MANAGING ANONYMOUS AND AUTHENTICATED EXPERIENCES across the customer lifecycle.

Similar documents
Five Essential Components of Hospitality Marketing

Oracle s Data Management Platform + Cross-Channel Marketing Solution

10 THINGS B2B COMPANIES

MORE PRECIOUS THAN GOLD. A framework for delivering the next best offer in financial services.

Combine attribution with data onboarding to bridge the digital marketing divide

Writing a Privacy Policy 101

The Complete Guide to Getting Real ROI From Social

Turn Audience Suite. Introducing Audience Suite

Building campaigns that deliver.

Five Ways Marketing Can Drive Higher Online Commerce Revenue. Building Long-Term Relationships and Brand Advocates in the Process

IBM Customer Analytics Five best practices for understanding customer journeys

Customer Clues. SOLVE THE MYSTERY. of your audience. An Adobe Digital Marketing Financial Services Guide

The New Marketing Metrics for B2B. Measurements that really matter to the success of your business

Your Action Plan to Launch New Paid Content

Small business Big ambitions

Acquire, Convert, Develop and Retain

CUSTOMER ENGAGEMENT STARTS WITH SINGLE SIGN-ON

An Executive s Guide to B2B Video Marketing. 8 ways to make video work for your business

THE ESSENTIAL GUIDE TO FACEBOOK AND INSTAGRAM ADVERTISING

Creating Unique Data Assets to Drive Marketing Predictions and Actions. The Second-Party Data Advantage

How to Develop a Standout Website Top 11 things to take your dealership website to 11

Oracle WebCenter Sites

Marketing & CRM Trends Manuel Hinz & Dr. Markus Wuebben

Proactive Listening: Taking Action to Meet Customer Expectations

Page 1 of 29

MARKETING SERVICES WHITE PAPER DATA ONBOARDING: How to Avoid the Traps of Dirty Data

hybris marketing Market to an Audience of One Roland Blösch Director Financial Services

ADWORDS IS AN AUTOMATED ONLINE AUCTION. WITHIN A CAMPAIGN, YOU IDENTIFY KEYWORDS THAT TRIGGER YOUR ADS TO APPEAR IN SPECIFIC SEARCH RESULTS.!

Elastic Path Commerce for Telecoms. A Solution Overview

Webtrends for Banking. Give your customers cross-channel experiences that are relevant, personal and valuable. Solution Overview

Overview: ADVERTISING ON FACEBOOK

SOCIAL CUSTOMER. Etiquette SERVICE. Your guide for engaging as a person, not a logo

Top Social Media Policy Tips

WHITE PAPER: CUSTOMER DATA PLATFORMS FOR BUSINESS-TO-BUSINESS SOFTWARE AS A SERVICE (SAAS) MARKETING

A Retailer s Guide to Getting Omnichannel Customer Service Right

Amplifying the Voice of the Consumer

How to Increase with Limited Resources Brand Awareness Tips on increasing Brand Awareness

your guide to boosting booth presence

The Top Emerging Technologies For B2C Marketers

FACEBOOK GUIDE HOW TO USE FACEBOOK FOR RECRUITMENT MARKETING

When we group these different methods into categories, outbound marketing proves to be the most effective for generating B2B leads

Internet Options. Building Relationships: The Internet s Real Purpose. Growing Wisely Using The Internet

New to Instagram? See how to set up a free business profile, create content and use Instagram to grow your business.

An Employer s Guide to Payroll Cards

Tactics Made Easier on Social Media

+38% Your Path to Personalization: A Framework for Digital Marketing Advancement

From web analytics to Experience Analytics. Quality over quantity: Prioritize business value over web page views

Why marketers aren t giving social the credit it deserves

How to Run a Successful B2B Content Syndication Campaign

25% 22% 10% 10% 12% Modern IT shops are a mix of on-premises (legacy) applications and cloud applications. 40% use cloud only. 60% use hybrid model

THE IMPORTANCE OF DEVELOPING A SOCIAL MEDIA COMPLIANCE POLICY

What is 2nd Party Data? Leverage More Customer Data to Achieve New Levels of Marketing Insight

HOW BEST-IN-CLASS DEALERS ARE MAKING MORE CUSTOMER CONNECTIONS

Performance Marketing Asia

Integrated Digital Platforms

EXECUTIVE BRIEF Executive Summary HOW TO BALANCE PERSONALIZATION AND PRIVACY FOR OUTSTANDING CUSTOMER EXPERIENCES

Get Partner Solutions for Oracle Cloud. Oracle Cloud Marketplace

CPET 581 E-Commerce & Business Technologies

What is the purpose of DAM? Why do organizations invest in DAM?

