The Impact of Privacy on HP s Customer Relationship Management Solution

Similar documents
HP Heritage 6/17/2003. Digital Equipment Corp Ken Olsen Harlan Anderson. Hewlett-Packard Bill Hewlett Dave Packard

Printing and Personal Systems

Data Management and Security in the GDPR Era

Environmental Sustainability

Security as a Service (Implementation Guides) Research Sponsorship

SAP: Speeding GRC Control Testing by 90% with SAP Solutions for GRC

ISO/ IEC (ITSM) Certification Roadmap

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats

Symantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

Mastering The Endpoint

TechValidate Survey Report: SaaS Application Trends and Challenges

REINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS

Washington State Emergency Management Association (WSEMA) Olympia, WA

SanDisk Enterprise Storage Solutions

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

Virident Acquisition. September 9, WESTERN DIGITAL CORPORATION. ALL RIGHTS RESERVED..

OpenText Buys Guidance Software

J.P. Morgan Healthcare Conference Investor Presentation Matt Wallach, President & Co-Founder January 14, Veeva Systems veeva.

Symantec Data Center Transformation

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

Workday s Robust Privacy Program

Modern Compute Is The Foundation For Your IT Transformation

HPE to Acquire Nimble Storage

The Deloitte-NASCIO Cybersecurity Study Insights from

A C H I E V E B O T H W I T H K E Y S I G H T. Company Profile

Enabling a Multicloud World. Kip Compton VP, Cloud Platform & Solutions Group December 4,

20 years of Lotus Notes and a look into the next 20 years Lotusphere Comes To You

OVERVIEW BROCHURE GRC. When you have to be right

in Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM

A Global Look at IT Audit Best Practices

CCSK Research Sponsorship

2017/SOM3/DIA/007 Digital Trade Building Blocks

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA

Nokia Conference Call 1Q 2012 Financial Results

Securing Your Most Sensitive Data

Grid Modernization in New York: The Role of New Technologies and Early Lessons Learned

Government IT Modernization and the Adoption of Hybrid Cloud

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Handling Complex and Difficult Privacy and Information Security Issues

Towards an integrated regulation platform in Luxembourg. Information Security Education Day th of april

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Embedding Privacy by Design

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

Connecting Business Opportunities in A Better Way

Data Privacy Corporate Responsibility in Multi Polar World

Enabling the Always-On Enterprise

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

Oracle Buys Automated Applications Controls Leader LogicalApps

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Fact Or Fiction: The State Of GDPR Compliance

IDC MarketScape: Worldwide Security Solutions and Services Hardcopy 2017 Vendor Assessment

BlackBerry to Acquire Cylance

2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly

Organizational Readiness for Digital Transformation

Leadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION TO 2019

NetApp Private Storage for Cloud: Solving the issues of cloud data privacy and data sovereignty

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide

April 7, HP and Sustainability: Global Citizenship to Grassroots Greening. HP and Global Citizenship. Company Information.

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

General Data Protection Regulation (GDPR) The impact of doing business in Asia

Optimisation drives digital transformation

Cybersecurity. Securely enabling transformation and change

BUILD BETTER MICROSOFT SQL SERVER SOLUTIONS Sales Conversation Card

HP and Open Innovation: ups and downs

Innovation Infrastructure Partnership

GFI has tens of thousands of customers worldwide and distribution is served by a 10,000-strong Channel.

Operationalize Security To Secure Your Data Perimeter

Data Governance: Data Usage Labeling and Enforcement in Adobe Cloud Platform

IDC MarketScape: Worldwide Cloud Professional Services 2018 Vendor Assessment

Jeff Wilbur VP Marketing Iconix

NOKIA FINANCIAL RESULTS Q3 / 2012

Mobile Data Security Essentials for Your Changing, Growing Workforce

IBM Internet Security Systems October Market Intelligence Brief

10 Cloud Myths Demystified

Overview. Business value

Protecting your data. EY s approach to data privacy and information security

Software Defined Storage

Five Steps to Faster Data Classification

CIPP/E CIPT. Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification

Benefits of Open Cross Border Data Flows

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Green Governance Growth

Rethinking Information Security Risk Management CRM002

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Financial Results for the Three Months Ended June 30, August 7, 2018

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

Data Breach Preparation and Response. April 21, 2017

Quarterly Quarterly Rep ort eport

Cloud28+ Compliance in Cross Border Business

Reinvention and Transformation in Personal Systems March 22,

Byambarinchin,Baigalikhuu Shi,Qionghua(Jessie) Dong,Xia(Joanna) Liang,Yushan(Elsie) Ma,Liyi(Vita)

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

Colocation Enabler for Hybrid and Multi Cloud Solutions. Toan Nguyen, Director Business Development & Cloud Platform, e-shelter services GmbH

Transcription:

The Impact of Privacy on HP s Customer Relationship Management Solution Mike Overly Vice President, Marketing hp 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

HP today 4Q segment revenue percentage* ESG IPG record performance $6.2B 11% growth industry leader every business, every region Imaging & Printing Enterprise Systems 31.2% 20.6% HP Services Personal Systems PSG 30.1% execution and innovation $6.1B 19% growth grew faster than US market (IDC) September 16th Version $4.1B 2% growth #1 in servers #1 in storage 16.1% HPFS HPS on demand capabilities 2.0% $3.2B 5% growth #3 worldwide IT service provider Source: HP Security Analyst Meeting, 12/09/2003 page 2

HP Strategy: Reliable innovation at a price our customers can afford, delivered with an experience that sets us apart. Enhance customer focus High-tech Low-cost Accelerate growth Best customer experience Simplify our organization for speed and effectiveness HP s CRM Objective Dramatically simplify our global business CRM ecosystem to: Deliver an improved, consistent customer experience; Increase sales and accelerate revenue growth; Improve organizational agility and effectiveness; Reduce cost-to-serve. page 3

HP s global CRM framework: our vision, approach & focus CRM Vision CRM Global Capability Framework Provide business customers an industry-leading experience Approach Build a cohesive, integrated CRM ecosystem to turn basic data into rich customer insight (see, know, anticipate) Lead Management Marketing Contact Centers Outside Sales Customer Knowledge Management page 4

Business drivers for promoting privacy Minimizes risk of compliance breach or regulatory investigation and costs Builds the brand Enhances consumer and employee trust Reinforces global citizenship customer community employee shareholder page 5

Highlighting leadership HP Sponsored Privacy Innovation Award First Awards given to E-Bay and Alberta CIO in October 2003 Recent Privacy Awards given to HP #1 among 100 U.S. companies for online customer respect and experience, July 2003 Customer Respect Group #1 for online customer respect, High Technology Sector, April 2004 and April 2003 Customer Respect Group Among top 3, Fortune 100 Privacy Leaders, June 2003 Computerworld Magazine page 6

Current Privacy Environment Customers Expect robust privacy policies and compliance practices when they give their personal data to HP. Emerging requirement in customer bids & managed services. Competitors Many are investing in and using privacy as a competitive differentiator, while others ignore the issue at their risk. Employees Expect strong privacy protections, especially in EMEA. Government Regulators Enforcement actions are increasing globally; we have legal obligations through our participation in Safe Harbor. Mistrust of pervasive use of technologies driving increased level of local and national regulations. NGOs Privacy viewed as human rights/civil rights issue in many parts of the world. Advocates and NGOs are knowledgeable, organized, drive press coverage, enforcement actions, and are well connected to regulators. Press Media is consistently pro-privacy and assume worst of business motives. page 7

Global Privacy Policy Framework Values Standards of Business Conduct Benchmarking Principles Customer Policy Employee Policy Privacy Rulebook Self Assessment Tools Specialized Training IT and Business Process checklist Contractual devices & model clauses Risk Assessment Web monitoring Internal Audit Framework Measure & Report Review & Remediation Training and Communication Master Global Policies (Safe Harbor) Design for Privacy Implementation Standards and Tools Compliance Management page 8

HP logo page 9