Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

ContactCenterWorld.com

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used

Twitter

Facebook

LinkedIn

Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used

LinkedIn

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

OK
[HIDE]

Here are some suggested Connections for you! - Log in to start networking.

EXECUTIVE MEMBER
Sefanaia Silimaibau
Supervisor Quality Assurance & Trainer
276
MEMBER
Thamer Noori
Director of Industrial Security and Safety Dept.
35
MEMBER
Richard Kimber
CEO and Founder
3
MEMBER
Suman Deep
Technical Architect
1

Industry Research : The Power of Metadata Realized by the UK Government

 

Commenting on the furore surrounding the UK Government’s plans to require ISPs and telcos to store all available information on emails, texts, phone calls and web history, Varonis Systems says that the Government is clearly becoming aware of the incredible power of metadata.

David Gibson, director of strategy with the data governance specialist, says that the data the Government is hoping to tap – and allow access by law enforcement officials – is known as descriptive metadata. It is now technically realistic to capture and meaningfully analyse metadata despite the large volumes of raw data that will be generated by the 52.7 million or so UK citizens as they go about their digital world.

"By generating and storing descriptive metadata on people’s digital activities, the government can conceivably profile an enormous number of users, and then take a closer look at specific individuals when necessary. What I find fascinating, however, is how we’re realising the power of metadata, how valuable it is, and how much people feel threatened by the Government’s use of it: who they are communicating with and how often, which sites they are accessing and who they are calling/texting," he added.

The Varonis director of strategy went on to say that the data governance and storage requirements that the Government is planning to impose on ISPs and CSPs is a reflection of a greater understanding amongst business professionals that metadata is the key to better management and protection of their digital data assets.

It is also, he explained, the key to a more efficient and smarter organisation: one that knows where its data is, who is accessing it and what is happening to it, at all times. This goes way beyond IT security and into the realms of data governance and intelligent digital collaboration.

Against this backdrop, he says, it’s no wonder that the Government is also becoming interested in metadata, although it is useful to understand that there may be a question mark about who actually has the rights to access data on specific members of the public.

Some experts would argue, says Gibson, that metadata generated on behalf of an organisation by its employees is fair game for the organisation to capture and analyse, but it’s an open question about who owns - and should be able to make use of - the metadata generated by citizens in their normal day-to-day digital life.

The Government, he adds, has made it clear that some information must be protected and private, as witnessed by the introduction and enhancement of privacy legislation and laws on medical records, so you have to ask why metadata is not subject to similar levels of protection.

A key example of this, says Gibson, is the intelligent interpretation and extrapolation of metadata:

Whilst a celebrity might request their medical records be sealed to protect their privacy, if their phone metadata shows they made repeated calls to a specialist in a particular type of disease, it’s relatively easy to work out what health problem the celebrity may be suffering from.

The power of metadata association, he notes, is one of the reasons why IT professionals are looking at metadata framework technology to better understand how their organisation uses data, what data may be sensitive, and where it may need to be locked down—as well as to keep the metadata safe in a trusted system. When metadata is allied with content, the results can be devastatingly accurate.

45 per cent of Internet users use a mobile phone to connect to the Internet

6 million people accessed the Internet over their mobile phone for the first time in the previous 12 months

The use of wireless hotspots almost doubled in the previous 12 months to 4.9 million users

21 per cent of Internet users did not believe their skills were sufficient to protect their personal data

77 per cent of households had Internet access

"Those organisations that have not yet harnessed the power of metadata are blissfully unaware of what is happening to their data - both on a real-time and historical basis - so the introduction of new data retention and indexing requirements in the Queen's Speech is going to be game-changer for many companies," he said.






Today's Tip of the Day - 100% Recording

Read today's tip or listen to it on podcast.

Published: Friday, April 13, 2012

Printer Friendly Version Printer friendly version

2024 Buyers Guide Automated Call Distributors

 
1.) 
Premium Listing
Call Center Studio

Call Center Studio
Call Center Studio is the world’s first call center built on Google and is one of the most secure and stable systems with some of the industry’s best reporting. It is one of the most full-featured enterprise grade systems (with the most calling features, one of the best call distribution, outbound dialing features and integrations—including IVR, AI Speech Recognition, blended inbound/outbound calling and includes Google’s new Dialogflow and Speech API. Call Center Studio is the absolute easiest to use (with a 10 minute setup), and is the price performance leader with lower equipment cost and less setup time.


2.) 
Teckinfo Solutions Pvt. Ltd.

InterDialog UCCS
InterDialog UCCS inbound call center software caters to all incoming customer requests. These incoming requests can come through any channel of customer’s choice e.g. voice, video, email, chat, WhatsApp, facebook etc.. company page or from an integrated website chat. Using InterDailog UCCS call centers can respond to inquiries of the customers and they can also register the complaints of customer as a customer support desk.
 

About us - in 60 seconds!

Submit Event

Upcoming Events

The 19th AMERICAS Annual Best Practices Conferences are here! Meeting Point for the World's Best Contact Center & CX Companies Read More...
 34203 
Showing 1 - 1 of 3 items

Newsletter Registration

Please check to agree to be placed on the eNewsletter mailing list.

Industry Champion Award Leaderboard

Most active award entrants in the past 48 hours! - Vote for Others / About Program
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
CMS =
session cookie set = True
session page-view-total = 1
session page-view-total = 1
applicaiton blnAwardsClosed = True
session blnCompletedAwardInterestPopup = False
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =