IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Customer Privacy

RSS Feed   
ALSO CALLED: Sensitive Personal Data, Online Customer Privacy, Data Privacy, Personal Data Privacy, Customer Data Privacy, Consumer Data Privacy, Privacy, Consumer Privacy
DEFINITION: The Children's Online Privacy Protection Act (COPPA) is a law created to protect the privacy of children under 13. The Act was passed by the U.S. Congress in 1998 and took effect in April 2000. COPPA is managed by the Federal Trade Commission (FTC). The Act specifies: That sites must require parental consent for the collection or use of any personal information of young Web site users. What must  … 
Customer Privacy Reports
1 - 25 of 28 Matches Previous Page  |  Next Page
CW Innovation Awards: SIA taps blockchain for loyalty app
sponsored by ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
Posted: 11 May 2021 | Published: 11 May 2021

ComputerWeekly.com

Empathetic Customer Experience - Changing the Thinking
sponsored by Alchemer
WEBCAST: Check out this webcast from Alchemer to hear VP of Customer Experience at IDC and CEO at Alchemer discuss how to build an empathetic relationship between customers and brands, the importance of technology in strengthening customer experience and driving business outcomes, and more.
Posted: 18 Feb 2021 | Premiered: Feb 18, 2021

Alchemer

Video: Alchemer Product Overview
sponsored by Alchemer
WEBCAST: When it comes to customer feedback, collecting it is only the first step. You then must analyze those insights to improve the overall CX. In this brief video, learn about Alchemer’s solution, and how it can help you better utilize feedback throughout the customer journey.
Posted: 05 Feb 2021 | Premiered: Feb 5, 2021

Alchemer

Demand Sensing Improving Inventory & Customer Fulfillment Levels
sponsored by NexInfo
CASE STUDY: Demand sensing is key to improving inventory and customer fulfillment levels. Just ask one manufacturer, who recently worked with NexInfo to replace E2Open with Oracle Demantra, to improve their demand planning process. Learn about the company’s experience working with NexInfo and the importance of demand sensing in this case study.
Posted: 28 Dec 2020 | Published: 28 Dec 2020

NexInfo

Customer Engagement: How To Expand Capacity For Whatever Comes Next
sponsored by ServiceNow
EBOOK: What can be done to prepare customer service to handle whatever tomorrow may bring? Explore the 6 best practices of customer service leaders in this eBook.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

ServiceNow

Three Ways Personas Can Improve Your ABM Performance
sponsored by TechTarget
EBOOK: Download this eBook to understand how you can engage a broader cross-section of roles to open up new opportunities, make progress by uncovering new personas, grow account penetration and optimize your investments throughout the customer lifecycle.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

TechTarget

Delivering unified customer experience
sponsored by Fractal
RESOURCE: What does it mean to deliver a unified customer experience? It means combining data, AI, and analytics to offer proactive, memorable service—something that’s easier said than done. Learn how you can get started creating a unified customer experience, and the benefits that offers in this blog post.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Fractal

Why Service Design is the Key to Delivering Outstanding Customer Experiences
sponsored by Intrado
WHITE PAPER: Learn about the key role service design plays in delivering outstanding customer experiences, and how to get started in this white paper.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

Intrado

Webinar: Who You Gonna Call?
sponsored by TechTarget
WEBCAST: Are you aligned to maximize customer revenue across marketing, sales, and customer success? Having the right data and insights will help. In this webinar, get expert tips how to use intent monitoring and the data collected to maximize opportunity capture across the entire revenue lifecycle, and deliver a seamless customer journey.
Posted: 01 Jun 2020 | Premiered: Jun 1, 2020

TechTarget

THE RETURN ON MANAGING CUSTOMER CONVENIENCE IN MODERN SERVICE PROGRAMS
sponsored by ServiceNow
RESEARCH CONTENT: Download this Aberdeen report to explore why customer convenience is increasingly important in modern service programs, and get expert recommendations on how to minimize customer effort.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

ServiceNow

How Sales and Marketing Can Thrive on Real Purchase Intent
sponsored by TechTarget
WEBCAST: More than half of B2B brands say they rely on purchase intent data, yet research suggests most marketers lack access to the people actually exhibiting intent. Watch this video to see how TechTarget’s publisher-based model provides access to the active, opted-in prospects you need to hit your KPIs and grow your business.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020

TechTarget

Consumer Insights/Analytics leading in defining New Normal
sponsored by Fractal
RESOURCE: Health emergencies, like COVID-19, often bring about changes in consumer behavior—which, in turn, affects many organizations’ operations. So, how should you plan for the next few months? Start by downloading this blog post, which offers tips for insights and analytics teams as they try to define a “new normal.”
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Fractal

Data Analytics Maps Positive Customer Journeys
sponsored by SearchCRM
EBOOK: Amid the noise of multiple communication channels, data analytics strategies can identify needs, predict behavior and enhance the customer experience.
Posted: 28 Sep 2016 | Published: 26 Sep 2016

SearchCRM

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Big Data and Personal Data Lead to the Internet's Most Surprising Consumer Products
sponsored by SAP
WHITE PAPER: In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

SAP

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Gigya

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust

Data Privacy e-Book
sponsored by SearchSecurity.co.UK
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

SearchSecurity.co.UK

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

Vault-Like Protection for 200 Financial Services Locations
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it
Posted: 26 Oct 2009 | Published: 26 Oct 2009

WatchGuard Technologies, Inc.

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Top Five Security Issues for Small and Medium-Sized Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.
1 - 25 of 28 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences