
4 types of email preference centre
 
Smartphone mobile browse to buy email tactics silverpop etail
Smartphone mobile browse to buy email tactics silverpop etailSmartphone mobile browse to buy email tactics silverpop etail
Smartphone mobile browse to buy email tactics silverpop etail
 
7 email marketing programs to automate silverpop dma14
7 email marketing programs to automate silverpop dma147 email marketing programs to automate silverpop dma14
7 email marketing programs to automate silverpop dma14
 
Humanization content b2 b email marketing silverpop marketingprofs
Humanization content b2 b email marketing silverpop marketingprofsHumanization content b2 b email marketing silverpop marketingprofs
Humanization content b2 b email marketing silverpop marketingprofs
 
Holiday retail email marketing tips silverpop
Holiday retail email marketing tips silverpopHoliday retail email marketing tips silverpop
Holiday retail email marketing tips silverpop
 
Measuring engagement and revenue throughout the customer lifecycle by Silverpop
Measuring engagement and revenue throughout the customer lifecycle by SilverpopMeasuring engagement and revenue throughout the customer lifecycle by Silverpop
Measuring engagement and revenue throughout the customer lifecycle by Silverpop
 
Beyond gmail tabs increasing email marketing engagement silverpop
Beyond gmail tabs increasing email marketing engagement silverpopBeyond gmail tabs increasing email marketing engagement silverpop
Beyond gmail tabs increasing email marketing engagement silverpop
 
Send a blast kill a hamster email marketing silverpop
Send a blast kill a hamster email marketing silverpopSend a blast kill a hamster email marketing silverpop
Send a blast kill a hamster email marketing silverpop
 
Email remarketing cart browse abandonment webtrends uk silverpop
Email remarketing cart browse abandonment webtrends uk silverpopEmail remarketing cart browse abandonment webtrends uk silverpop
Email remarketing cart browse abandonment webtrends uk silverpop
 
Gmail tabs promotions to primary tab emails silverpop
Gmail tabs promotions to primary tab emails silverpopGmail tabs promotions to primary tab emails silverpop
Gmail tabs promotions to primary tab emails silverpop
 
10 email marketing tactics silverpop
10 email marketing tactics silverpop10 email marketing tactics silverpop
10 email marketing tactics silverpop
 
Shopping cart abandonment real time webtrends silverpop
Shopping cart abandonment real time webtrends silverpopShopping cart abandonment real time webtrends silverpop
Shopping cart abandonment real time webtrends silverpop
 
7 email marketing ideas tactics uk
7 email marketing ideas tactics uk7 email marketing ideas tactics uk
7 email marketing ideas tactics uk
 

Recently uploaded

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 

The EU ePrivacy Directive - Navigating the UK Cookie Law

  • 1. Silverpop Webinar: The EU Privacy Directive Tracking and Analysing the 'Cookie Law' Changes + Best Practice Recommendations on How To Become Compliant Without Sabotaging Your Online Marketing!
  • 2. Because perhaps life is too short to read EU Directives? Over half of companies have (57%) have read the EU e-Privacy Directive, while 43% say they have not. - eConsultancy’s EU e-Privacy Directive Survey
  • 3. What is the EU ePrivacy Directive? What Does it Mean for Marketers? How Can Marketers Work Q&A Session Towards Compliance? Please type your questions into the box above at any time during the webinar…
  • 4. Meet 2 experts who promise us they have read the directive… Andrew McClelland, Richard Austin, Director of Operations at IMRG eStrategy Consultant, Silverpop
  • 5. EU Direc-tives are EU-wide laws pro-posed by the Euro-pean Com-mis-sion and enacted jointly by the Euro-pean Coun-cil and the Par-lia-ment.
  • 6. Direc-tives only have legal effect when trans-posed into law by the EU Mem-ber States. Trans-po-si-tion is manda-tory, but Mem-ber States often miss the dead-lines!
  • 7. Once trans-posed, the lan-guage is inter-preted and enforced by the enforce-ment author-i-ties of each Mem-ber State – in the UK this is the Information Commissioners Office (ICO).
  • 8. This webinar looks at the guidance published by the ICO and gives our interpretation on emerging recommended practice for marketers aiming at a UK audience…
  • 9.
  • 10. 6 (1) Subject to paragraph (4), a person shall not store or gain access to information stored, in the terminal equipment of a subscriber or user unless the requirements of paragraph (2) are met. (2) The requirements are that the subscriber or user of that terminal equipment-- (a) is provided with clear and comprehensive information about the purposes of the storage of, or access to, that information; and (b) has given his or her consent.
  • 11. “(3A) For the purposes of paragraph (2), consent may be signified by a subscriber who amends or sets controls on the internet browser which the subscriber uses or by using another application or programme to signify consent.
  • 12. “(3A) For the purposes of paragraph (2), consent may be signified by a subscriber who amends or sets controls on the internet browser which the subscriber uses or by using another application or programme to signify consent. The ICO does not consider browsers to be sophisticated enough, at present, to be relied on as the mechanism for consent.
  • 13.
  • 14. (4) Paragraph (1) shall not apply to the technical storage of, or access to, information-- (a) for the sole purpose of carrying out the transmission of a communication over an electronic communications network; or (b) where such storage or access is strictly necessary for the provision of an information society service requested by the subscriber or user.
  • 16. So what should I actually do now?
  • 17. 1. Audit all of your web estate 2. Understand what cookies are being served and their level of intrusiveness 3. Develop mechanisms for gaining consent
  • 18. Find out what cookies are being served on your sites… Consider using an automated auditing tool such as: http://imrg.cookiereports.com/
  • 19. Remembering that the Directive states that users should be provided with “clear and comprehensive information”
  • 20. Include the name and description of ALL cookies in your Privacy Policy. This could be used as an opportunity to show the user the benefits of the cookie and why this results in an enhanced experience. http://www.bbc.co.uk/privacy/bbc-cookies-policy.shtml
  • 21. Let’s take a look at some examples…
  • 23. http://www.allthingsd.com - Owned by Dow Jones, published of the Wall Street Journal
  • 25. Customise the content Copy & paste the code into your website
  • 26. We’ve listed Silverpop cookies – so your 3rd party cookies and made this available to all customers via the Support Portal. You can easily copy and paste the information into your Privacy Policy.
  • 27. You can then easily copy and paste the information into your Privacy Policy.
  • 28. “The Regulations apply to cookies and also to similar technologies for storing information. This could include, for example, Local Shared Objects.” “A cookie is a small file, typically of letters and numbers, downloaded on to a device when the user accesses certain websites. Cookies allow a website to recognise a user’s device.” Source “guidance_on_the_new_cookies_regulations - ICO 2012.PDF”
  • 29.  Audit all cookies used by your website and other web assets e.g. microsites  Assess all non essential cookies  Request opt-in for cookies  Maintain a record of opt-ins  Include the name and description of ALL cookies in your Privacy Policy
  • 30. About Silverpop • Email marketing and B2B marketing automation software • 1,500+ customers • Across 38 countries • 425 employees • UK headquarters since 2005
  • 32. • Resource Centre at silverpop.com – White papers – Webinars – Blogs – Case studies – Newsletters • Presentations on SlideShare – www.slideshare.net/Silverpop *New e-Privacy Tip Sheet*
  • 33. Thank you for your time! @Silverpop @IMRGupdate