Data Security

A Call Center Rep Gave My Credit Card Number to a Third Party
October 1, 2005

Are your contact center reps treating your customers in a way that best represents your brand? Are they staying within the confines of applicable laws when making upsell and cross-sell offers, especially those for third parties? Are you sure? Hereโ€™s why I ask: I ordered a home product from a catalog in July. I had previously ordered from this company with no problems. After taking my order, the contact center rep launched into a rambling, barely decipherable cross-sell offer of joining some third-party shopping club in which I could get discounts on other products not related to the catalog. I

By the Stats: Best Practices in Online Privacy
September 20, 2005

โ€œPrivacy concerns are one of the major obstacles for the next level of adoption of the Web by online customers,โ€ says Terry Golesworthy, president of The Customer Respect Group, a research and consulting firm. The company recently analyzed 464 major corporate Web sites to determine critical trends related to online customer privacy, and then ranked those companies. Hereโ€™s what it found: ยฅ 23 percent of companies have policies that The Customer Respect Group termed โ€œgoodโ€ for allowing users to destroy their own information stored in corporate databases. ยฅ 42 percent of companies scoredโ€goodโ€ on their policies toward sharing of collected personal data. ยฅ 64

Operations: Thwart Online Fraudsters
September 6, 2005

Hereโ€™s a nightmare scenario: One Monday morning you look at the previous weekโ€™s sales numbers from your online channel, and your heart skips a beat. Sales were up 23 percent! Hooray! But within a few days your contact center starts getting calls from irate consumers wondering why youโ€™ve charged their credit cards for items they never ordered. Your site has been tagged by Internet fraudsters using stolen credit card numbers. How could you have avoided this? By instituting fraud-detection best practices. Here are a few offered in the white paperโ€Buyers Guide: Best Practices for Internet Fraud Prevention,โ€ available from ClearCommerce, a software solutions provider (www.clearcommerce.com). ยฅ

Scary Days in Marketing
August 1, 2005

Cybercriminals broke into the computer systems at BJโ€™s Wholesale Club and and stole customer data. As a result, BJโ€™s faces about $13 million in private claims. And in its settlement with the Federal Trade Commission, BJโ€™s must submit to outside security audits for the next 20 years. Fraud costs the retail industry an estimated $1.5 billion annually, according to the National Retail Federation. Think technology will come to your rescue? Think again. In 2004, the Carnegie Mellon University CERT Coordination Center tracked 3,780 new computer security vulnerabilities, up from just 171 in 1995. The problem is getting worse, even with all of the

Operations: Coordinate Privacy Across Multiple Channels and Divisions
July 19, 2005

Seventy-five percent of consumers believe they have lost all control over how personal information is collected and used by companies, according to a recent Privacy& American Business survey, said James Koenig, co-leader of privacy practice for PricewaterhouseCoopers, in his sessionโ€Marketing in a Privacy-Sensitive Worldโ€ at Direct Marketing Days New York held last month. Following are a few tips Koenig offered to manage internal communication to better protect your customersโ€™ data: * Implement a marketing oversight management process. โ€œAll marketing programs and campaigns should be reviewed quarterly,โ€ said Koenig. Representatives from each distribution channel should be included. The process should be used as a tool to reinforce

Human Resources: Destroy Employee Data
June 21, 2005

If you gather employeesโ€™ personal information from credit reports you now are required to destroy the data before discarding of it, according to regulations that went into effect earlier this month. The Fair and Accurate Credit Transactions Act, which was passed by Congress is December 2003, states that employers must shred or burn paper documents or โ€œsmash or wipeโ€ computer disks that have the employeesโ€™ information. This refers only to data youโ€™ve collected on employees by running credit reports on them. According to a report in USA Today (โ€œEmployers must shred personal data,โ€ June 1, 2005), the regulations are part of governmental efforts to reduce identity

Privacy: Protect Your Customersโ€™ Personal Information
June 7, 2005

A federal bill recently introduced in the U.S. Senate by Diane Feinstein (D-Calif.) would require any institution that owns, licenses or collects personal information to notify the individuals to whom the information belongs if those data are believed to have been acquired by an unauthorized person. Given both the recent flurry of this type of legislation and data breaches at a number of institutions in recent months, Jerry Cerasale, senior vice president of government affairs for The Direct Marketing Association, offered the following advice at his session โ€œLegislation and Privacy Issues: Protect Your Company and Manage Your Riskโ€ at the Annual Catalog Conference held last

By the Stats: How Do Your Customers Feel About Information Shared With Third Parties?
May 10, 2005

Twenty-seven percent of consumers say a trusted online merchant should never share their personal customer information with a third party without the consumerโ€™s express permission, according to โ€œThe Online Consumer Permissions Study,โ€ a research report released by the Ponemon Institute earlier this year. In all, 1,799 consumers age 18 and older were surveyed. Other findings include: * 89% of consumers would approve of information sharing without their permission to improve the quality of services or products offered. * 84% to helped reduce incidents of identity theft. * 71% to conduct research that helps a company better understand its customersโ€™ preferences. * 62% to provide product information or special

Web Site Security for Catalogers
April 1, 2005

Be afraid. Be very afraid. As you read this, hackers are scanning your servers for open ports. Or perhaps at this moment a hacker is pasting odd strings into your catalog request form to steal credit card numbers. Worse yet: Your machines might already be compromised โ€” and you donโ€™t even know it. Yes, my intent is to scare. And yes, I sound paranoid. But Iโ€™m actually not. As one security expert told me with no trace of humor, โ€œItโ€™s not paranoia when they really are trying to get you.โ€ As a multichannel merchant, your days should be spent worrying about merchandise, customer

Patch It: Common Network Security Breaches
March 15, 2005

Many merchants still havenโ€™t adequately protected their customersโ€™ data from falling into the wrong hands, said Joe Majka, vice president at VISA USA, during his talk at the conference of the eCommerce and Catalog Systems Forum, held March 3 and 4 in New Orleans. In his work with merchants, Majka says he still finds many merchants guilty of the following: ยฅ No segmentation and/or firewall installed on networks. โ€œThieves can get into a merchantโ€™s system and go anywhere they want to within that data network,โ€ Majka said. ยฅ Un-patched systems and/or default configuration.โ€I often see merchants who havenโ€™t changed the default password that comes