Privacy Issues In Market Research Duane L. Berlin, Esq. General Counsel, CASRO Principal, Lev & Berlin, P.C. PL&B Annual Conference Cambridge, MA 22 August.

Slides:



Advertisements
Similar presentations
ETHICS AS CULTURE KEY ELEMENTS Stage One (primary) – Key Elements of a Culture of Ethics Appoint an ethics program manager to oversee your ethics-related.
Advertisements

NACARA Annual Conference Industry Perspectives Panel September 29,2014 Boise, Idaho Andy Madden Director State Government Affairs ACA International.
Page 1 AT&T Billing Solutions Anti-Cramming Policy Overview May 11, 2011.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Brown, Suter, and Churchill Basic Marketing Research (8 th Edition) © 2014 CENGAGE Learning Basic Marketing Research Customer Insights and Managerial Action.
John Mack, MA, MS, MPhil President, Internet Healthcare Coalition eHealth Code of Ethics: Consensus and.
Behavioral Advertising Privacy, Consumer Attitudes and Best Practices Carolyn Hodge, VP of Communications, TRUSTe David W. Stark CIPP, VP & North America.
Queensland University of Technology CRICOS No J Ethical Use of Confidential Student Information Student Success Program Training.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Learning Objectives Copyright © 2004 John Wiley & Sons, Inc. Survey Research: The Profound Impact of the Internet CHAPTER Five.
Principles of Marketing
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
Ethics in Business Research
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Data Protection for Church of Scotland Congregations
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
1 IQCS AGM November 2009 IQCS Data Protection Workshop Scenarios / Answers 12 th November 2009.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
Name of presenter(s) or subtitle Privacy laws and their impact on research David W. Stark MRIA B.C. Chapter November 2, 2005.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
FERPA Family Educational Rights and Privacy Act and Rebecca Macon Registrar University of Georgia Presentation for GASFAA October.
CPS Acceptable Use Policy Day 2 – Technology Session.
David W. Stark Name of presenter(s) or subtitle MRIA Alberta Chapter
C4- Social, Legal, and Ethical Issues in the Digital Firm
Using the Internet to Conduct Research What Investigators and IRB Members Should Know -- January 29, Lisa Shickle, MS Analyst, VCU Massey Cancer.
Marketing Systems Group Southern California MRA Education Seminar Presentation September 17, 2005 Privacy and Current Issues.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Canada’s Anti Spam Legislation. What is CASL? CASL was intended to combat negative online behaviour  spam  phishing  malware  spyware  It will create.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
©2002 South-Western Chapter 8 Version 6e1 chapter Marketing Research 8 8.
Online Research An introduction to the use of the internet in primary marketing research.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
2006 SISO Executive Conference Legal Issues in Using Mailing Lists: The CAN-SPAM ACT The Junk Fax Prevention Act The National Do Not Call Registry.
Chapter 6: Getting the Marketing Information We Need.
Ethics in CS CS5493(7493). Work Place Ethics Definition Work place ethics are the rules of personal conduct established by social traditions and the employer.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
The American Christian Bible Study Market Research undertaken by Phil Prior on the behalf of Focus Radio, publishers of Facing the Challenge Bible Studies,
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Type author names here Social Research Methods Chapter 28: E-research: Internet research methods Alan Bryman Slides authored by Tom Owens.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
MARKET RESEARCH INDUSTRY IN JAPAN
Behavioral Advertising Privacy, Consumer Attitudes and Best Practices Carolyn Hodge, VP of Communications, TRUSTe David W. Stark CIPP, VP & North America.
Level 1 Business Studies AS90837 Demonstrate an understanding of internal factors of a small business.
The Georgia Open Records Act and ferpa
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Surgeon List
UNHCR‘s Policy on the Protection of Personal Data of Persons of Concern - An introduction (October 2016)
Setting and Upload Products
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
Privacy principles Individual written policies
Information Security Session October 24, 2005
Current Privacy Issues That May Affect Your Credit Union
Internet law Business law.
Relocation CARNIVAL come one…come all
Presentation transcript:

Privacy Issues In Market Research Duane L. Berlin, Esq. General Counsel, CASRO Principal, Lev & Berlin, P.C. PL&B Annual Conference Cambridge, MA 22 August 2007 Lev & Berlin, P.C.

We’re the people who ring you at dinnertime Quantitative – surveys Qualitative – focus groups Data collection methods In-person — door-to-door; mall intercept; focus group facility Telephone Mail Fax Internet Anonymous random samples Third-party lists

Anonymity is a fundamental principle Industry standards and ethical codes of conduct predate most privacy laws Anonymity and data quality go hand in hand Personal information stripped from data files Responses reported in aggregate to research sponsor

Anonymity is a fundamental principle Respondents’ personal data may be disclosed to research client or third parties when: Respondents consent Information is used only for research purposes (e.g. no direct marketing)

Telephone response rates falling precipitously Consumers bombarded with unsolicited calls to their homes In response, Do Not Call laws and registries established in several countries Most of them do not apply to survey research, but public often does not make distinction between survey research and telemarketing Telephone research becoming more expensive to conduct

Internet-based research growing rapidly Fast and inexpensive compared to other methods Most online research conducted with “access panels” Consumers opt-in to receiving periodic s from research firm, inviting them to complete surveys Panel members rewarded for their time (e.g. cash, points, prize draws)

Example of panel research recruitment website Link to Privacy Policy should be on every page. Site should use SSL encryption

Panels and privacy Panel research firms collect and retain personal data (e.g. contact details and profile information) Recruiting new panel members may be challenging in the future Spam, phishing, spyware and online identity theft are causing consumers to be wary about submitting personal data at websites

Panels and privacy To counter the threats posed by Internet scams, panel research firms must demonstrate their trustworthiness to current and prospective panellists Participation rates in online surveys can be quite high if panel is managed well, including attending to privacy concerns

Client-supplied lists Customer or employee satisfaction research often conducted using lists provided by client Does your organisation’s privacy policy permit disclosures of personal data to service providers for market research purposes?

Excerpt from Telus Privacy Code We may disclose a customer's personal information to: A company or individual employed by TELUS to perform functions on its behalf, such as research or data processing; Any such disclosure of a customer's personal information outside of TELUS is made on a confidential basis with the information to be used only for the purpose for which it was disclosed.

Client-supplied lists Some respondents ask, “how did you get my name and number?” Discuss with your research partner how these requests will be handled Respondents may have a legal right to know, but revealing the name of the survey sponsor at the start of the interview could introduce bias

Client-supplied lists Most clients rely on opt-out consent for sharing their customers’ personal data with research suppliers Opt-in consent strongly recommended for sharing customers’ addresses, owing to spam complaints Even better, if possible, clients should issue the survey invitation s to their customers

Good example of client obtaining opt-in for research

In this example, TNS is sending survey invitations from its domain to a client-provided list of addresses From: TNS on behalf of CLIENT To: Rebecca Smith Subject: Complete CLIENT’s survey and receive a reward for your time Date: Wed, 6 Jun :51: Sending survey invitation s

In this example, Research Firm X is sending survey invitations from its domain, but spoofs the From address From: CLIENT To: Rebecca Smith Subject: Complete CLIENT’s survey and receive a reward for your time Date: Wed, 6 Jun :51:  Sending survey invitation s

Spoofing is not in anyone’s interest Major ISPs all use authentication systems to combat spamming and phishing Sizeable proportion of spoofed s are routed to users’ junk mail folders, or carry warning messages, or are not delivered at all

Questions to ask your research vendors Which industry trade associations they belong to If they participate in privacy certification programs (e.g. TRUSTe, IAPP’s CIPP) and privacy audits The URL of their panel recruitment website — review the privacy policy Whether they are on ISPs’ whitelists and adhere to industry best practices for sending s In addition to the standard privacy compliance questions that you ask your market research vendors, find out from them:

Further Information : Duane L. Berlin, Esq. Lev & Berlin, P.C. Phone: (203) Fax: (203)