Why Do So Many Online Businesses Fail?

Facebook is a key channel to connect with the people who matter to your business. Newsfeeds are personalised to show each person stories and ads that

Best Practices for More Effective E-Newsletter Advertising:

The future of CRM. Perspectives on where healthcare CRM is headed

Drive More Revenue by Measuring and Managing Customer Lifecycle Value

LIKES ARE GREAT, LEADS ARE BETTER

[ know me ] A Strategic Approach to Customer Engagement Optimization

PREDICT ENGAGE EACH OF YOUR CUSTOMERS WITH PRODUCTS THEY LL LOVE.

MARKETING CLOUD. Quick Peek

Social Media Guidelines

Privacy Policy MONAT GLOBAL

A Modern Intranet Defined

Ten Tips For Marketing To Homeowner Associations

Must Do Marketing Strategies. for Busy Small to Mid-Sized Business Owners

Lead Generation for IT Providers

Integrated Social and Enterprise Data = Enhanced Analytics

Oracle Data Cloud An Introduction to DaaS for Marketing

WHO WE ARE Newcastle Theatre Royal Trust Limited manages Newcastle Theatre Royal and City Hall and is a registered charity. We receive no ongoing reve

DIGITAL PLAN FOR SUCCESS

WHY YOU SHOULDN T IGNORE COUPON SITES

A DIGITAL MARKETING DEPOT WHITEPAPER. How to Grow Customer Lifetime Value with People-Based Search Marketing

AN E-BOOK BY KENTICO CMS GETTING STARTED WITH CONTENT MARKETING

Important changes to our Individual Savings Accounts (ISAs) Terms and Conditions

Bridging the Gap Between Commerce & Marketing

Supplemental Document 6. Lease Maturation Ad. socialmedia. For Honda Dealers

ELITE ADVISOR. Lead Generation. 12 months of marketing activities

Oracle Commerce Cloud. What s New in the May Release

BUS 168 Chapter 6 - E-commerce Marketing Concepts: Social, Mobile, Local

Unit 6 Good Choice. What is the most important thing to consider when you buy a product? Rank them 1 4. (1 = most important) Answer the question.

SAP Hybris Solution Brief for Wholesale Distribution

3 QUICK FIXES TO PERSONALIZE THE ONLINE CUSTOMER JOURNEY

Other legal considerations for your website content can include: Using proper company logos and listing trademarks and registered trademarks

Information for registrants. Guidance on social media

Leveraging Technology to Unify Multichannel Marketing Engagement

A study by Bambrick Media

Marketing: Managing Profitable Customer Relationships

Consignee Guide. Version 1.8

Banking at the speed of your life. Online. Mobile. Superior. Safe. PARKSTERLING. Answers You Can Bank On.

INTRODUCTION INSTAGRAM AT A GLANCE. The Performance Advertiser s Guide to Instagram

BUY BUTTON OR BACK BUTTON HOW WEBSITE WRITING CAN ENGAGE OR DETER CUSTOMERS

Fundamentals of Lead Nurturing

Transcription:

MANAGING ANONYMOUS AND AUTHENTICATED EXPERIENCES across the customer lifecycle. 2016

TABLE OF CONTENTS 3 Individual attention. 5 Personalization works. 7 Data is a continuum. 10 Combine data effectively. 11 Consider new technology. 12 Eliminate risks. 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 2

INDIVIDUAL attention. Before mobile, SEO, or Facebook ever existed, it didn t cost much to reach anonymous consumers through print, broadcast, and outdoor media. But audience segmentation was inaccurate, and performance was hard to measure. On the other hand, identifying prospects through direct mail or phone was measurable, but more expensive and difficult to scale. Identifying consumers as individuals is important because identity is the only constant carried across different interactions. Digital marketing technologies have transformed both anonymous and authenticated interactions. Online ads, websites, and search reach more anonymous consumers for less, with much better segmentation and measurement. They ve also added entirely new capabilities like behavioral monitoring and predictive analytics. Today s digital campaigns build lasting relationships between brands and authenticated contacts, across channels and locations. As the customer journey becomes more complex, it s increasingly critical to identify consumers as individuals because identity is the only constant carried across every interaction. 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 3

Personalization, identity, and privacy. Many financial services companies can t identify the same individual across these channels, much less deliver personalized offers. Financial institutions deal with millions of customers, each with unique financial needs and preferences as to how they access their money. 1 CHRISTOPHER YOUNG Director of Financial Services Strategy ADOBE In this paper, we ll explore five tips for managing anonymous and authenticated experiences, including the benefits of well-executed personalization, ways to safely combine data, the technology building blocks you ll need, and ways to eliminate risk. Personalization: Relevance to the attributes, interests, and behaviors of the members of a group, such as the target group for a campaign. Individuals interactions with a brand may be personalized even when no personally identifiable information about them is known or exchanged. Identity: The unique set of persistent characteristics that separate an individual from others things that don t change as a consumer switches devices, locations, and platforms. Identity is closely associated with one piece of personally identifiable information, such as a physical or electronic address, credit card, phone number, and so on. Privacy: Information that may not be disclosed for legal, ethical, or cultural reasons. Information may be private (bank account number) or public (name and street address) and may also be private without identifying a person (medical conditions). 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 4

TIP #1 PERSONALIZATION works. When marketers use the word personalization, they intend to adapt interactions based on what they know about a person, whether or not that person has shared information with them. Marketing techniques inherently create and manage interactions to personalize relationships with brands consumers can trust, delivering content that matches their preferences, attributes, and behaviors, and measuring marketing outcomes so marketers can focus and refine their efforts. However, to realize these benefits, personalization must be done well. In fact, 63 percent of consumers are unresponsive to out-of-context messages. 2 In addition, data breaches and surveillance disclosures have raised public awareness of data privacy and resulting regulations and standards so data used for personalization must be managed carefully. Customers respond to personalized, relevant experiences based on the data they feel comfortable sharing with your brand. But missteps are easy to make and could turn your customers away, says privacy expert Tim Sparapani, founder of legal strategy firm SPQR Strategies. It s not about what we know we re sharing, it s about what we don t know is being collected and sold about us, he says. 3 63% of consumers are unresponsive to out-of-context messages. But with personalization, you see increases in sales, click-through rates, and conversion. 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 5

In days when marketing teams operated from separate silos, direct marketing specialists could control the use of data to comply with regulations, contracts, and industry standards. But the increasing use of cross-functional digital marketing platforms has created more complexity. The undeniable value of personalization encourages marketers to find ways to get the most use of all their data, across the entire customer lifecycle. And the first step to using data well is understanding it thoroughly. Nicolas Serre, IT project manager at AXA Bank, says the bank s new approach emphasizes quality and relevance over quantity of email sent. We only send 10,000 to 20,000 text messages and 100,000 to 250,000 emails per month, rarely more. But they are highly relevant and personalized. 5 AXA Bank understands the benefits of personalization. After updating its email and campaign tools, the bank saw immediate results. Its loyalty emails were opened by up to 80 percent of its customers, and from this, it achieved a 5 to 10 percent conversion rate. 4 In less than 14 months, the company s investment in new campaign tools saw a 100 percent return on investment. 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 6

TIP #2 DATA is a continuum. Marketers can personalize interactions using information that spans complete anonymity to full authentication, with a middle range in which identified data may be used intermittently. The distinction between anonymous and authenticated hinges on personally identifiable information (PII) information that can be used alone, in combination, or in context to contact an individual. This information includes unique and partial identifiers such as name, address, phone number, and email address, as well as financial, employment, or other data associated with an individual. 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 7

Anonymous but not unknown. Information is anonymous when it s not personally identifiable. But digital marketers can still know a lot about an anonymous consumer. Even first-time visitors to a brand s website may reveal their IP address, browser, search history, computer configuration, and other personal information. With the right anonymous data, it s even possible to create a digital fingerprint unique to a single individual. 6 Such information doesn t constitute personally identifiable information unless it can be used to identify, locate, or contact an identifiable consumer. As visitors browse, they give a properly equipped website even more information what kind of content makes them hover, click through, bounce out, abandon shopping carts, and hundreds of other behaviors, with associated and derived measures like latency and conversion. Authenticated by permission. At the other end of the spectrum is authenticated data personally identifiable information that consumers allow brands to use. Authenticated data can be as simple as an email address or as comprehensive as an online loan application. The key is that the information uniquely identifies an individual and can be used only as that individual explicitly permits. Just as marketers may know a lot about an anonymous visitor, they may know very little about authenticated users, who may use a madeup username and disposable email address. But registration or login creates a personal relationship between a brand and a consumer one that can be very valuable if handled well. Managing the gray area. It may be easier to manage purely anonymous or authenticated relationships: Don t use or reference personally identifiable information, and don t exceed the permissions the consumer agreed to. In all cases, follow the applicable regulations, contracts, and company policies. But things get more complicated in the gray area, where permissions may be conditional, intermittent, or indirect. With an increased sensitivity to privacy, too much personalization can feel invasive. In an Adobe survey, 71 percent of consumers reported that they like receiving personalized offers, but 20 percent said these offers aren t well done, and another 20 percent felt that today s personalization efforts are too intrusive. 7 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 8

