Harriet Heyman

Edited by Lisa Yorgey Lester Chicca D'Agostino, president, Focus USA Given recent developments, it appears unlikely that we will be able to prevent future legislation. The best we can do is try to mitigate it. Apart from data security, another major issue is how we treat consumers via our advertising messages. All of us—brokers, managers and list owners—need to screen advertising offers. Don't rent or broker names unless you have seen the offer. If you feel it invades a consumer's privacy, reveals specific details about a family, is deceptive, or is not in compliance with GLB, FACTA and other laws—try to have the

Chicca D'Agostino, president, Focus USA Given recent developments, it appears unlikely that we will be able to prevent future legislation. The best we can do is try to mitigate it. Apart from data security, another major issue is how we treat consumers via our advertising messages. All of us—brokers, managers and list owners—need to screen advertising offers. Don't rent or broker names unless you have seen the offer. If you feel it invades a consumer's privacy, reveals specific details about a family, is deceptive, or is not in compliance with GLB, FACTA and other laws—try to have the copy corrected … or reject

When it comes to prospecting with compiled lists, it's imperative that the data used to create them are accurate. "All data on a file is subject to scrutiny to ensure the overall integrity of the information," write ALC of New York LLC's Andy Ostroy and Margaret Iadeluca in their article "Sleuthing Compiled Lists." This comment could just as easily pertain to the scandal surrounding data broker ChoicePoint's sale of sensitive personal information to criminals who posed as legitimate business owners. One of the sticking points for privacy advocates and some congressmen investigating the need for tighter data protection is that not only do

By Harriet Heyman The customer list is one of an organization's most valuable assets. Protecting this asset—from theft, fraud, misuse—has always been a concern. The answers on how to keep a list secure used to be easy; today they are hard. Even the reference to this asset has changed from "list" to "database," suggesting a broader set of information to protect. And as we advanced from rudimentary customer lists— once maintained on index cards—to keypunch, data entry, data scanning and data capture through electronic means, the safeguards have had to be constantly updated. Early List Security When I entered the list business some 30

More Blogs