Customer Relationship Management At Nordstrom

Improved Essays
Customer Relationship Management in its purest form is good for both businesses and customers. It is the act of establishing and contributing to a relationship that is beneficial to both. The customer feels acknowledged and appreciated and the business cultivates loyalty and is better able to sell its wares.
In order for this relationship to be created customer data must be gathered and analyzed. A few years ago, I won’t say how many, I worked at Nordstrom as a salesperson. The culture was very customer-centric and each salesperson was asked to keep a personal book with a record for each customer including their name, address, phone number, purchases, size, likes and dislikes and special days. These books were like gold. Whenever one of
…show more content…
A customer should have the right to decide what information they are comfortable providing. A company crosses the line when they decide to sell personal information to companies that have no relationship with their customer. It seems the selling of information is pervasive. I receive privacy letters from many different types of companies that I do business with - my mortgage company, my bank as well as various retailers explaining that they sell my information to third parties. I can call or write a letter to opt out but I often times wonder how far my information has gone before I ever received the notice. Why is it standard procedure to sell my information? Why do we need to opt out instead of opt in? I believe the answer is that big data is big business, not only for the companies gathering and selling information but also for data brokers whose sole purpose is to purchase, package and resell consumer information. Companies should be transparent in their plan for disseminating information from the onset of a relationship so consumers can decide if they are willing to trade their information for the products and services …show more content…
Our customer’s information was kept private and hopefully secure though I do not know the details on how that was accomplished. I choose not to work for a company that sells customer’s private information. If I were in charge of marketing communications for a company I would make it clear to my customers that their information was stored in a safe manner and that it was never sold to others. I believe this is something that would be seen as added value and would increase customer loyalty. I also believe this means I will not be working for a fortune 500 company but that is alright with me. I agree with Privacy.org’s slogan, “Privacy is a right, not a

Related Documents

  • Improved Essays

    Case Study: Nordstrom

    • 841 Words
    • 4 Pages

    Retailers play a very important role in delivering products and services to the final consumers. Within this this role, retailers must possess the ability to target a segment of the market through different product offerings and product differentiation. By looking at Nordstrom’s marketing mix and specifically product, customer service, and store design, one can see how they utilize different strategies to create competitive advantages within the market. Nordstrom, as a high-end department store, chooses to carry a smaller product line with a wide assortment of high end merchandise.…

    • 841 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    To oversimplify, matters surrounding privacy can be color coded. There are some issues that are very black and white related to the need to “violate” privacy. However, there are also quite a few gray areas where more research needs to be conducted and statistics gathered to formulate guidelines to determine when it is indeed necessary. Privacy in general needs to be treated in a way that is different from other rights and based on the serious consequences of not revealing facts that would be considered “private”.…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Nordstrom was built on the founding philosophy: “offer the customer the best possible service, selection, quality, and value.” To this day, the company still continues to operate under these standards, and to go above and beyond for their customers. The most successful retail strategy that Nordstrom employs is, of course, their outstanding customer service. It is unmatched among retailers and has made them a staple in the world of fashion retail. Another one of Nordstrom’s most successful retail strategies is their expansion into outlet business, both in-store and online.…

    • 303 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Argument Analysis: Alfred Edmond Jr. In Alfred Edmond Jr’s “Why Asking for a Job Applicant’s Facebook Password Is Fair Game,” Edmond explains his reasoning behind why he thinks that employers should be able to ask for the social media passwords for the applicant’s accounts. In his article Edmond argues the case that an employer should be able to ask a job applicant for their Facebook password as a consideration for employment from a prospective employee. Edmond raises some valid points about asking for an employee’s Facebook password, however his some of his supporting points do not connect to his main argument and his argument suffers as a whole because of it.…

