BGS Customer Relationship Management Chapter 13 Privacy and Ethics Considerations Chapter 13 Privacy and Ethics Considerations Thomson Publishing 2007.

Slides:



Advertisements
Similar presentations
Information Systems for Businesses Jack G. Zheng May 22 nd 2008 MIS Chapter 2.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
4.01 Foundational knowledge of promotion
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
Consumer Privacy and Information Access Professor Matt Thatcher.
September 2006 The effect of the pending privacy legislation on the Direct Marketing and Contact Centre Industries… Catastrophe or Opportunity?
Security Controls – What Works
1 BGS Customer Relationship Management Chapter 6 Technology and Data Platforms Chapter 6 Technology and Data Platforms Thomson Publishing 2007 All Rights.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Business Plug-In B7 Ethics.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
Understanding the Industry’s Environmental, Ethical and Legal Issues Chapter 11 Copyright© 2010 Pearson Education, Inc. Publishing as Prentice Hall.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
© Experian CheetahMail All rights reserved. Confidential and proprietary. 1 © Experian Information Solutions, Inc All rights reserved. Confidential.
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
BGS Customer Relationship Management Chapter 7 Database and Customer Data Development Chapter 7 Database and Customer Data Development Thomson Publishing.
© Hogan & Hartson LLP. All rights reserved. Affiliate Marketing: How To Ensure Your Third Parties Are Meeting Privacy Obligations Mary Ellen Callahan,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
PPT th Edition. PPT 11-2 McGraw-Hill/Irwin Levy/Weitz: Retailing Management, 5/e Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights.
Name of presenter(s) or subtitle Privacy laws and their impact on research David W. Stark MRIA B.C. Chapter November 2, 2005.
E-Marketing and Customer Relationship Management
David W. Stark Name of presenter(s) or subtitle MRIA Alberta Chapter
BGS Customer Relationship Management Chapter 5 CRM and Data Management Chapter 5 CRM and Data Management Thomson Publishing 2007 All Rights Reserved.
Anonymity, Security, Privacy and Civil Liberties
Chapter 3 The Internet micro-environment
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
CRM: WEEK 7 (2/20 – 2/24) Last Week Highlights: Carnival Cruise Line Case Revenue Management vs. Customer Relationship Management CRM Across Channels Leverage.
BGS Customer Relationship Management Chapter 6 Technology and Data Platforms Chapter 6 Technology and Data Platforms Thomson Publishing 2007 All Rights.
MTAC MTAC May 5, 2004 Zoë Strickland Chief Privacy Officer USPS.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Business Driven Technology Unit 1 Achieving Business Success Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Information Privacy: Public Policy and Institutional Policies Wendy Wigen Policy Analyst, EDUCAUSE Copyright Wendy Wigen, This work is the intellectual.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
HIPAA Health Insurance Portability and Accountability Act of 1996.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 4: Laws, Regulations, and Compliance
The Business Research Company Technology. Technology Industry Taxonomy TBRC Business Research. All Rights Reseserved 2 Technology Computer Hardware &
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. Current Privacy Policy Issues in.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
The Data Protection Audit How to prepare What to expect The end results Dublin Chamber of Commerce, March 24 th.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
BGS Customer Relationship Management Chapter 6 Technology and Data Platforms Chapter 6 Technology and Data Platforms Thomson Publishing 2007 All Rights.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
Business Briefing Security Service Providers
5th Edition.
Privacy and the Law.
Module 3 Consumer Privacy.
E&O Risk Management: Meeting the Challenge of Change
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Employee Privacy and Privacy of Employee Information
Health Care: Privacy in a Digital Age
GDPR (General Data Protection Regulation)
Analysis of Privacy and Data Protection Laws and Directives
INDUSTRY & MAILING DATABASE
Presentation transcript:

BGS Customer Relationship Management Chapter 13 Privacy and Ethics Considerations Chapter 13 Privacy and Ethics Considerations Thomson Publishing 2007 All Rights Reserved

Consumer Privacy Concerns Touch Point Activity “Quid pro quo” Unsolicited direct mail – Imbedded personal information – Time to view and sort mail – “Open-the-envelope” tricks – Offensive or inappropriate mail – Mail as a result of recent activity – Overuse of personalization

Consumer Privacy Concerns Touch Point Activity Unsolicited s – Time to view and sort mail – Time and cost to use software in effort to manage s – “Open-the- ” tricks with subject line – Offensive or inappropriate mail – Virus concerns

Consumer Privacy Concerns Touch Point Activity Unsolicited s – Personal information captured by cyberspace pirates – Spyware, cookies, and other mechanisms used to capture information and track activity – Phishing

Consumer Privacy Concerns Touch Point Activity Unsolicited FAX Unsolicited telemarketing call – Current customer – Noncustomer

Consumer Privacy Concerns Other Activity Ability of organization to secure and manage personal and sensitive information Use information for respective function only Inadvertent misuse or illegal use of personal and sensitive information

Consumer Privacy Concerns Other Activity Specific industry considerations – Financial and insurance – Retail and catalogue – Hotel, entertainment, and travel – Grocery – Auto – Medical – Government – Pharmaceutical

Organization Privacy Concerns Quest for information while adhering to privacy and ethical responsibility Emergence of chief privacy officer Touch point interaction issues Internal management of information Consistency across channels Compliancy (formal and informal)

Organization Privacy Concerns Compliancy with regulatory entities (formal and informal) Agreement and relationship with customer Dynamics of privacy legislation

Legislation Children’s Online Privacy Protection Act (COPPA) Financial Modernization Act (Gramm-Leach- Bliley Act) Telecommunications Act of 1996 Video Privacy Protection Act of 1998 Telephone Consumer Protection Act of 1991

Legislation Health Insurance Portability and Accountability Act of 1996 E-Rights S. 854 Driver’s Privacy Protection Act of 1994 Communications Assistance for Law Enforcement Act of 1994 Fair Credit Reporting Act (1970)

Legislation Right to Financial Privacy Act (1978) Privacy Act of 1974 The 900-Number rule Data-Security Bill

What the Consumer Can Do Mail preference FTC do-not-call registry DMA preference Understand opt-in and OPT-OUT Get smart!

What the Organization Can Do Be compliant with current and pending legislation Understand and meet or exceed customer and prospect privacy and ethics expectations Assign privacy strategy ownership at executive level (e.g., CPO)

What the Organization Can Do Verify that the organization infrastructure supports respective privacy initiatives Create internal awareness and support internal education on privacy and ethical standards Ensure that all information-gathering touch point processes support privacy initiatives

What the Organization Can Do Verify who within the organization needs access to customer and prospect information relative to privacy and ethical issues Identify external partner management of respective privacy initiatives Create a formal privacy policy for internal use and external use

What the Organization Can Do Do-not-call registry FTC search program Wireless - ported numbers Wireless block identifier Telephone and preference services State TPS lookup program

What the Organization Can Do Can-spam Deceased do not contact list Prison, military, and other suppression DMA’s smart clean service Build brand trust – (e.g., TRUSTe, BBBOnline, privacy statement and policy)

Other Considerations Foreign mail preference service European Union Technology – Allows for dynamic information capture and behavior observation – Attractive for cost reduction and timely customer interactions – Can be perceived as invasive

Summary Privacy should be an integral component of the CRM strategy Organizations can turn privacy constraints into a positive differentiator with their customers Technology has made it easier to capture information and monitor consumer behavior Organizations should meet and if possible exceed consumer expectations relative to privacy and ethical issues