SlideShare a Scribd company logo
1 of 12
Download to read offline
© 2024 TrustArc Inc. Proprietary and Confidential Information.
How to Build Consumer Trust
Through Data Privacy
2
Legal Disclaimer
The information provided during this webinar does
not, and is not intended to, constitute legal advice.
Instead, all information, content, and materials presented during
this webinar are for general informational purposes only.
3
Speakers
Adam Osbourne
Principal Technical Account Manager
TrustArc
Daniela Sanchez
Privacy Knowledge Lead, Law Library
TrustArc
Daniel Lawall
Director of Privacy
Otter Products
Agenda
1. Consumer Trust
2. Data Privacy Laws and Compliance
3. Cookie Compliance and Management
4. Security and Breach Management
5. Trustworthy and Ethical AI
5
Consumer Trust
Insights from consumer data:
● Understand preferences, trends, and behaviors
● Use it to:
○ Improve user experience
○ Develop new products and services
○ Personalize advertising
● People have become increasingly conscious of the
significance and worth of their data:
○ They are hesitant to share their personal information.
○ They want to be informed about how organizations are using their data.
○ Privacy has become a critical element in consumers' decision-making process.
○ We expect it to become even more significant as we witness more technological advancements that
could significantly affect consumers' privacy.
6
● Transparency
● Consent
● Individual’s Rights
● Robust Security Measures
● Privacy By Design
Consumer Trust: Data Privacy Laws and Compliance
7
Consumer Trust: Cookie Compliance and Management
People preferred and have more
trust and feel safer when the
cookie notice presented to them
is multiple choice and gives them
the ability to not only accept or
refuse, but also to select what
purposes and partners they
want to accept.
THE IMPACT OF COOKIE NOTICES IN CONSUMER'S TRUST IN NEWS MEDIA WEBSITES by DZ
Troeira · 2021
Approximately 50% users simply accept everything when presented with
the notices and around 55% rarely reads the information given or never.
!
8
Consumer Trust: Security and Breach Management
Data drives business, but breaches drive customers away
Shama Hyder, “How to build customer trust through data privacy and security”
9
AI and the trust landscape
Despite acknowledging the increasing value of AI, consumers' trust in
organizations using AI is on the decline.
60% of consumers have already lost trust in organizations over their AI use. (IAPP)
Customers feel indifferent about trusting brands to keep their
data security safe.
92% of businesses are using AI-driven personalization to drive growth in their
business. However only 51% of consumers trust brands to keep their personal data
security and use it responsibly.(Twilio Segment)
Organizations that prioritize AI transparency, trust, and security
will see a 50% improvement in AI model adoption, business goals,
and user acceptance by 2026. (Gartner)
10
Responsible AI Certification
Navigate the AI Landscape with Confidence and Trust
Framework Highlights
✔First AI certification for data
protection and privacy.
✔Our Responsible AI Certification is
a proprietary framework
incorporating leading regulations and
industry frameworks like EU AI Act,
NIST AI RMF, and OECD AI
Principles, ISO/IEC 42001:2023
✔Covers core principles of
responsible AI: Transparency,
Fairness, Security, and
Accountability.
Benefits of
Certification
Regulatory Benefits Organizational Benefits
Cultivate a culture focused on
responsible AI
Demonstrate responsible use of
AI and data protection
Pair Innovation with Data
Protection
Boost brand trust, credibility,
and mitigate risks with AI
goverånance
Alignment with leading
upcoming AI Regulations
and industry frameworks
Build responsible AI governance
into your software development
process
Responsible AI Certification Assessment Criteria
● Valid and Reliable
● Explainable and Interpretable
● Accountable and Transparent
● Privacy-Enhanced
● Fair - with Risk of Harmful Bias Managed
● Safe
● Secure and Resilient
12
Thank You!

More Related Content

Similar to TrustArc Webinar - How to Build Consumer Trust Through Data Privacy

White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​Gigya
 
State-of-Personalization-Report-Twilio-Segment-2023.pdf
State-of-Personalization-Report-Twilio-Segment-2023.pdfState-of-Personalization-Report-Twilio-Segment-2023.pdf
State-of-Personalization-Report-Twilio-Segment-2023.pdfSharanGodya1
 
TrustArc Webinar: Privacy Management Made Simple
TrustArc Webinar: Privacy Management Made SimpleTrustArc Webinar: Privacy Management Made Simple
TrustArc Webinar: Privacy Management Made SimpleTrustArc
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfA Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfAdzappier
 
The Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal InformationThe Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal InformationIPG Media Lab
 
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of Brands
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of BrandsWhat Is the Future of Data Sharing? - Consumer Mindsets and the Power of Brands
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of BrandsDavid Rogers
 
Thinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 NovemberThinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 NovemberRachel Aldighieri
 
Thinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 NovemberThinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 NovemberRachel Aldighieri
 
Consumer engagement principles
Consumer engagement principlesConsumer engagement principles
Consumer engagement principlesdefault default
 
Data opportunities mini whitepaper
Data opportunities mini whitepaperData opportunities mini whitepaper
Data opportunities mini whitepaperRobert Bowstead
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trustOptimediaSpain
 
How Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicHow Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicNuxeo
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersAndrew Ames
 
5 Hidden Truths on the Importance of Data Privacy in Digital Marketing
5 Hidden Truths on the Importance of Data Privacy in Digital Marketing5 Hidden Truths on the Importance of Data Privacy in Digital Marketing
5 Hidden Truths on the Importance of Data Privacy in Digital MarketingIwrite India
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 

