The Circle of Trust Greg Hungerford.

Slides:



Advertisements
Similar presentations
CHAPTER 4 E-ENVIRONMENT
Advertisements

1. 2 Reaching the CEO Caroline Trotman-Wren 3 Strategic products and services demand a different sales approach Considered Prestige Mission critical.
Principles of Marketing
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Principles of Digital Marketing
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
Chapter 3 The Internet micro-environment
This presentation outlines the following: How we believe we can help Electronic Marketing Strategy Marketing Overview SMS Marketing Overview Electronic.
1 Business and Marketing Strategies
Respecting People's Privacy in Ministry 1. Context 2. Why should we bother? 3. APP Summary 4. Information Pathway.
Grundtvig Multilateral project CAMP2.0: Challenging Attractiveness of lifelong learning: web 2.0 tools for strengthening Marketing and Public relations.
The Data Protection Audit How to prepare What to expect The end results Dublin Chamber of Commerce, March 24 th.
Overview of Digital Marketing Digital Marketing Services  Advertising your business over internet mediums are the only source which helps to reach your.
1 Tell Us Once Delivery Partnerships Tell Us Once – because your time matters Tell Us Once Delivery Partnerships Shaping the Future.
Child safe guarding Child protection in your organisation.
VertexPlus marketing services for your business, you don’t need to worry about your project. We send professional mails to your potential customers.
8 steps to a social media strategy
Promotion.
Privacy and Public Policy Implications of IoT
Presents: Local Mobile Marketing
Strategy and Sales Program Planning
2.7 Employer & Employee Relations
Social Media Marketing
Promotion.
Market Research Unit 5 - slide 13.
Information Security.
Information Sharing for Integrated care A 5 Step Blueprint
Media Management 6/15/2018.
Originating the role of Information Governance Officer
Promotion.
The advice challenge: understanding what clients value
WRITE MARKETING COPY and EXECUTE TARGETED S
Customer Centric Organizations
Conducting Compliant Marketing & SARs Workshop - CMG Events
GDPR support January GDPR support January 2018.
Nina Barakzai November 2017
Digital marketing refers to advertising delivered through digital channels such as search engines, websites, social media, , and mobile apps. While.
Board and Staff Roles 2014 Capacity Building Institute
Managing your Donors and the need for a Stewardship Programme
STRATEGY MBA BOOK REVIEW MICASA HOTEL 19th October 2002
Why do We Need a Marketing Plan?
In Partnership With. In Partnership With Create one that can be sent to your entire membership! Marketing Create one that can be.
Developing the Guided Learner Journey
Communication and Consultation with Interested Parties by the RB
Ethical questions on the use of big data in official statistics
Marketing Communication Mix
Marketing and Advertising in E-Commerce
Understanding Risk Greg Hungerford.
Chapter 13 & 18 Communication, Advertising, Promotion, and Sales
Public Health Interventions
IEEE-SA and GDPR Implementation
WRITE MARKETING COPY and EXECUTE TARGETED S
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
Platform Introduction
Budgeting Greg Hungerford.
Draft Methodology for impact analysis of ESS.VIP Projects
Advertising Management – Creating Effective and Creative Advertising Messages Week 3 Lecture 3.
New employee induction for new staff and managers
Boosting universities and research centers: NRENs and RRENs are SMART
Online Safety: Rights and Responsibilities
همايش توجيهي بازاریابی در ورزش قهرماني
COMPLETE BUSINESS TEXTING SOLUTION
Data Privacy by Design Expanding Security for bepress Users
Cashless at Sebright  .
IT and Society Week 2: Privacy.
North West Cricket Union Limited
SWOT and PESTEL Analysis By MyAssignmenthelp.com MyAssignmenthelp.com.
RCA Workshop on RCARO Future Strategies July 2007
Online Safety; Privacy and Sharing
Cloud Computing for Wireless Networks
Presentation transcript:

The Circle of Trust Greg Hungerford

The Circle of Trust Benefit Member Club TRUST

Trust Equation

Trust Principles Focus on the Member Collaboration Long-Term Relationship Transparency

Data Privacy and Security Privacy – the right of the member to choose what information they share and with whom and when it is shared Security – the level of protection a club puts in place to control access to member information

Trust and Data Privacy & Security Meeting Member Expectations An opportunity for competitive advantage

Some Statistics Area Business (% agree) Consumer (% agree) In general, consumer information is adequately protected? 50% 37% Data privacy policies are clear and well understood? 77% 40% The risk of sharing personal information is worth the personalised promotions, advertising or member discounts received? 47% 25%

Competitive Opportunity “The link between consumer decisions and perceived data security is stronger than many executives believe”

Data Privacy and Security Considerations Vision and Strategy Making it a Priority Collection and Use Strategy Breach Strategy

Vision and Strategy Questions How can we improve the member experience using data? What data do we need to collect? When should we seek member consent and allow them to opt in? Do we have excess member data we do not need? In attempting to improve the member experience are we seen as intrusive? How transparent and coordinated are we in the event of a breach?

Opt In versus Opt Out “Ask for my consent and allow me to decide which information I want to share” May reduce marketing ROI in the short-term Pay off in the long-term through greater trust and greater member openness to share data

Data Privacy and Security Considerations Policies Clear organisation wide understanding Up to date policies (Technology & Regulation) Easy to understand

Developing Policies “Develop privacy and security policies as if they were a marketing tool rather than a legal disclosure” What information do we ask for? How do we use this information? How do you opt in or opt out of providing information or our use of information How do we protect your information What are the benefits to you of providing information

Data Privacy and Security Considerations Organisational Chart Seniority of people with responsibility for data privacy

Data Privacy and Security Considerations Process and Systems Firewalls Anti-Virus Software Encryption Access to Member Data (restrictions and tracking) Test Security

Data Privacy and Security Considerations Risk Management Identify Threats Understand attractiveness of data to hackers Stay up to date with hackers tactics Audit Third Party Providers

Digital Marketing Done Well Consumer Profiling, Segmentation & Target Marketing Digital Efficiency Personalisation Member centric approach

The Generation Gap Seniors Baby Boomers Generation X Generation Y

The Generation Gap Generation DOB Range Expectations and Messages Discretionary Income Expectations and Messages Technology and Marketing Medium Seniors Pre 1946 Personalised Approach Save not Spend Good Reviews Community Landline Phone Direct Mail Baby Boomers 1946 - 1964 Quality & Value “Not Old” Future Thinking Mobile Phone Email Generation X 1964 - 1980 Information & Research Cynical of Brands Diversity & Safety Text Generation Y 1980 - 1998 Instant Gratification Time Poor Social Media

Downsides Reputational Damage Loss of existing members Loss of potential new members Lawsuits

Summary Looking at things from a Member Perspective Provide transparency in policies and actions Be judicious about sharing and collecting data Inform and reassure members about security measures Protect my data

THANK YOU

Club Managers Leadership and Management Program ACCM (Contextualised) Diploma of Leadership and Management Practical & Implementable (Managers Toolkit) Online & Self-Paced 12 Modules Individual Skills Team Skills Organisational Skills