Privacy & Security

  • Secure for “Your Own Good!”

    Cumbersome Security Measures Create Difficult Customer Experiences

    by
    Bank of America doesn’t streamline customers’ address changes across BoA product lines. Comcast sets long, arbitrary router passwords and discourages customers from changing them—using “security” as a flimsy excuse.
    Oct. 1, 2014
    All Members
    click to read more
  • The Customer Revolution Is Coming Back!

    Customers Are on the Cusp of Retaking Control Over the Big Things that Impact Their Lives

    by
    The next customer revolution is upon us. We will regain control of things that matter most in our lives: our government, our financial well-being, our health, our jobs, our privacy, and our access to the Internet.
    Jun. 12, 2014
    All Members
    click to read more
  • Where Are Your Clouds? Location Matters!

    Why Your Customer Data Belongs in the Cloud and Why You Need to Control Jurisdiction

    by
    Companies of all sizes are taking advantage of cloud computing. A lot of customer information is hosted in clouds. But personally identifiable information needs to be housed in the customer’s home country. Customer clouds should be country-specific.
    Mar. 7, 2014
    All Members
    click to read more
  • Priorities for Microsoft’s New CEO

    Focus on Cross-Platform Mobile Application Development & Customer Clouds

    by
    Open Letter from Patty Seybold to Satya Nadella, Microsoft’s new CEO, about what Microsoft’s strategy should be to save Microsoft’s bacon.
    Feb. 14, 2014
    All Members
    click to read more
  • Have We Consented to Government Surveillance?

    Do Citizens, Residents, and People in Other Countries Have a Right to Privacy in the Digital Age?

    by
    Edward Snowden’s whistle-blowing on the NSA, and Glenn Greenwald’s documentation of the technologies and processes used, are a wake-up call for citizens who believe that their private communications should remain private.
    Aug. 1, 2013
    All Members
    click to read more
  • The Future of Computing

    New Wealth Will Conform to Old Patterns

    by
    Scott Jordan considers the future of highly personal computing—computing on and around our person--and its relationship to the “new wealth,” in which privacy may be a luxury.
    May. 23, 2013
    All Members
    click to read more
  • Are You Tracking Your Customers’ Locations on Their Mobile Phones?

    Marketers Beware: Customers Don’t Want Their Locations to Be Tracked and Monitored

    by
    Do you know where you are? Everyone else might! Today’s smartphones are tracking devices that also happen to make phone calls. Your mobile apps are probably tracking your location and sharing that information without your permission.
    Jul. 19, 2012
    All Members
    click to read more
  • How to Think About Privacy and Managing Your Online Identity

    Use Your Head and Use Your Manners

    by
    How should you manage your online identity in an era in which all your communications and activities are being tracked both online and offline?
    Jun. 21, 2012
    Strategies
    click to read more
  • Facebook’s Timeline: Seductive and Dangerous?

    Applications Integrated into Timeline Track Everything that You and Your Friends Do

    by
    Facebook’s new Timeline is much more than a new user interface. It’s a seductive forced march designed to lead us all into a marketers’ nirvana in which our activities and life events are tracked.
    Mar. 22, 2012
    Strategies
    click to read more
  • Unintended Risks of Using Facebook

    Pay Attention to What Information, and Whose Information, You Are Sharing with Whom!

    by
    Be a good steward of your privacy and the privacy of your friends and family members on Facebook. Learn how applications are mining and analyzing your and your friends’ Facebook behavior and what you should know about those practices.
    Mar. 8, 2012
    Strategies
    click to read more
  • How Does Google’s Privacy Policy Affect You?

    It’s Time to Pay Attention to How Google Is Tracking Your Online Behavior

    by
    When Google announced a new unified Privacy Policy to go into effect on March 1, 2012, it caused people to stop and think about how much privacy they’re willing to trade for free search, email, YouTube, and other nifty services.
    Feb. 23, 2012
    All Members
    click to read more
  • What's Your Customer Cloud Strategy?

    Twelve Customer Requirements to Include as Your Firm Migrates to Cloud Computing

    by
    A “customer cloud” is the virtual project space where your customers can securely access, keep track of, and manage the assets they’ve bought from you as well as any related projects in which they’re engaged.
    Feb. 9, 2012
    All Members
    click to read more
  • WikiLeaks Will Catalyze a Huge Data Security Backlash

    Patty's Pioneers' Predictions for 2011

    by
    Reactions to WikiLeaks will cause massive capital investment in information security causing a significant stimulus to the IT industry in 2011. 2011 will also herald the beginning of major decline in freedom on the Web
    Jan. 6, 2011
    All Members
    click to read more
  • Facebook Tries to Clean Up Its Privacy Act

    Can Facebook Users Really Expect Any Privacy Protections?

    by
    Will Mark Zuckerberg pay attention to customers' desire to control the information they share through applications that connect with the Facebook platform?
    Oct. 14, 2010
    All Members
    click to read more
  • Who "Owns" Your Medical Records

    Whose Data Is It?

    by
    An organization called Health Data Rights has published five principles for the basic human right to access and to understand your own healthcare data and information.
    Jul. 8, 2009
    All Members
    click to read more
  • IBM.com’s New Look: More Than a Face Lift

    Using Service-Oriented Architecture to Provide an Adaptive Web Experience

    by
    In June 2007, IBM launched its next-generation Web site and the framework IBM will use to provide a unified online experience across all IBM’s Web properties. This new site architecture and approach embodies a number of best practices.
    Jun. 28, 2007
    Strategies
    click to read more
  • VP of Customer Intelligence

    Patty's Dream Team: Roles and Responsibilities You'll Need for Your Customer-Centric Organization

    by
    The first priority of your VP of customer intelligence should be to act as the custodian for the information that your customers care about.
    Nov. 4, 2004
    Strategies
    click to read more
  • Instant Messaging @ Work

    Key Policies and Practices for Leveraging IM in Business

    by
    In this report, we discuss the key policies and practices businesses need to address in order to leverage instant messaging effectively.
    Jan. 22, 2004
    All Members
    click to read more
  • Three Steps to Success in Cross-Business Interactions

    Coordination and Trust Will Enable You to Seize Web Service and Portal Opportunities, Reaping the Value While Containing the Risks

    by
    Web Services and Portals can make it easier to do business, but you’ll need to plan for changes in relationship, trust, and system capabilities in order to take advantage of new opportunities.
    Sep. 18, 2003
    All Members
    click to read more
  • Securing Trading Partner Interactions: Two Approaches Supported by New Standards

    Considering Federation or Automated Provisioning Standards? You'll Need Both

    by
    How do you prepare for automated interactions with your partners? You’ll need to consider an extended approach to provisioning, an updated security infrastructure, and the implications of federation.
    Jul. 30, 2003
    All Members
    click to read more