    • 1331 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    The Equifax disaster points to a much bigger problem. -Rhetorical Analysis This is a rhetorical analysis of the article “The Equifax disaster points to a much bigger problem” written by Herbert Lin. Let us start with the writer himself; he is a senior research scholar for cyber policy and security at the Center for International Security and Cooperation (CISAC) and Hank J. Holland fellow in Cyber policy and Security at the Hoover Institution both of which are located at Stanford University.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    This Generation of society has no boundary on privacy, with social media and connecting through technology more, It is much easier for private/personal information to get out and into the wrong hands. According to Boonsri Dickinson, a researcher for ZDNet states that “The popular social media feed Facebook, got three clever criminals in New Hampshire a lot of loot. They checked on Facebook to when people weren't home, and being the holiday season leaving their incoming gifts vulnerable. Just after 18 homes they accumulate $100,000-$200,000 dollars in stolen goods”(Dickinson) . All because people allowed themselves to be vulnerable!…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    1.1 Describe the importance of developing relationships with customers Having a good rapport with your customers is extremely important for the success of any company. Having a solid relationship with your customers can help ensure that the business continues to progress and remain successful. A good way to develop a solid relationship with your customers is to reward loyalty, by simply sending a thank you note or a money off voucher can help to build and maintain brand loyalty, it also helps to introduce incentives such as a customer loyalty program as it will help to entice customers to return.…

    • 1142 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    An expansionary policy Act signed during the 80’s that is still in place today is the Monetary Control Act of 1980. This Act consisted of 2 parts, which also includes the Depositary Institution Deregulation of 1980. Prior to the approval of this act, only the banks associated with the Federal Reserve were mandated to report deposits from the public and had a regulated interest rate, which placed them at a huge disadvantage due to the fact that the public was opting towards mutual funds in order to increase savings. As mentioned in the World Public Library (2016), the approval of this Act allowed for all the banks in the nation to report deposits, to charge any interest for loans and increased the deposit insurance from $40,000 to $100,000.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    P1 – The impacts that different types of threats have on an organisation Technical Failure A technical failure can be caused for many different situations. Most devices will fail at some point because of some kind of error. There are certain measures that can be put into place to avoid these errors from occurring more often. Such as the training of staff of the device they are using so these issues will become less common and then they will also be to most likely solve the problem also.…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Hi Lance, I'm strongly agree with your ideas that consumer surveillance takes away the privacy and personal interests of consumers. Even though it's a way to calculate how and what consumer like the most so that they could learn and changes their products, make their products richer, more consumer-friendly. Like you suggest, I think this is a good idea to protect us, customer rights, " surveillance of customers there must be a boundary to the surveillance, such as blurring out individual's faces, as the right of privacy to each customer must be protected. Also, customers may or may not feel safe or trust the company they shop at.". Watching customers to reports details will make them feel awkward, and feel pressure to shop.…

    • 147 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    This can cause issues with keeping information about oneself private and may even lead to certain, critical information being leaked out onto the internet. As Dr. Robert Howell put it in an online article, “Providing the third party access to the detailed customer data would, again, be a violation of privacy rights. This area is very tricky, as individual customers provide, and lose control of, their individual data, and it only takes an individual or small group to use such data inappropriately” (https://www.wsj.com/articles/should-companies-profit-by-selling-customers8217-data-1382635260). So, it's possible then for a person to do an untold amount of cyber-stalking, using personal data gathered off the internet to find exactly where people have been and where they go the most, what route they took to get there, or even phone numbers of relatives, friends, and coworkers. There is an ample amount of information that can be found on the internet and there is no good way of knowing who wants it and is going to use it maliciously.…

    • 1266 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Through this day and age, if a company does not have a business software application, they are either falling behind or non-existent. Whether it is a Decision Support System or Supply Chain Management, having some sort of business software application is critical for a company’s success. Through research, we found that the Marriott Hotels use Customer Relationship Management in order to achieve success within their company. It all began with an A&W root beer stand. Founder J. Willard Marriott and his wife, Alice, got their young business off during Washington D.C.’s hot, muggy summers.…

    • 771 Words
    • 4 Pages
    Improved Essays