Filling in the Empty Space – The Personal Data Store

I said here that at present there are very few genuine VRM tools available right for use right now, and that the main reason for that is that the underlying plumbing is not yet in place at any kind of scale. By ‘plumbing’, I mean that ‘personal data stores’ and all that they imply are […]

Sales Process… meet Buying Process; and why context trumps segmentation

I’ve been doing some thinking in advance of getting stuck into the development of open standards for User Driven and Volunteered Personal Information. That work is being done here if you are interested in joining in. I’ve been thinking mainly about how best to explain what happens to buying processes and sales processes when volunteered […]

Who Said Privacy Was Dead…..?

BT decides against deploying Phorm behavioural tracking. The mobile phone directory Connectivity/ 118800 shut down by pressure from individuals who did not want their details scraped and published. Facebook found to be in breach of Canadian Privacy law. So, what have Phorm, Connectivity and Facebook got in common? Referring back to the Personal Data Eco-system […]

The Information Masters (not)

This post by Jerry Fishenden on Government IT spend made me think  back to the Information Masters research and book led way back in 1999 by my sometime consulting colleague John McKean. I find it bemusing and a bit depressing that despite this excellent piece of research, and the associated research having been around now […]

Volunteered Personal Information – Dominant Marketing Paradigm by 2015…

(Cross post from Right Side Up) Here’s an interesting presentation given to the Direct Marketing Association annual Privacy and Data Protection conference last week by Marc Dautlich of Olswang, the lawyers who are advising the Mydex CIC. The whole deck is useful to those of us interested in privacy and data protection, but the concluding […]

Hard Re-set Required for Direct Marketing to Re-invent Itself

(Cross post from Right Side Up) As a buyer of far too many computing gadgets over the years, I’ve become very familiar with the term ‘hard re-set’. This is typically used to describe a situation in which a system has got its inner workings so tied up in knots that the only way to fix […]