The following are some sample situations, with suggestions on how to manage them. Managing permissions. When users authenticate by logging in to a site, they grant permission for the site to treat them like a known individual, allowing them to transact, transfer money, and manage their money by name but the permissions aren t universal. Keep in mind that: Earlier unauthenticated sessions, even if they could be associated via IP address or browser history, aren t covered under the current permission. The current session prior to login can be treated as permitted. The defining case is a user who browses anonymously, then logs in to buy something, and doesn t want the shopping cart s contents to disappear. Email links followed to a site shouldn t be considered logins. They don t grant permissions to use personally identifiable information. Logins are per device logged in on the desktop doesn t mean logged in on a mobile phone and vice versa. Logging out terminates permissions to link to any personally identifiable information. It s a deliberate return to anonymous status. Using data from other providers. Companies that deal in consumer data are typically very precise about the terms for using and sharing it. Second-party providers (for example, airlines partnered with credit card companies) may share data under the permissions granted by the application or other explicit consumer opt-in. Third-party providers rent consumer identities that might include data, such as investable assets, affluence, and credit worthiness. Providers who deliver anonymous data typically forbid combining it with personally identifiable information in marketing databases or using it in marketing channels that include personal information. The best way to use third-party anonymous data is to augment existing anonymous profiles with demographic or behavioral information. Note that in late 2015, the European Court of Justice ruled that the transatlantic Safe Harbor ruling, which lets American companies use a single standard for consumer privacy and data storage in both the United States and Europe, is invalid. Since then, companies have been adjusting how they transfer personal data from Europe to non-european countries. To learn more about how the Safe Harbor ruling affects your company, read our privacy policy and responses to frequently asked questions. 8 Combining authenticated and anonymized data. Databases designed for different purposes make it easier to separate authenticated and anonymized first-, second-, and third-party data. Campaign management solutions record interactions with authenticated users and customers using firstparty and personally identifiable information. The data shouldn t be enhanced with anonymous thirdparty cookie-based data, even when it s technically possible to link them. Data management platforms (DMPs) support first-, second-, and third-party data, combining anonymized data from multiple sources for segmentation, targeting, and audience management. Centralized marketing cloud platforms allow firstparty data to be anonymized and shared across channels, including data management platforms or campaign management solutions, while managing login permissions. Anonymous first-party data can be used to enhance personally identifiable information and vice versa. Second-party data may be shared only with first-party data for targeting under express permission. Third-party data should never be combined with first-party personally identifiable information for marketing campaigns directed at identified individuals. 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 9

TIP #3 Combine DATA effectively. Here are three of the most effective ways to combine anonymous and authenticated data without infringing regulatory rules or alienating audiences. Interactions like these provide more relevant experiences, convenience, and, in some cases, monetary value. In each method, data originally collected under anonymous or authenticated conditions is used in the other domain, subject to aggregation, hashing, or other processes that preserve the protections and permissions under which the data was originally collected. By using cross-channel solutions, marketers can stitch together singular customer identities based on interactions across touchpoints to transform every customer interaction. 9 CHRISTOPHER YOUNG, Director of Financial Services Strategy ADOBE 1 Display ad targeting (authenticated to anonymous). Display ads are most cost-effective when they re precisely targeted and when a brand s customers are among the best possible targets. Anonymizing (or hashing ) the identities of authenticated customers allows the sophisticated targeting of display ads, ensuring that the highest probability purchasers see the content most likely to lead them to purchase. 2 Remarketing (anonymous to authenticated). Customers abandon applications midway through the purchase process for a variety of reasons, including concerns about costs. Remarketing treats abandoned applications as opportunities to deliver more contextual information, more attractive terms, or other incentives to acquire the prospective customer. Behavioral data from anonymous visitors can be analyzed for patterns and sequences that predict high and low purchase likelihood. Brands can apply rules from these anonymous visitors to predict which cash incentives, discounts, recommendations of related products, and other incentives will be most effective with high-value existing customers. 3 Look-alike audiences (authenticated to anonymous). To reach beyond a brand s customer base without sacrificing targeting precision, marketers can create look-alike audiences with hashed, or scrubbed, information from their marketing databases and then use audiences with similar characteristics from third-party vendors. 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 10

TIP #4 CONSIDER new technology. Complex and often discontinuous customer journeys require sophisticated tools for managing anonymous and authenticated data. While the specifics of any solution should be worked out between the brand marketer and solution provider, the following table shows what fundamental elements are included. REQUIREMENTS TECHNOLOGY BENEFITS Real-time analytics Measure and monitor performance, and predict outcomes Manage the pre-purchase (anonymous) customer journey A/B testing Optimize offers and experiences based on performance Data management platform Manage data to enhance anonymous digital experiences, such as display ads Manage the post-purchase (authenticated) customer journey Cross-channel campaign management solutions Deliver personalized experiences based on CRM, personally identifiable information, and first-party data Combine insights from anonymous and authenticated sources across all marketing contacts while managing login permissions Centralized marketing cloud technology Use one hub to manage login permissions, contractual obligations, and consumer expectations for anonymous and authenticated data 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 11

TIP #5 ELIMINATE risks. 1 What are you trying to accomplish? As we ve seen, marketers can do a lot with a defined and segmented anonymous audience. If you need personal information, how much do you really need? A complete birth date or precise location? Does a planned cross-platform campaign justify its cost and complexity, or would more focused campaigns with built-in testing do the job? Discussions about rules and contracts make data-driven marketing sound risky and may tempt some marketers to avoid it entirely. But that s a mistake one that puts brands at a competitive disadvantage and deprives consumers of personalized experiences. Of course, the details are important, but a few fundamental questions can help you put things in perspective and proceed with confidence. 2 What permissions are in effect for this particular interaction? Permission to use a consumer s name on a website doesn t imply consent to push location-dependent content to their mobile device, and permissions don t extend from one web session to the next if the user logs out. If permissions are ambiguous, redraft your opt-in language. 3 Do you tell consumers what you ll do with their data and then stick to your promises? Make sure you clearly communicate how you ll use the information you collect. Don t violate your customers trust by crossing boundaries. 4 Will an interaction be intrusive, poorly timed, or out of context? This is the creepy zone the gray area. Most marketers know it when they see it. By pinpointing the latency, frequency, and content that works best for a planned interaction, you ll discover what s too much, too often, and irrelevant. As you continue to personalize data, find ways to safely combine anonymous and authenticated information, and reevaluate the technology you ll need to be successful, remember that we re here to help you along the way. 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 12

About Adobe Marketing Cloud Adobe Marketing Cloud empowers companies to use big data to effectively reach and engage customers and prospects with highly personalized marketing content across devices and digital touchpoints. Eight tightly integrated solutions offer marketers a complete set of marketing technologies that focus on analytics, web and app experience management, testing and targeting, advertising, audience management, video, social engagement, and campaign orchestration. Learn more about creating personalized experiences with anonymous and authenticated audiences at www.adobe.com/marketing and www.adobe.com/campaign. Adobe Privacy and Security Center Learn more about privacy topics at the Adobe Privacy Center and how we re building continuous security into our Shared Cloud infrastructure. 1 Personal interview with Christopher Young, director of financial services strategy, Adobe, November 20, 2015. 2 Mind the Marketing Gap, The Economist Intelligence Unit, June 2013. 3 The Data Brokers: Selling Your Personal Information, 60 Minutes, March 9, 2014. 4 Adobe Customer Story, AXA Bank. 5 Ibid. 6 Panopticlick, Electronic Frontier Foundation. 7 Adobe Digital Index, 2015 Holiday Shopping Prediction, Adobe, 2015. 8 Adobe Safe Harbor Privacy Policy. 9 Personal interview with Young. Copyright 2016 Adobe Systems Incorporated. All rights reserved. Adobe and the Adobe logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/ or other countries. 2016 Managing anonymous and authenticated experiences across the customer lifecycle. 13