Page 477 - Handbook of Modern Telecommunications
P. 477

4-8                     CRC Handbook of Modern Telecommunications, Second Edition

            organizations also understand that bad statements display a clean image, are uncluttered and might
            appear attractive, but with key information missing, sequence awry, and the what-to-do-next hidden,
            readers will struggle with this form, may default to expensive dialogs with customer service, probably
            make mistakes with responses or payments, and generally wish they had chosen another product. The
            good gets it right—the correct information is in the right order, important messages are highlighted, it
            is easy to read and remains uncluttered.
              Design is an important aspect of creating a good document, but only if as much attention is paid to
            the content as well. It is the combination of the two that results in spectacular output. The following is
            advice for creating good documents (BROD06):

              •   Contact information: Ensure that contact details are clearly indicated. Position them in their
                 own section on the page and distinguish between general customer service and specific contacts,
                 if necessary. Keep corporate addresses well hidden if you do not want your customers to call.
                 Remember, make it easy to contact the right number, the first time.
              •   Key information: Any key information should be highlighted so that it stands out from the rest of
                 the text or numbers. This can apply to dates for payment, amounts, call numbers, advantages of
                 responding, and even the consequences of not responding. Tools are available, such as embolden-
                 ing, italicizing, increasing font size, decreasing font size, white space, and color.
              •   Sequence: Get the information into the right sequence; otherwise, you will annoy those who have to
                 follow it. They will make mistakes, liabilities will be tested, and there will be no repeat business.
              •   Educational messages: Take a little more time to explain to the readers what certain terms mean,
                 or what various options are open to them, or what to do next. It saves time, improves the customer
                 service, and preempts calls, which can cost a lot.
              •   Focused messages: If possible, address the customer using personalization. Identify the customer.
                 Target by age, ethnicity, marital status, and geography for a more focused message, and you will
                 get a more focused response.
              •   Corporate identity: There is no reason why the elements of a corporate identity cannot be incor-
                 porated in company statements and invoices, which will be seen by many more customers. Select
                 the right fonts and logo. Altogether, apply the same rigors to your variable data documents as you
                 do to the offset material so that the output will look inviting.
            4.1.3.2  Data Leak Prevention
            In most enterprises, there are several access control mechanisms, such as firewalls, encryption, permis-
            sion, and access control lists. But data and information still get lost due to authorized users. Data leak
            prevention products give IT visibility into where protected data rest and how it moves through the enter-
            prise, letting organizations make informed choices about security infrastructure implementations. But
            they may also create a honey pot of sorts, so access to them must be closely monitored. Businesses will
            benefit from the ability to enforce policy proactively, and these products provide significant regulatory
            compliance solution alternatives. But they may become data bottlenecks at the perimeter as policy viola-
            tions are quarantined until somebody responds and releases these violations. Prevention policies and
            tools protect intellectual property, a vital part of any organization, but one that varies by company.
              New research indicates that while most companies are investing in technology and policy to secure
            sensitive data from attacks, the threat of data loss at the hands of their own employees is what should
            have the attention of most companies. In addition to severely damaging a company’s reputation, leaked
            customer or corporate data can potentially result in legal action if the business violates regulations.
              Information today flows through and beyond organizations more easily than ever before. Content is
            proliferating at an amazing rate; the volume of unstructured business content is estimated as doubling
            every three months. Relying on end users to enforce information retention and security policies is no
            longer sufficient. The leakage of privacy-sensitive personal information has been shown to have signifi-
            cant negative consequences on an organization’s brand, reputation, and customer trust as well as legal,
   472   473   474   475   476   477   478   479   480   481   482