Similar to TrustArc Webinar - How to Build Consumer Trust Through Data Privacy (20)

Mobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in LoyaltyMobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in Loyalty
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
 
State-of-Personalization-Report-Twilio-Segment-2023.pdf
State-of-Personalization-Report-Twilio-Segment-2023.pdfState-of-Personalization-Report-Twilio-Segment-2023.pdf
State-of-Personalization-Report-Twilio-Segment-2023.pdf
 
TrustArc Webinar: Privacy Management Made Simple
TrustArc Webinar: Privacy Management Made SimpleTrustArc Webinar: Privacy Management Made Simple
TrustArc Webinar: Privacy Management Made Simple
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfA Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
 
The Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal InformationThe Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal Information
 
What Is the Future of Data Sharing?
What Is the Future of Data Sharing?What Is the Future of Data Sharing?
What Is the Future of Data Sharing?
 
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of Brands
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of BrandsWhat Is the Future of Data Sharing? - Consumer Mindsets and the Power of Brands
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of Brands
 
Thinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 NovemberThinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 November
 
Thinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 NovemberThinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 November
 
Consumer engagement principles
Consumer engagement principlesConsumer engagement principles
Consumer engagement principles
 
Data opportunities mini whitepaper
Data opportunities mini whitepaperData opportunities mini whitepaper
Data opportunities mini whitepaper
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
 
How Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicHow Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a Pandemic
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
5 Hidden Truths on the Importance of Data Privacy in Digital Marketing
5 Hidden Truths on the Importance of Data Privacy in Digital Marketing5 Hidden Truths on the Importance of Data Privacy in Digital Marketing
5 Hidden Truths on the Importance of Data Privacy in Digital Marketing
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 

More from TrustArc

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 

More from TrustArc (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 

Recently uploaded

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxNeo4j
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 

Recently uploaded (20)

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy

  • 1. © 2024 TrustArc Inc. Proprietary and Confidential Information. How to Build Consumer Trust Through Data Privacy
  • 2. 2 Legal Disclaimer The information provided during this webinar does not, and is not intended to, constitute legal advice. Instead, all information, content, and materials presented during this webinar are for general informational purposes only.
  • 3. 3 Speakers Adam Osbourne Principal Technical Account Manager TrustArc Daniela Sanchez Privacy Knowledge Lead, Law Library TrustArc Daniel Lawall Director of Privacy Otter Products
  • 4. Agenda 1. Consumer Trust 2. Data Privacy Laws and Compliance 3. Cookie Compliance and Management 4. Security and Breach Management 5. Trustworthy and Ethical AI
  • 5. 5 Consumer Trust Insights from consumer data: ● Understand preferences, trends, and behaviors ● Use it to: ○ Improve user experience ○ Develop new products and services ○ Personalize advertising ● People have become increasingly conscious of the significance and worth of their data: ○ They are hesitant to share their personal information. ○ They want to be informed about how organizations are using their data. ○ Privacy has become a critical element in consumers' decision-making process. ○ We expect it to become even more significant as we witness more technological advancements that could significantly affect consumers' privacy.
  • 6. 6 ● Transparency ● Consent ● Individual’s Rights ● Robust Security Measures ● Privacy By Design Consumer Trust: Data Privacy Laws and Compliance
  • 7. 7 Consumer Trust: Cookie Compliance and Management People preferred and have more trust and feel safer when the cookie notice presented to them is multiple choice and gives them the ability to not only accept or refuse, but also to select what purposes and partners they want to accept. THE IMPACT OF COOKIE NOTICES IN CONSUMER'S TRUST IN NEWS MEDIA WEBSITES by DZ Troeira · 2021 Approximately 50% users simply accept everything when presented with the notices and around 55% rarely reads the information given or never. !
  • 8. 8 Consumer Trust: Security and Breach Management Data drives business, but breaches drive customers away Shama Hyder, “How to build customer trust through data privacy and security”
  • 9. 9 AI and the trust landscape Despite acknowledging the increasing value of AI, consumers' trust in organizations using AI is on the decline. 60% of consumers have already lost trust in organizations over their AI use. (IAPP) Customers feel indifferent about trusting brands to keep their data security safe. 92% of businesses are using AI-driven personalization to drive growth in their business. However only 51% of consumers trust brands to keep their personal data security and use it responsibly.(Twilio Segment) Organizations that prioritize AI transparency, trust, and security will see a 50% improvement in AI model adoption, business goals, and user acceptance by 2026. (Gartner)
  • 10. 10 Responsible AI Certification Navigate the AI Landscape with Confidence and Trust Framework Highlights ✔First AI certification for data protection and privacy. ✔Our Responsible AI Certification is a proprietary framework incorporating leading regulations and industry frameworks like EU AI Act, NIST AI RMF, and OECD AI Principles, ISO/IEC 42001:2023 ✔Covers core principles of responsible AI: Transparency, Fairness, Security, and Accountability.
  • 11. Benefits of Certification Regulatory Benefits Organizational Benefits Cultivate a culture focused on responsible AI Demonstrate responsible use of AI and data protection Pair Innovation with Data Protection Boost brand trust, credibility, and mitigate risks with AI goverånance Alignment with leading upcoming AI Regulations and industry frameworks Build responsible AI governance into your software development process Responsible AI Certification Assessment Criteria ● Valid and Reliable ● Explainable and Interpretable ● Accountable and Transparent ● Privacy-Enhanced ● Fair - with Risk of Harmful Bias Managed ● Safe ● Secure and Resilient