Gwenn Freeman

Gwenn Freeman

Gwenn Freeman is a privacy strategist for KBM Group, a marketing solutions provider based in Richardson, Texas.

New Year, Old Data

Everyone is in the data business. Companies are either buying data or looking for ways to monetize their data assets. And they’re

Tracking What the FTC Tracks

How closely do you track what’s happening at the Federal Trade Commission? If you’re like me, it’s sporadic. But recently, while researching a question on the FTC website, I realized I need to pay more attention. Here are four areas I plan to track more closely in the coming months:

10 Million Reasons to Care About CASL

I know what you’re saying to yourself. “I’m not a Canadian business.” “My email marketing is targeted to the U.S.” “I don’t send marketing emails, but use newsletters to get around legislation like this.” “I’m a B-to-B marketer.” “I’m a nonprofit.”

2014: The Year of Unintended Consequences

Usually, at the beginning of the year, I try to look at what marketers might expect from Congress in the coming year. For 2014, I'm taking a different approach. This year, I'm looking at the less obvious actions—the ones we don't expect to have an impact on us—and examining the unintended consequences that will, in fact, impact our businesses.

The Big Headache in Big Data

The year is halfway through and you've seen the headlines cropping up everywhere regarding Big Data. If you're like me, you read the articles and you see flaws in the facts or in the conclusions drawn from the facts, and you're tempted to dismiss them. At this point, you may be breathing easier because your company hasn't been the subject of an article.

Does the New HIPAA Rule Apply to You?

On Jan. 17, 2013, the U.S. Department of Health and Human Services (HHS) announced a final omnibus rule amending the Health Insurance Portability and Accountability Act of 1996 (HIPAA) in accordance with the HITECH Act of 2009. If you are a Covered Entity (CE) who has been dealing with HIPAA for years, you probably already know the implications of the new rule.

Looking Back at 2012 to Survive 2013

If you tried to follow privacy issues affecting direct marketing in 2012, you were looking everywhere. While there was no single major impact from legislation, there was agreement among the Federal Trade Commission (FTC), the White House and the Department of Commerce on the direction self-regulatory codes or legislation should take.

Can We Walk the Talk of Self-Regulation?

As we look toward the end of 2012, one of the more troubling issues facing marketers is the focus the Federal Trade Commission (FTC), Congress and the media are putting on data brokers. While marketers are only one segment of the data broker debate and cannot resolve this issue alone, we must be proactive in defining our segment and restating and reaffirming our self-regulatory practices. If we are all following our stated "best practices," our arguments for continuing to self-regulate will carry more weight.

What Is a Data Broker? The FTC's Muddled Message

You might wonder why I'm asking this question or wonder why you should care, but you should care. If you are a marketer, you are either a data broker or you do business with one. And, data brokers have become an area of interest in Washington.

Cookie Monster or Customer Delight?

Websites: Do you remember a time before you had one? Remember when customer communications were monologues, not dialogues? If you don't remember, you should probably start talking to some of your more "experienced" colleagues about how we got to know our customers before the Internet—before customers could indicate their preferences with a clickthrough or actually "like" us on Facebook. In the debate over cookies, marketers have much to lose.

4 Things All Marketers Need to 

If you aren't a part of the healthcare industry, you may be only vaguely familiar with these laws. The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996, and the Privacy and Security Rules that resulted from this law, covering Protected Health Information (PHI), have been in place since 2003.

How Mobile Is Your Security?

Most companies have historically controlled mobile access by issuing standard smartphones that could be secured and managed within the network. But more companies are realizing that employee preference for brands and the proliferation of tablets in the workforce are making this practice obsolete. We are now in the era of BYOD (Bring Your Own Device).