Blog

    

Taking Digital Privacy to the Next Level

Posted by Bjorn Aannestad on 9/23/16 10:19 AM

Robin Wilton is technical outreach director for identity and privacy in the Internet Society's Internet Technology Office. He is a specialist in digital identity, IT security and public policy and is a member of the Kantara Initiative's Board of Trustees. Robin also worked as a research analyst on Gartner's Identity and Privacy Strategies team. 

UnboundID: Tell us about your work with the ISOC Technology Office?

Wilton: The Internet Society is a non-profit and our mission is to ensure that the benefits of the Internet reach everyone. Public sector and commercial organizations have well-established models for Internet business, but we want to make sure that individuals benefit from it in a balanced way compared with commercial and government users. Part of the work is advocacy and translating between technology groups and policy groups.

Read More

Topics: Expert Interviews, Privacy and Preference Management

Why Consent Management Is Merging Into Identity Management

Posted by Dave Malcolm on 9/15/16 11:41 AM

Mark Lizar is executive director of the Open Consent Group, a London-based company that specializes in consent engineering and management. He is also founder of the Open Notice initiative, chair of the Consent & Information Sharing Work Group at the Kantara Initiative, chair of the Consent Work Group for Digital Catapult’s Personal Data & Trust Network and the creator of the Consent Receipt.

UnboundID: How did the consent management field begin and what does it entail?

Lizar: The concept goes back quite a while. It started up in the modern age and it’s usually done by large enterprises and governments. Now, we are seeing a massive shift as people can manage their own consent and have better experiences. Consent management is merging into identity management. But the difference is that consent management is people-enabled management of consent, not enterprise enabled. It allows people to approve and withdraw consent and then create personal experiences from that. Identity management has traditionally been more focused on data protection than granting individuals control.

Read More

Topics: Expert Interviews, Privacy and Preference Management

How Gamification Improves Customer Engagement

Posted by Dave Malcolm on 5/26/16 7:30 AM

Eric Singleton is Founder and CEO of the technology strategy firm, Eric Singleton & Associates. He is the former CIO of Tommy Hilfiger, Chico's FAS, the architect of Raytheon Company's original eCommerce presence, and held senior executive positions at Honeywell Aerospace and Honeywell Automotive.

UnboundID: In terms of digital marketing trends, what is most interesting right now, and what should be on the radar of every major consumer brand?

Singleton: At our firm, we are spending a lot of time on gamification. This involves marketers creating content where end users will self-identify, and then through a series of questions, roll into a gamification mode which can be very fun and engaging. Our conclusion is that there is a maturity level being reached by this next wave of consumers who are less patient and less committed to navigating search tools and weeding through the results to find what they are looking for. The old Boolean search mode is wearing thin. The human mind has its limits and people will drop off quickly after viewing the first 30 results. Gamification changes things by delivering a brief but engaging experience which is hyper-relevant for what someone is seeking.

Read More

Topics: Mobile Apps, Expert Interviews, Privacy and Preference Management

Personalized Marketing: Why Businesses Are Still Lagging

Posted by Ishan Kumar on 5/13/16 9:59 AM

As customers continue to lose patience with irrelevant advertising messages, one-to-one marketing is becoming the key to achieving and retaining a competitive edge. Seventy-three percent of customers prefer to do business with brands that use personal information to make their shopping experience more relevant, and the popularity of ad blockers is further proof that this trend will only grow.

Yet, many businesses still struggle when it comes to personalizing customer engagement. Sixty percent of brands aren’t able to deliver personalized content in real time and 70 percent fail to use personalized emails. In a recent report, luxury brands emerged as the businesses that are most behind in email personalization. For these brands that are shaped by brand recognition and customer loyalty, this lack of one-to-one outreach represents a significant loss of opportunities.

Read More

Topics: Customer Experience, Privacy and Preference Management

Let Customers Drive Privacy, Relevance

Posted by Ishan Kumar on 4/28/16 10:59 AM

Ben Kepes is a technology evangelist, an investor, a commentator and a business adviser. Kepes covers the convergence of technology, mobile, ubiquity and agility, all enabled by the Cloud. His areas of interest extend to aviation technology, enterprise software, software integration, financial/accounting software, platforms and infrastructure as well as articulating technology simply for everyday users. 

How concerned do consumers need to be about privacy today; how do you handle this issue in your own life?

Kepes: I am either incredibly naïve or very relaxed or a combination of the two. So long as someone doesn’t get my bank account or other intimate details, I don’t really care. The saying, "If you have nothing to hide you have nothing to fear," is not quite that simple. But to some extent, it’s true. All of my Facebook photos are public. I feel kind of sorry for those people who want to look at my running pictures, but I’m really not concerned about it. I frequently receive ads on my social media pages for running products, and even though I don’t buy products from ads, I’d rather be pitched those type of products than others. This type of targeting is not bad, although it is annoying. As the consumer, you can choose to ignore these ads very easily.

Read More

Topics: Expert Interviews, Privacy and Preference Management

Are Data Privacy and Customer Engagement Mutually Exclusive?

Posted by Steve Shoaff on 3/31/16 11:02 AM

Data privacy is a heated topic with far-reaching implications for IT and business professionals. Governing organizations are introducing significant new regulations such as the recent General Data Protection Regulation (GDPR) and Privacy Shield. Existing legislation is also changing, as we saw with the revocation of Safe Harbor.

These rulings vary widely from region to region, and they encompass data management aspects that go far beyond organizational data collection and use to capturing customer consent. What’s more, capturing consent is not just limited to a one-time event when a new customer creates a profile or account. Consent must be confirmed and refreshed as customers travel across regions with different laws and even as users change devices. 

Read More

Topics: Data Management, Privacy and Preference Management

Tackling Data Privacy Challenges with Identity Management

Posted by Bjorn Aannestad on 3/25/16 9:30 AM

Concerns over data privacy are growing as consumers share more data across more subsections of their lives. Studies have shown that customers don’t mind sharing their data in exchange for value in the form of discounts or information; but they expect brands to ask their permission and to protect their privacy. As Spotify discovered last year when it sparked customer outrage over changes to its privacy policy, people are paying close attention to how brands manage their valuable information. It’s becoming a defining criterion for brand loyalty.

In addition to elevated privacy demands from customers, businesses are grappling with evolving regulations. An increase in privacy data legislation is only one factor contributing to the complexity of meeting compliance requirements. Another aspect of the regulatory landscape posing challenges for IT, security and privacy professionals is that policies are in a state of flux. The recent revocation of Safe Harbor is just one example of the profound disruptive effects that changing legislation can have on organizations. Plus, the wide range of different regulations in play for each geographic region presents additional issues for any business with a global customer base.

Read More

Topics: Consumer Identity and Access Management, Privacy and Preference Management

Obama's SXSW Apple, FBI Remarks Fuel Privacy Debate

Posted by Derick Townsend on 3/16/16 1:06 PM

During a keynote speech at the 2016 SXSW Interactive Festival, President Barack Obama addressed some of the hot issues currently facing the technology community, including the debate over data privacy. Obama briefly touched on the Apple vs. FBI case in which the FBI wants Apple to create an iOS that will enable access to encrypted, password-protected data from the terrorists behind the San Bernardino shooting last year. Obama argued that in certain cases, there should be concessions around granting government access to data, or in a sense, he says, “…everybody is walking around with a Swiss bank account in their pocket.”

While these are only sound bites that don’t include the full context and balance of Obama’s remarks, these excerpts are indicative of how politicized this issue has become. Particularly in an election year, this subject has become polarizing, and that presents risks for a decision with so much at stake.

Read More

Topics: Security Best Practices, Privacy and Preference Management, Videos

Apple vs. FBI Exposes Privacy as Barrier to IoT

Posted by Steve Shoaff on 3/2/16 9:56 AM

By refusing to give the FBI access to the San Bernardino terrorists' iPhone data, Apple CEO Tim Cook has found himself at the center of a polarizing issue. The final outcome has implications that go far beyond the company's policies. This controversy could be considered a defining moment for personal data privacy rights, and people are loudly voicing their opinion. 

Some are applauding Apple's stance on preventing the government from accessing the terrorists' data. Others feel that Apple is making a mistake that risks national security. Either way, reactions to the event demonstrate that people deeply care about how companies protect their personal information from hackers, governments and businesses. 

Read More

Topics: Privacy and Preference Management, Videos

Don't Neglect the Fundamentals of Identity Management

Posted by Ishan Kumar on 2/11/16 8:52 AM

Paul Hill is a Senior Consultant with SystemExperts. Previously, he worked in the IT Department of the Massachusetts Institute of Technology where he played a leadership role in the evolution of identity services. He is recognized as one of the industry’s foremost experts in Microsoft technology, was involved in the creation of the Kerberos Consortium and played a leading role in the development of Internet2 specifications.

UnboundID: Why was Kerberos created and what has been its impact on the IT security industry in the last few years?

Hill: The primary motivation was that it was an academic environment, and you can’t always control who is on the network, so MIT needed a security protocol that could protect the network from hostile eavesdroppers. Today, Kerberos is widely adopted across the country as a standard authentication system, it’s even used in cable TV modems. Most large companies have deployed Kerberos as an authentication method.

Read More

Topics: Security Best Practices, Privacy and Preference Management