Striking the balance between customer privacy and intimacy

Issue 9 2020 Information Security

Whilst the role of the marketing department appears to have evolved significantly over the past few years, fundamentally it is still about building relationships. With the rise of social media and other digital platforms, this has increasingly meant that relationships are based less on human contact and more on personalised digital communication.

Consumers are aware of the inevitable trade-off between privacy and personalisation, aptly termed the privacy paradox. Earlier research into the paradox of what consumers say and do was attributed to consumers simply not knowing enough about the pitfalls of sharing personal information too readily. More recent research from the US shows that many consumers have resigned themselves to the fact that their information has been traded as a commodity, yet privacy concerns remain a key consideration when disclosing online.

This is supported by the Digital Marketing Institute, which states that privacy is a top concern for online consumers, with 86% taking steps to improve their online safety. With this in mind, companies need to prioritise customer privacy and control by implementing security and privacy standards as well as customer control over their personal information and communication preferences.

As marketers have traditionally been responsible for establishing relationships with customers and implementing initiatives to build trust, they also need to take responsibility for customer data. This includes customer data protection as well as providing customers with means to control their own data – regardless of where in the lifecycle of the relationship they may be. And while information technology teams can and should be held accountable for ensuring that customer information is not compromised by data breaches or intrusions into the company environment, it is marketing’s responsibility to ensure that customer information does not ‘get out’ and is treated with the utmost respect. This is supported by the DMA which states that marketers have a responsibility to take good care of consumer data and cannot take this for granted. There is a difference between security and privacy and more often than not, these terms are used interchangeably.

Securing customer data

IT has the responsibility of keeping data secure and ensuring that data cannot be accessed by potential hackers. A key responsibility is to prepare for possible security breaches and ensure that there are security measures in place to protect customer data. According to the Institute of Digital Marketing, IT departments need to focus on where data is stored as well as implement security measures along every step of the process of data acquisition through to use and storage.

This is an important first step to keeping customer data secure and meeting customer expectations. This is a big responsibility as according to an Accenture study, 75% of consumers consider personal data as their second-biggest concern after increasing costs. However, according to PWC, 75% of consumers do not believe that companies handle their data responsibly. Therefore, while consumers expect companies to keep their information safe, they don’t often believe that companies do. This gap is a trust gap.

Customer privacy

Over the years, marketers have collected massive amounts of customer data to provide positive, personalised experiences. While customers have come to appreciate the personalisation, they are concerned about their data falling into the wrong hands.

For this reason, marketing departments need to take responsibility for customer data and how it is handled. This is supported by The Federal Trade Commission which states that marketers are legally obligated to treat customers’ private data respectfully and fairly. Based on this, customers require transparency in how their data is being used for marketing activities. A key concern is that many marketing departments outsource various initiatives to third-party agencies, which requires that private customer data is shared with companies outside of the business.

According to Financial Post, if companies transfer private customer information to third parties, the onus remains on the company to keep the data safe. With this in mind, customers are reliant on the relationship they have with selected companies to keep their data secure regardless of whether they use third-party companies or not.

While marketers may trust their partners and suppliers, it is important to verify them and confirm how they use the data you provide them with, as well as understand how their data policies align with regulatory requirements. After all, if your customers trust your organisation and their data lands in the wrong hands, you will ultimately be left holding the bag.

Customer trust

According to the DMA, attitudes towards data may be evolving, but trust remains the constant and key factor when it comes to understanding what people feel is most important about data. Adding to this, brands that fail to take responsibility for their customer data ultimately lose customers, goodwill and shareholder value.

Based on this, trust is the most valuable component in the customer relationship. Before a customer will give you their data, they have to trust you and believe that you have their best interests at heart. Once they have given you their data you have to prove that you are trustworthy and will use their data as agreed.

This can be achieved by putting measures in place such as permission-based access to customer data, which limits the number of employees that can access the customer data. However, beyond internal measures, companies would benefit from empowering customers with verification tools to protect themselves from potential threats such as email verification tools that can help prevent customers from falling from spoofing or phishing emails.


Paula Sartini.

Trust is earned. It takes time. It’s only through repeated interactions that trust is built. It is also fragile and easily lost. Just because a customer shares information does not mean they trust the organisation or that it is an open invitation to receive unsolicited communication. It is merely the first step in a journey.

Customers should always feel that they are in control. If organisations want to build trust, they need to visibly show the evidence of the measures that have been put in place to ensure that customers remain in charge of their information. This includes, but is not limited to privacy policies, customer control over the personal information they have provided, how it is stored and its deletion. This should also extend to behavioural data.

In all your interactions with your customers, your brand tells a story; it says whether or not you’re consistent and trustworthy or flighty and unreliable. By focusing on brand consistency across all documents, presentations, emails, and more, customers establish trust and believe that if you are willing to focus that much attention on the smaller details, you are credible and will pay attention to the bigger issues such as customer data security and privacy.

While secure IT infrastructure is a key component to keeping customer data secure, customers expect more than adherence to regulations and the latest technologies to help protect their data from falling into the wrong hands; they are relying on the brands they trust to live up to their expectations and put measures in place to ensure that their data will be used responsibly and safely. Without customer trust, brands will not survive.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Eight African cybersecurity trends for 2026
Information Security
Check Point Software Technologies has released eight critical trends shaping Africa’s digital turning point in 2026, noting that their implementation will require the government, the private sector, and key civic institutions to cooperate.

Read more...
The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.