SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Protecting privacy: Tackling the oncoming wave of marketing data regulation

Protecting privacy: Tackling the oncoming wave of marketing data regulation
Jessica Jacobs
Jessica Jacobs
Contact company
Contact Incubeta
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • GDPR inspired stricter data protection; global regulations continue evolving, impacting data privacy strategies.
  • Third-party cookies phased out, shifting focus to first-party data for transparency and trust.
  • Customer-centric data privacy strategy enhances compliance and loyalty, anticipating regulatory changes.
Related Links
  • What will be the biggest surprise for security in 2023
  • How can security address privacy concerns while increasing protection?

The nuances of data privacy continue to bombard organisations from all angles, and, amid the impending sunset of Universal Analytics (UA), it’s time to stop playing catch-up. Instead, by enacting future-proofing strategies around data as a first port of call, long-term compliance can be achieved as an automatic byproduct.

Data privacy

At data privacy’s ‘sunrise’, companies’ efforts were largely targeted towards the customer, ensuring that the ever-growing extent of information being handed over wittingly or otherwise was kept secure.

Next came the juggling act of leveraging that information in the most responsible, yet personalised way possible. The tightrope of a more bespoke and smart service, without looking invasive or ‘creepy’, is one that many businesses still fall off.

Regulation of privacy laws

You only have to look to the UK, US, and India to see how regulations can evolve, or take time to reach

Across both of these critical junctures, however, and underpinning every decision that an organisation makes in the data privacy space, is regulation. Four years ago, GDPR prototyped this more strict landscape, and several countries around the world have followed suit by ushering in their interpretations of data protection.

But, as demonstrated by the upcoming depreciation of third-party data, compliance is never a rigid concept, nor set in stone. You only have to look to the UK, US, and India to see how regulations can evolve, or take time to reach even a temporary form.

Future-proof, privacy-centric content strategy

In some countries the implementation of these rules can vary from within, with different states updating their privacy laws according to their timescales, making it difficult to keep track of which regulations apply to what region. With this in mind, instead of waiting for each new direction in this evolving journey, marketing leaders should look further down the road with their next steps.

By creating a future-proof, privacy-centric content strategy for their organisations now, they can both protect and delight customers, while remaining agile to future regulatory changes to come.

Put the customer first

Rewinding briefly to phase one of this data privacy conversation, the customer should still be at the forefront of their minds when visualising future regulatory adherence. After all, much of the changing legislation revolves around evolving consumer demands.

The upshot is where marketing teams need to delve deeper to create a more individualised strategy

Concerns around privacy have indeed grown in recent years, as reliance on digital means of service provision has become more commonplace. However, what has also grown in tandem, is the expectation for a more personalised experience. The often conflicting, the upshot is one where marketing teams need to delve deeper into personal information to create a more individualised strategy, without breaching their privacy or jeopardising data security.

Self-accountability and compliance

Compliance-wise, this is reflected in regulators giving companies just two weeks to turn around any recognised issues of non-compliance before shutting down their entire online presence. Self-accountability is part of the process, so it only makes sense to get that balancing act correct from the outset.

If done successfully, not only will organisations be offsetting the need to reveal their shortfalls in such a way, but customer loyalty will be emboldened in the process. So, be transparent, be candid and be clear. Show customers how their data will be used, how it will be protected, and how such stringent regulatory requirements are being met.

First-party data presents a first-class opportunity

There is a slight, immediate glitch, to the above plan of action, however. The removal of third-party cookies is set to eliminate the head start organisations have been getting to this point, their secret gateway to try and optimise data, and win over customers through indirect means.

The removal of third-party cookies is set to eliminate the head start organisations have been getting

This naturally places all of the emphasis on the collation of first-party data instead, which is not necessarily a bad thing. If an organisation is already striving towards a sustainable future built on notions of transparency, relationship building, and mutual trust, then dealing directly with consumers can be a great opportunity to showcase that approach and philosophy.

Data Enrichment

Again, there is a tightrope to be walked in terms of not coming across as too invasive, as individual profiles and accounts are built. But, if handled delicately, and requested in exchange for incentives and rewards, then the payoff can be game-changing.

Here, the key is ‘data enrichment’. By enacting strategies such as extended reality campaigns, or incentivised data sharing, companies can begin to form more complete pictures of individual users and collective demographics.

Improved customer experience 

That first-hand knowledge can then be converted into improved customer experiences more generally, and more bespoke offerings on a person-by-person basis.

Data enrichment is so valuable as it largely offsets the risk of changing regulatory landscapes. By dealing with first-party data only, the perfect representation of the ideal customer is formed; and best of all, it is formed with those customers’ direct permission and input.

A first step toward the future

The benefits of meeting customer expectations, and enriching data, should be goals

The benefits of meeting customer expectations, and enriching data, should be goals with or without regulatory pressures. It, therefore, makes no sense to wait for the exact dynamics of compliance to come to light before putting in place this future-proofing strategy.

The legislation will indeed continue to change for different nations, regions, and sectors. Similarly, we’re likely to witness similar step changes to the imminent removal of third-party data in the future as well.

Human-centric, responsible approach

But compliance can be achieved ahead of time if the actions being taken are responsible, customer-centric, and most importantly, still place data privacy as a priority. Such an approach can get ahead of upcoming developments such as AI governance or data localisation because the core fundamentals will already be that perfect mix of lucrative and ethical.

All companies need to do to get ahead of the curve is to maintain and demonstrate this human-centric, responsible approach to how data is gathered and used. It is a mindset and course of action that should be taken even without the threat of legislation. Ultimately, it is an opportunity to build stronger, more loyal relationships with customers, en route to a more valuable data-driven business proposition.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Office surveillance
  • Digital video surveillance
  • Office security systems
  • Office security
  • Industrial security
  • Commercial security
  • Private sector security
  • Public sector security
  • Security management
  • Security installation
  • Security tagging
  • Security monitoring system
  • Network monitoring
  • Public security
  • Industrial security systems
  • Security software
  • Security service
  • Coastal surveillance
  • Industrial surveillance
  • Integration software
  • Cyber security
  • Internet of Things (IoT)
  • Corporate Security
  • Central Monitoring
  • Data Security
  • Network Video Recorders
  • Digital Video Recorders
  • Cloud security
  • Artificial intelligence (AI)
  • GDPR
  • Related links
  • Articles by Jessica Jacobs
  • Related categories
  • CCTV software
  • Access control software
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

This article discusses the challenges of protecting consumer privacy in the face of increasing use of emerging marketing technologies and strategies, and highlights the importance of transparency and customer consent.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec