A new frontier for data privacy by design: Ten ways to utilise CSP weblogs | Total Telecom

rispetto alla JV del Big 4  IN Europa https://totaltele.com/a-new-frontier-for-data-privacy-by-design-ten-ways-to-utilise-csp-weblogs/

A new frontier for data privacy by design: Ten ways to utilise CSP weblogs

Posted by Total Telecom Staff | Jan 25, 2023 | Public SectorCOMPANY NEWSPeopleData CentresGovernanceCustomerNetworksEuropeSecurityViewpoint

Viewpoint Article

By Bill Danner, EVP Americas, Intent HQ

Telecommunication companies sometimes veer away from an incredibly rich, yet underutilised dataset – data already in their possession – weblog data. Concerns about privacy, scalability challenges, and fears of potential misuse have created significant hesitation. This has been stopping Communication Service Providers (CSPs) from leveraging their weblogs to offer more relevant marketing and from monetising this Internet traffic data that they already log and analyse routinely for network engineering purposes.

However, the privacy/compliance teams at CSPs increasingly believe that the magic formula is to fully figure out the ways to encourage opt-in, while handling weblog data safely, especially for marketing purposes. Senior leadership teams perceive the risks, in general, but are interested in monetising this valuable asset, without compromise or loss of customer confidence. Simultaneously, the marketing teams don’t know what steps to ask the IT department to implement in order to use weblog data safely.

Privacy-first use of weblogs is possible today, and there is growing interest in proven capabilities that will give early adopters a competitive head-start. What is needed to take advantage of this richest of data sources is a digital platform capable of delivering privacy by default right from the outset, which eliminates any risks.

How can this be achieved? Is this possible? How can CSPs find the right balance, being respectful of customer data and yet harnessing its power to deliver the relevance customers expect? In parallel, how can they protect and grow their revenue streams by safely monetising their data assets, while maintaining consumer and brand confidence?

The answer may seem simple, but delivering the end result is not easy. The key is to put customer protection first. Meet or exceed the regulations by engineering privacy into the way all customer data is processed and then optimise its treatment to reveal the richest possible insights for marketers.

Sharing information with data scientists, privacy experts, and IT practitioners has facilitated meaningful conversations about how to overcome the concerns entrenched in CSPs about weblogs. Importantly, they don’t need to surmount the challenges alone.

Here are 10 best practices plus first-hand observations, learnings and recommendations that could transform the way CSPs approach the use of weblog data:

  1. Under GDPR, a telecom needs customer consent to use weblogs for most marketing purposes. Gaining this customer consent for a modest fraction of customers isn’t difficult. This fraction is often more than enough people to support a proof of concept for use of this data.
  2. Customer identities should be protected throughout all processing. Even consented customers should have their identities tokenised, so identities are never exposed to employees (and vendors) working with the data.
  3. Weblogs should be summarised and converted into a form that generates insights about many customers, independent of any one customer’s identity, early in the processing. This ensures that insights connect to the common actions of groups of customers, making the insights non-invasive and more practical.
  4. Some data elements in a consented customer profile may be inappropriate to use as criteria for selection or treatment in some kinds of marketing campaigns. For example, the result could be discriminatory. The use of these data elements should be systematically controlled.
  5. Weblogs can reveal far more detail than marketers need, far more than they have the capacity to use. Deep packet inspection, showing what a consumer did on each website, is “Too Much Information.” Truncating URLs to block this detail requires expertise but isn’t hard to implement.
  6. Consented customers may change their mind and opt out. Systems must support this processing seamlessly.
  7. Data protection also requires a clear policy for data retention. We recommend 24 months or less for the inferences derived from weblogs.
  8. Security is the foundation of privacy. Without strong data security, there can be no privacy.
  9. Analysing vast weblog data requires “data minimisation”, following the principle of select, omit, truncate and summarise to ensure data privacy and processing efficiency. Parallel processing technology can also support projects dealing with massive, internet-scale data.
  10. Insights are most effectively extracted using semantic analysis and natural language processing, supported by domain-specific AI and machine learning. This helps to solve any issues created by language nuances, ambiguity, correlation, and bias.

When used correctly, data science and marketing teams can use weblogs to significantly improve their own models, including those that predict churn, delivering up to 3x return on investment and sustainable data monetisation. Understand how to build in privacy by design and outsmart your competition.