Are your contact center reps treating your customers in a way that best represents your brand? Are they staying within the confines of applicable laws when making upsell and cross-sell offers, especially those for third parties? Are you sure? Hereโs why I ask: I ordered a home product from a catalog in July. I had previously ordered from this company with no problems. After taking my order, the contact center rep launched into a rambling, barely decipherable cross-sell offer of joining some third-party shopping club in which I could get discounts on other products not related to the catalog. I
Data Security
โPrivacy concerns are one of the major obstacles for the next level of adoption of the Web by online customers,โ says Terry Golesworthy, president of The Customer Respect Group, a research and consulting firm. The company recently analyzed 464 major corporate Web sites to determine critical trends related to online customer privacy, and then ranked those companies. Hereโs what it found: ยฅ 23 percent of companies have policies that The Customer Respect Group termed โgoodโ for allowing users to destroy their own information stored in corporate databases. ยฅ 42 percent of companies scoredโgoodโ on their policies toward sharing of collected personal data. ยฅ 64
Hereโs a nightmare scenario: One Monday morning you look at the previous weekโs sales numbers from your online channel, and your heart skips a beat. Sales were up 23 percent! Hooray! But within a few days your contact center starts getting calls from irate consumers wondering why youโve charged their credit cards for items they never ordered. Your site has been tagged by Internet fraudsters using stolen credit card numbers. How could you have avoided this? By instituting fraud-detection best practices. Here are a few offered in the white paperโBuyers Guide: Best Practices for Internet Fraud Prevention,โ available from ClearCommerce, a software solutions provider (www.clearcommerce.com). ยฅ
Cybercriminals broke into the computer systems at BJโs Wholesale Club and and stole customer data. As a result, BJโs faces about $13 million in private claims. And in its settlement with the Federal Trade Commission, BJโs must submit to outside security audits for the next 20 years. Fraud costs the retail industry an estimated $1.5 billion annually, according to the National Retail Federation. Think technology will come to your rescue? Think again. In 2004, the Carnegie Mellon University CERT Coordination Center tracked 3,780 new computer security vulnerabilities, up from just 171 in 1995. The problem is getting worse, even with all of the
Seventy-five percent of consumers believe they have lost all control over how personal information is collected and used by companies, according to a recent Privacy& American Business survey, said James Koenig, co-leader of privacy practice for PricewaterhouseCoopers, in his sessionโMarketing in a Privacy-Sensitive Worldโ at Direct Marketing Days New York held last month. Following are a few tips Koenig offered to manage internal communication to better protect your customersโ data: * Implement a marketing oversight management process. โAll marketing programs and campaigns should be reviewed quarterly,โ said Koenig. Representatives from each distribution channel should be included. The process should be used as a tool to reinforce
If you gather employeesโ personal information from credit reports you now are required to destroy the data before discarding of it, according to regulations that went into effect earlier this month. The Fair and Accurate Credit Transactions Act, which was passed by Congress is December 2003, states that employers must shred or burn paper documents or โsmash or wipeโ computer disks that have the employeesโ information. This refers only to data youโve collected on employees by running credit reports on them. According to a report in USA Today (โEmployers must shred personal data,โ June 1, 2005), the regulations are part of governmental efforts to reduce identity
A federal bill recently introduced in the U.S. Senate by Diane Feinstein (D-Calif.) would require any institution that owns, licenses or collects personal information to notify the individuals to whom the information belongs if those data are believed to have been acquired by an unauthorized person. Given both the recent flurry of this type of legislation and data breaches at a number of institutions in recent months, Jerry Cerasale, senior vice president of government affairs for The Direct Marketing Association, offered the following advice at his session โLegislation and Privacy Issues: Protect Your Company and Manage Your Riskโ at the Annual Catalog Conference held last
Twenty-seven percent of consumers say a trusted online merchant should never share their personal customer information with a third party without the consumerโs express permission, according to โThe Online Consumer Permissions Study,โ a research report released by the Ponemon Institute earlier this year. In all, 1,799 consumers age 18 and older were surveyed. Other findings include: * 89% of consumers would approve of information sharing without their permission to improve the quality of services or products offered. * 84% to helped reduce incidents of identity theft. * 71% to conduct research that helps a company better understand its customersโ preferences. * 62% to provide product information or special
Be afraid. Be very afraid. As you read this, hackers are scanning your servers for open ports. Or perhaps at this moment a hacker is pasting odd strings into your catalog request form to steal credit card numbers. Worse yet: Your machines might already be compromised โ and you donโt even know it. Yes, my intent is to scare. And yes, I sound paranoid. But Iโm actually not. As one security expert told me with no trace of humor, โItโs not paranoia when they really are trying to get you.โ As a multichannel merchant, your days should be spent worrying about merchandise, customer
Many merchants still havenโt adequately protected their customersโ data from falling into the wrong hands, said Joe Majka, vice president at VISA USA, during his talk at the conference of the eCommerce and Catalog Systems Forum, held March 3 and 4 in New Orleans. In his work with merchants, Majka says he still finds many merchants guilty of the following: ยฅ No segmentation and/or firewall installed on networks. โThieves can get into a merchantโs system and go anywhere they want to within that data network,โ Majka said. ยฅ Un-patched systems and/or default configuration.โI often see merchants who havenโt changed the default password that comes