Striking the balance between customer privacy and intimacy

Issue 9 2020 Information Security

Whilst the role of the marketing department appears to have evolved significantly over the past few years, fundamentally it is still about building relationships. With the rise of social media and other digital platforms, this has increasingly meant that relationships are based less on human contact and more on personalised digital communication.

Consumers are aware of the inevitable trade-off between privacy and personalisation, aptly termed the privacy paradox. Earlier research into the paradox of what consumers say and do was attributed to consumers simply not knowing enough about the pitfalls of sharing personal information too readily. More recent research from the US shows that many consumers have resigned themselves to the fact that their information has been traded as a commodity, yet privacy concerns remain a key consideration when disclosing online.

This is supported by the Digital Marketing Institute, which states that privacy is a top concern for online consumers, with 86% taking steps to improve their online safety. With this in mind, companies need to prioritise customer privacy and control by implementing security and privacy standards as well as customer control over their personal information and communication preferences.

As marketers have traditionally been responsible for establishing relationships with customers and implementing initiatives to build trust, they also need to take responsibility for customer data. This includes customer data protection as well as providing customers with means to control their own data – regardless of where in the lifecycle of the relationship they may be. And while information technology teams can and should be held accountable for ensuring that customer information is not compromised by data breaches or intrusions into the company environment, it is marketing’s responsibility to ensure that customer information does not ‘get out’ and is treated with the utmost respect. This is supported by the DMA which states that marketers have a responsibility to take good care of consumer data and cannot take this for granted. There is a difference between security and privacy and more often than not, these terms are used interchangeably.

Securing customer data

IT has the responsibility of keeping data secure and ensuring that data cannot be accessed by potential hackers. A key responsibility is to prepare for possible security breaches and ensure that there are security measures in place to protect customer data. According to the Institute of Digital Marketing, IT departments need to focus on where data is stored as well as implement security measures along every step of the process of data acquisition through to use and storage.

This is an important first step to keeping customer data secure and meeting customer expectations. This is a big responsibility as according to an Accenture study, 75% of consumers consider personal data as their second-biggest concern after increasing costs. However, according to PWC, 75% of consumers do not believe that companies handle their data responsibly. Therefore, while consumers expect companies to keep their information safe, they don’t often believe that companies do. This gap is a trust gap.

Customer privacy

Over the years, marketers have collected massive amounts of customer data to provide positive, personalised experiences. While customers have come to appreciate the personalisation, they are concerned about their data falling into the wrong hands.

For this reason, marketing departments need to take responsibility for customer data and how it is handled. This is supported by The Federal Trade Commission which states that marketers are legally obligated to treat customers’ private data respectfully and fairly. Based on this, customers require transparency in how their data is being used for marketing activities. A key concern is that many marketing departments outsource various initiatives to third-party agencies, which requires that private customer data is shared with companies outside of the business.

According to Financial Post, if companies transfer private customer information to third parties, the onus remains on the company to keep the data safe. With this in mind, customers are reliant on the relationship they have with selected companies to keep their data secure regardless of whether they use third-party companies or not.

While marketers may trust their partners and suppliers, it is important to verify them and confirm how they use the data you provide them with, as well as understand how their data policies align with regulatory requirements. After all, if your customers trust your organisation and their data lands in the wrong hands, you will ultimately be left holding the bag.

Customer trust

According to the DMA, attitudes towards data may be evolving, but trust remains the constant and key factor when it comes to understanding what people feel is most important about data. Adding to this, brands that fail to take responsibility for their customer data ultimately lose customers, goodwill and shareholder value.

Based on this, trust is the most valuable component in the customer relationship. Before a customer will give you their data, they have to trust you and believe that you have their best interests at heart. Once they have given you their data you have to prove that you are trustworthy and will use their data as agreed.

This can be achieved by putting measures in place such as permission-based access to customer data, which limits the number of employees that can access the customer data. However, beyond internal measures, companies would benefit from empowering customers with verification tools to protect themselves from potential threats such as email verification tools that can help prevent customers from falling from spoofing or phishing emails.


Paula Sartini.

Trust is earned. It takes time. It’s only through repeated interactions that trust is built. It is also fragile and easily lost. Just because a customer shares information does not mean they trust the organisation or that it is an open invitation to receive unsolicited communication. It is merely the first step in a journey.

Customers should always feel that they are in control. If organisations want to build trust, they need to visibly show the evidence of the measures that have been put in place to ensure that customers remain in charge of their information. This includes, but is not limited to privacy policies, customer control over the personal information they have provided, how it is stored and its deletion. This should also extend to behavioural data.

In all your interactions with your customers, your brand tells a story; it says whether or not you’re consistent and trustworthy or flighty and unreliable. By focusing on brand consistency across all documents, presentations, emails, and more, customers establish trust and believe that if you are willing to focus that much attention on the smaller details, you are credible and will pay attention to the bigger issues such as customer data security and privacy.

While secure IT infrastructure is a key component to keeping customer data secure, customers expect more than adherence to regulations and the latest technologies to help protect their data from falling into the wrong hands; they are relying on the brands they trust to live up to their expectations and put measures in place to ensure that their data will be used responsibly and safely. Without customer trust, brands will not survive.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.