Striking the balance between customer privacy and intimacy

Issue 9 2020 Information Security

Whilst the role of the marketing department appears to have evolved significantly over the past few years, fundamentally it is still about building relationships. With the rise of social media and other digital platforms, this has increasingly meant that relationships are based less on human contact and more on personalised digital communication.

Consumers are aware of the inevitable trade-off between privacy and personalisation, aptly termed the privacy paradox. Earlier research into the paradox of what consumers say and do was attributed to consumers simply not knowing enough about the pitfalls of sharing personal information too readily. More recent research from the US shows that many consumers have resigned themselves to the fact that their information has been traded as a commodity, yet privacy concerns remain a key consideration when disclosing online.

This is supported by the Digital Marketing Institute, which states that privacy is a top concern for online consumers, with 86% taking steps to improve their online safety. With this in mind, companies need to prioritise customer privacy and control by implementing security and privacy standards as well as customer control over their personal information and communication preferences.

As marketers have traditionally been responsible for establishing relationships with customers and implementing initiatives to build trust, they also need to take responsibility for customer data. This includes customer data protection as well as providing customers with means to control their own data – regardless of where in the lifecycle of the relationship they may be. And while information technology teams can and should be held accountable for ensuring that customer information is not compromised by data breaches or intrusions into the company environment, it is marketing’s responsibility to ensure that customer information does not ‘get out’ and is treated with the utmost respect. This is supported by the DMA which states that marketers have a responsibility to take good care of consumer data and cannot take this for granted. There is a difference between security and privacy and more often than not, these terms are used interchangeably.

Securing customer data

IT has the responsibility of keeping data secure and ensuring that data cannot be accessed by potential hackers. A key responsibility is to prepare for possible security breaches and ensure that there are security measures in place to protect customer data. According to the Institute of Digital Marketing, IT departments need to focus on where data is stored as well as implement security measures along every step of the process of data acquisition through to use and storage.

This is an important first step to keeping customer data secure and meeting customer expectations. This is a big responsibility as according to an Accenture study, 75% of consumers consider personal data as their second-biggest concern after increasing costs. However, according to PWC, 75% of consumers do not believe that companies handle their data responsibly. Therefore, while consumers expect companies to keep their information safe, they don’t often believe that companies do. This gap is a trust gap.

Customer privacy

Over the years, marketers have collected massive amounts of customer data to provide positive, personalised experiences. While customers have come to appreciate the personalisation, they are concerned about their data falling into the wrong hands.

For this reason, marketing departments need to take responsibility for customer data and how it is handled. This is supported by The Federal Trade Commission which states that marketers are legally obligated to treat customers’ private data respectfully and fairly. Based on this, customers require transparency in how their data is being used for marketing activities. A key concern is that many marketing departments outsource various initiatives to third-party agencies, which requires that private customer data is shared with companies outside of the business.

According to Financial Post, if companies transfer private customer information to third parties, the onus remains on the company to keep the data safe. With this in mind, customers are reliant on the relationship they have with selected companies to keep their data secure regardless of whether they use third-party companies or not.

While marketers may trust their partners and suppliers, it is important to verify them and confirm how they use the data you provide them with, as well as understand how their data policies align with regulatory requirements. After all, if your customers trust your organisation and their data lands in the wrong hands, you will ultimately be left holding the bag.

Customer trust

According to the DMA, attitudes towards data may be evolving, but trust remains the constant and key factor when it comes to understanding what people feel is most important about data. Adding to this, brands that fail to take responsibility for their customer data ultimately lose customers, goodwill and shareholder value.

Based on this, trust is the most valuable component in the customer relationship. Before a customer will give you their data, they have to trust you and believe that you have their best interests at heart. Once they have given you their data you have to prove that you are trustworthy and will use their data as agreed.

This can be achieved by putting measures in place such as permission-based access to customer data, which limits the number of employees that can access the customer data. However, beyond internal measures, companies would benefit from empowering customers with verification tools to protect themselves from potential threats such as email verification tools that can help prevent customers from falling from spoofing or phishing emails.


Paula Sartini.

Trust is earned. It takes time. It’s only through repeated interactions that trust is built. It is also fragile and easily lost. Just because a customer shares information does not mean they trust the organisation or that it is an open invitation to receive unsolicited communication. It is merely the first step in a journey.

Customers should always feel that they are in control. If organisations want to build trust, they need to visibly show the evidence of the measures that have been put in place to ensure that customers remain in charge of their information. This includes, but is not limited to privacy policies, customer control over the personal information they have provided, how it is stored and its deletion. This should also extend to behavioural data.

In all your interactions with your customers, your brand tells a story; it says whether or not you’re consistent and trustworthy or flighty and unreliable. By focusing on brand consistency across all documents, presentations, emails, and more, customers establish trust and believe that if you are willing to focus that much attention on the smaller details, you are credible and will pay attention to the bigger issues such as customer data security and privacy.

While secure IT infrastructure is a key component to keeping customer data secure, customers expect more than adherence to regulations and the latest technologies to help protect their data from falling into the wrong hands; they are relying on the brands they trust to live up to their expectations and put measures in place to ensure that their data will be used responsibly and safely. Without customer trust, brands will not survive.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...
The role of advanced technologies in ransomware recovery
Information Security
As businesses increasingly adopt cloud technologies, the complexities of maintaining resilience and ensuring rapid recovery from such incidents become even more pronounced. The integration of advanced technologies is essential to navigate these challenges effectively.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...