IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Customer Privacy

RSS Feed   
ALSO CALLED: Sensitive Personal Data, Online Customer Privacy, Data Privacy, Personal Data Privacy, Customer Data Privacy, Consumer Data Privacy, Privacy, Consumer Privacy
DEFINITION: The Children's Online Privacy Protection Act (COPPA) is a law created to protect the privacy of children under 13. The Act was passed by the U.S. Congress in 1998 and took effect in April 2000. COPPA is managed by the Federal Trade Commission (FTC). The Act specifies: That sites must require parental consent for the collection or use of any personal information of young Web site users. What must  … 
Customer Privacy Reports
23 Matches
Chatbots: Improve Your CX Strategy
sponsored by ServiceNow
EGUIDE: Chatbots are a great option for handling frequent, easy-to-answer questions, but how effective are they in a CX strategy? Inside, explore the benefits of chatbot technology. Learn how chatbots can help improve your CX strategy, and discover how to determine the right point for chatbot-human handoff.
Posted: 17 Jul 2019 | Published: 15 Jul 2019

ServiceNow

12 Ways to Make Your E-Commerce Customers Love You
sponsored by New Relic
RESOURCE: Stop sending your customers to your competitors! In this helpful blog post, discover 12 ways to make your e-commerce customers fall in love with your business, and unlock expert tips for building ongoing customer loyalty.
Posted: 15 Jul 2019 | Published: 09 Feb 2018

New Relic

The Future of the Contact Center
sponsored by Avaya
RESEARCH CONTENT: In this Gartner research report, discover what to expect from the future contact center. Learn how AI can help revolutionize your engagement and interactions, and explore the technological changes paving the way for the contact center of the future, including cloud technology, chatbots, and more.
Posted: 24 May 2019 | Published: 25 Apr 2019

Avaya

Overcome the Greatest MSP Challenge: Customer Acquisition
sponsored by Unitrends
EBOOK: This e-book is designed to help you overcome the customer acquisition hurdle. Download it for guidance on not only finding new customers, but ensuring their data—as well as that of your existing customers—is secure and protected.
Posted: 01 May 2019 | Published: 14 Mar 2019

Unitrends

A Guide to the Most Common CRM Use Cases
sponsored by Greenhouse
WHITE PAPER: View this e-book to learn about the common questions you should consider before investing in a CRM strategy, and find out how to leverage your CRM effectively with a series of expert tips from Greenhouse CRM.
Posted: 25 Apr 2019 | Published: 25 Apr 2019

Greenhouse

Hyper-Growth Company?
sponsored by Onfido
RESOURCE: In a hyper-growth industry like the sharing economy, it can be difficult to balance security against scale. But to continue growing long-term, it's crucial. If you're struggling to build trust and integrity in your business, download this resource for 4 things you can add to your to-do list today.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Onfido

Trends in Customer Trust
sponsored by Salesforce
RESEARCH CONTENT: As lines between digital and physical worlds blur, today's customers demand deeply relevant, personalized experiences across devices, channels, and interactions. Download this research brief to explore why trust is foundational to CX and what businesses can do to foster trust while meeting the demands for tailored engagement.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Salesforce

Data Analytics Maps Positive Customer Journeys
sponsored by SearchCRM
EBOOK: Amid the noise of multiple communication channels, data analytics strategies can identify needs, predict behavior and enhance the customer experience.
Posted: 28 Sep 2016 | Published: 26 Sep 2016

SearchCRM

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Big Data and Personal Data Lead to the Internet's Most Surprising Consumer Products
sponsored by SAP
WHITE PAPER: In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

SAP

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Gigya

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust

Data Privacy e-Book
sponsored by SearchSecurity.co.UK
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

SearchSecurity.co.UK

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

Vault-Like Protection for 200 Financial Services Locations
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it
Posted: 26 Oct 2009 | Published: 26 Oct 2009

WatchGuard Technologies, Inc.

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Top Five Security Issues for Small and Medium-Sized Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.

Protect Your Customer Data for Peace of Mind
sponsored by Cisco Systems, Inc.
WHITE PAPER: When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.

Scalable Data Quality: A Seven Step Plan for Any Size Organization
sponsored by Melissa
WHITE PAPER: No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.
Posted: 07 Jun 2007 | Published: 01 Jun 2007

Melissa

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc
23 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement