Sign up to get full access to all our latest content, research, and network for everything customer contact.

Social CRM: Policy, Privacy, Security and Protection

Add bookmark

Establishing internal policies for managing customers and clients through social CRM can be determined by a multitude of factors. Some of the most important legal variables include: individual privacy agreements; your customers’ age; the different laws of the states they reside in; and the different communication codes of practice that apply to each sovereign nation you conduct business in. Similar to how these rules and regulations govern internal and external policies for traditional CRM, your organization’s social CRM policy must also consider and implement similar rules, regulations and security requirements. In this must see session, a legal expert explores the critical ideas which will protect your organization:

  • How to develop and implement a safe, secure and compliant social CRM policy
  • Implement safeguards to protect your organization from undue liability
  • Learn from worst case scenarios of how and why social CRM privacy was breached

Establishing internal policies for managing customers and clients through social CRM can be determined by a multitude of factors. Some of the most important legal variables include: individual privacy agreements; your customers’ age; the different laws of the states they reside in; and the different communication codes of practice that apply to each sovereign nation you conduct business in. Similar to how these rules and regulations govern internal and external policies for traditional CRM, your organization’s social CRM policy must also consider and implement similar rules, regulations and security requirements. In this must see session, a legal expert explores the critical ideas which will protect your organization:

  • How to develop and implement a safe, secure and compliant social CRM policy
  • Implement safeguards to protect your organization from undue liability
  • Learn from worst case scenarios of how and why social CRM privacy was breached

Tags: CMIQ

RECOMMENDED