{"id":25555,"date":"2023-01-25T08:30:09","date_gmt":"2023-01-25T08:30:09","guid":{"rendered":"\/gb\/en\/blog\/?p=25555"},"modified":"2025-05-29T09:51:57","modified_gmt":"2025-05-29T08:51:57","slug":"interview-with-paola-zeni","status":"publish","type":"post","link":"\/gb\/en\/blog\/interview-with-paola-zeni\/","title":{"rendered":"\u200b\u200bRingside: Insider Interview with Paola Zeni, Chief Privacy Officer"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Data is now everyone\u2019s business. It\u2019s become intrinsic to almost every department of every organisation. But as the amount of data collected and processed has skyrocketed, so too have privacy concerns and data breaches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this edition of Ringside, we\u2019re talking to Paola Zeni, RingCentral\u2019s Chief Privacy Officer, to get an expert view on these challenges, and to find out what organisations can do to protect themselves.<\/span><\/p>\n<h2 id=\"field\"><b>What led you into the field of data privacy?<\/b><\/h2>\n<p>I started as an attorney in Europe. I used to work for Hewlett-Packard, and then for Agilent Technologies. In my role, I dealt with all kinds of legal issues, from HR to corporate governance, to commercial contracts.<\/p>\n<p>When privacy started becoming important in Europe in the &#8217;90s (because of the Data Protection Directive, which was being implemented in a number of member states, including Italy), I needed to understand what the law was. I realised immediately that it was both legally interesting and complex, and it got me to work with everybody across the organisation. I really enjoyed that. I&#8217;m an extrovert, and I like the relationship part of work. I am also curious, and I liked the cross-functional aspect of privacy, which led me to work with a lot of different teams across the company.<\/p>\n<blockquote><p>While I was becoming more knowledgeable about privacy, the topic grew in relevance and impact. It became critical because every business process became data-intensive, and the technology for data processing continued to develop.<\/p><\/blockquote>\n<p>Companies started having more and more complex situations regarding data, and the laws kept coming. In the early &#8217;00s, when I started working in the United States, I had my first full-time privacy job, and I&#8217;ve been doing privacy ever since.<\/p>\n<h2 id=\"challenges\"><b>What are the biggest challenges for CPOs today?<\/b><\/h2>\n<p>The biggest challenges come from the fact that most businesses operate on a global scale \u2013 which means that data flows across borders and is managed globally \u2013 while laws and regulations are local.<\/p>\n<p>Another challenge is (as I mentioned) that laws continue to develop. For instance, in 2023 alone, we have multiple US state privacy laws coming into force. Now we have a law in California, a different one in Virginia, and others in Colorado and Connecticut. More state laws are coming, which will bring additional complexity. In Europe, the legal situation is more homogeneous because of the European Union and GDPR. However, member states still have their own laws and regulations that overlap and may have different approaches to enforcing privacy law.<\/p>\n<blockquote><p>Our capacity and ability to ingest data and process large amounts of data (as companies) is growing every day.<\/p><\/blockquote>\n<p>The evolution is quick, while the laws that have been approved years back take a long time to change, and sometimes regulators struggle to understand technology.<\/p>\n<h2 id=\"advice\"><b>What advice would you give to CPOs and CISOs to handle these challenges?<\/b><\/h2>\n<p><span data-preserver-spaces=\"true\">A CPO&#8217;s first objective is always to ensure that customers trust us with their data. Customers are our first constituents. What I&#8217;ve found very valuable in my career is to always think about making your privacy and security best practices visible to customers and the marketplace. So I would say, when you develop a privacy programme internally, (developing and operationalising privacy compliance and best practices) combine this with the outward-facing approach. The outward method involves generating collateral and thinking about what could be useful for customers and partners.\u00a0<\/span><\/p>\n<blockquote><p><span data-preserver-spaces=\"true\">For instance, at RingCentral, we have a<\/span><span data-preserver-spaces=\"true\">\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.ringcentral.com\/gb\/en\/trust-centre\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Trust Centre,<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0which I established when I joined. We continue to add material to that \u2013 not only information about legal requirements but also information about how we process data. We use information and transparency to generate trust.\u00a0<\/span><\/p><\/blockquote>\n<p><span data-preserver-spaces=\"true\">The other critical component of the CPO role is internally being an influencer. Because, for a number of people, privacy is just one more problem, one more thing to do, it is important to connect privacy with the value for the business. For example, explain and show that if we do privacy well, it will be easier for us to negotiate contracts and establish partnerships. This is about showing the business benefit and the ROI.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Finally, hire the right people and nurture them! There&#8217;s so much hunger for expertise in this area, and it&#8217;s a really good career opportunity for people.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\r\n\t\r\n\t<div class=\"rc-post-content-cta rc-post-content-cta_orange\">\r\n\t\t<div class=\"rc-post-content-cta-columns\">\r\n\t\t\t<div class=\"bottom-cta-img\">\r\n\t\t\t\t<img decoding=\"async\" width=\"805\" height=\"424\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security.png\" class=\"responsive-image\" alt=\"A diagram showing how RingCentral security infrastructure works\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security.png 805w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-300x158.png 300w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-640x337.png 640w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-768x405.png 768w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-790x415.png 790w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-376x198.png 376w\" sizes=\"(max-width: 805px) 100vw, 805px\" \/>\t\t\t<\/div>\r\n\t\t\t<div class=\"bottom-cta-copy\">\r\n\t\t\t\t<div class=\"headline-copy\" style=\"text-align:left;\">Learn about the essential security, data privacy and compliance requirements for your trusted UCaaS platform.<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t<div class=\"rc-post-content-cta-footer\">\r\n\t\t\t<div class=\"bottom-cta-logo-container\">\r\n\t\t\t\t<div class=\"bottom-cta-logo\"><span aria-hidden=\"true\"><svg width=\"154\" height=\"34\" viewBox=\"0 0 154 34\"\r\n\t\t\t\t\t\t\tfill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-logo-842655792\"\r\n\t\t\t\t\t\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t\t\t<title id=\"cta-ring-logo-842655792\">Ring Central Logo<\/title>\r\n\t\t\t\t\t\t\t<path d=\"M154 3.89618H150.386V26.9657H154V3.89618Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M141.313 11.6299C137.976 11.6299 135.388 13.2501 134.95 16.5546H138.504C138.754 15.3082 139.675 14.5591 141.313 14.5591C143.214 14.5591 144.086 15.6499 144.086 17.3647V18.1444H140.438C137.078 18.1444 134.593 19.6411 134.593 22.697C134.593 25.7529 136.619 27.3411 139.55 27.3411C141.826 27.3411 143.323 26.3721 144.133 24.8145H144.288V26.9529H147.716V17.4802C147.702 13.8276 145.833 11.6299 141.313 11.6299ZM140.58 24.5675C139.177 24.5675 138.303 23.8809 138.303 22.7339C138.303 21.4233 139.238 20.7383 140.921 20.7383H144.069L144.086 20.9549C144.088 23.2232 142.777 24.5675 140.58 24.5675Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M128.187 26.9657V19.2047C128.187 16.8979 129.623 15.4317 131.896 15.4317H133.321V12.0036H131.854C130.14 12.0036 128.893 12.6581 128.114 14.1243H127.988V12.0036H124.591V26.9753L128.187 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M122.295 23.6627V26.9657H119.833C116.371 26.9657 114.47 25.3615 114.47 21.8997V14.9729H112.008V12.0036H114.47V8.03009H118.088V12.002H122.295V14.9713H118.088V21.4794C118.088 22.851 118.898 23.6611 120.269 23.6611H122.295V23.6627Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M100.161 26.9657V18.3C100.161 16.1793 101.472 14.7917 103.589 14.7917C105.615 14.7917 106.831 15.9627 106.831 18.2535V26.9657H110.452V17.6776C110.452 13.9046 108.618 11.6299 104.872 11.6299C102.593 11.6299 100.851 12.6565 100.073 14.0586H99.9444V12.0036H96.5548V26.9753L100.161 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M86.8688 24.3814C84.5925 24.3814 83.0638 22.8542 83.0028 20.4528H94.0699L94.0539 19.2833C94.0539 14.2655 90.8119 11.6443 86.8512 11.6443C82.5729 11.6443 79.448 14.7002 79.448 19.4999C79.448 24.2996 82.3483 27.3555 86.8512 27.3555C90.6226 27.3555 93.085 25.3599 93.802 22.4291H90.2986C89.9103 23.5536 88.9559 24.3814 86.8688 24.3814ZM86.8544 14.6377C89.2222 14.6377 90.6258 15.9787 90.7204 17.8492H82.99C83.3317 15.9483 84.4834 14.6377 86.8544 14.6377Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M68.631 27.3732C74.0243 27.3732 77.0802 24.3814 77.7973 19.9395H74.1301C73.5863 21.9655 72.1105 23.836 68.6294 23.836C65.0457 23.836 62.1759 21.3912 62.1759 16.0413C62.1759 10.6914 65.0457 8.2531 68.6294 8.2531C72.2132 8.2531 73.6505 10.1236 74.1301 12.1191H77.7973C77.2037 7.6756 74.1943 4.7865 68.631 4.7865C62.6459 4.7865 58.313 8.96375 58.313 16.0927C58.313 23.2216 62.6459 27.3988 68.631 27.3988V27.3732Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M52.437 12.0036V14.0569H52.2654C51.4553 12.6244 49.7725 11.6282 47.3759 11.6282C43.8676 11.6282 40.7057 14.4034 40.7057 19.2978C40.7057 24.1921 43.8226 26.9978 47.3759 26.9978C49.6827 26.9978 51.043 26.0593 52.0841 24.4712H52.2493V27.625C52.2493 29.3078 51.3141 30.0874 49.7869 30.0874H42.4543V33.3085H49.718C53.7396 33.3085 55.8908 31.0627 55.8908 27.3844V12.0036H52.437ZM48.3689 23.7237C45.9674 23.7237 44.4402 22.2302 44.4402 19.2994C44.4402 16.3685 45.953 14.8719 48.3689 14.8719C50.7061 14.8719 52.2654 16.3653 52.2654 19.2994C52.2654 22.2334 50.7222 23.7237 48.3689 23.7237Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M28.2125 26.9657V18.3C28.2125 16.1793 29.5231 14.7917 31.6438 14.7917C33.6698 14.7917 34.8858 15.9627 34.8858 18.2535V26.9657H38.5V17.6776C38.5 13.9046 36.6664 11.6299 32.9207 11.6299C30.6444 11.6299 28.8846 12.6565 28.105 14.0586H27.9799V12.0036H24.5967V26.9753L28.2125 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path d=\"M21.5423 12.0036H17.9282V26.9673H21.5423V12.0036Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M11.6302 16.6477V16.5017C13.8424 15.8905 15.339 14.4051 15.339 11.0684C15.339 7.64031 12.782 5.14423 8.04169 5.14423H0V26.9657H3.73931V18.3H8.29354C10.4143 18.3 11.4746 19.3604 11.4746 21.4811V26.9817H15.2139V21.4811C15.2139 18.3946 13.9033 17.1482 11.6302 16.6477ZM7.84117 14.9329H3.73931V8.51618H7.83956C9.86562 8.51618 11.4233 9.35998 11.4233 11.7277C11.4233 14.0955 9.85119 14.9329 7.84117 14.9329Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M19.7329 9.60219C20.2077 9.60219 20.6729 9.46262 21.0676 9.19794C21.4638 8.93485 21.7718 8.55948 21.9531 8.11994C22.1359 7.68039 22.1824 7.19754 22.091 6.73233C21.998 6.26552 21.7702 5.83721 21.4333 5.50194C21.0964 5.16506 20.6697 4.93727 20.2029 4.84423C19.7361 4.75119 19.2532 4.79931 18.8153 4.98219C18.3758 5.16506 18.002 5.47306 17.7373 5.86769C17.4742 6.26231 17.333 6.72752 17.3347 7.20235C17.3298 7.67879 17.4694 8.144 17.7325 8.54023C17.9956 8.93646 18.3726 9.24446 18.8137 9.42412C19.1041 9.54604 19.4169 9.6054 19.7329 9.60219Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M16.9769 0.548269C16.101 0.914019 15.307 1.44981 14.6364 2.12196L16.332 3.81756C16.7764 3.37 17.3041 3.01548 17.8865 2.77325C18.4688 2.53102 19.0928 2.40429 19.7232 2.40269C20.3537 2.40108 20.9777 2.523 21.5616 2.76362C22.1439 3.00264 22.6749 3.35556 23.1225 3.79991L24.8181 2.10431C23.8106 1.1001 22.5289 0.415123 21.1333 0.139206C19.7377 -0.139919 18.2907 0.00285184 16.9769 0.548269Z\" \/>\r\n\t\t\t\t\t\t<\/svg><\/span><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"bottom-cta-link\">\r\n\t\t\t\t<a href=\"https:\/\/netstorage.ringcentral.com\/uk\/guides\/security-ciso-guide.pdf\" class=\"view-all view-all-brown\" target=\"_blank\"\r\n\t\t\t\t\trel=\"noopener noreferrer\" data-dl-name=\"Download the UCaaS security guide\" data-dl-element=\"button\"\r\n\t\t\t\t\tdata-dl-additional-info=\"bottom cta banner\" data-no-auto-dl=\"true\">Download the UCaaS security guide\t\t\t\t\t<span class=\"svg-icon\" aria-hidden=\"true\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"\r\n\t\t\t\t\t\t\tfill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-arrow-842655792\"\r\n\t\t\t\t\t\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t<title id=\"cta-ring-arrow-842655792\">Ring Central Logo<\/title>\r\n\t\t\t\t\t<path\r\n\t\t\t\t\t\td=\"M0 11.5C0 11.2239 0.223858 11 0.5 11H21.6797C21.9559 11 22.1797 11.2239 22.1797 11.5V12.5C22.1797 12.7761 21.9559 13 21.6797 13H0.5C0.223858 13 0 12.7761 0 12.5V11.5Z\"><\/path>\r\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\td=\"M21.1718 12.0001L15.8086 6.63691C15.6134 6.44165 15.6134 6.12506 15.8086 5.9298L16.5157 5.22269C16.711 5.02743 17.0276 5.02743 17.2228 5.22269L23.6467 11.6465C23.8419 11.8418 23.8419 12.1584 23.6467 12.3536L17.2228 18.7775C17.0276 18.9727 16.711 18.9727 16.5157 18.7775L15.8086 18.0704C15.6134 17.8751 15.6134 17.5585 15.8086 17.3633L21.1718 12.0001Z\"><\/path>\r\n\t\t\t\t<\/svg><\/span><\/a>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t<\/span><\/p>\n<h2 id=\"risk\"><b>What risks does a hybrid work environment create?<\/b><\/h2>\n<p>I think there are a number of risks. One is the hybrid use of devices: you have a phone, which someone will use for work and personal use. Then you have a laptop, which will also be for mixed-use. Also, you don&#8217;t know how secure the home environment is \u2013 from internal intrusion and external intrusion.<\/p>\n<p>Another privacy concern is companies that are becoming more invasive in monitoring their employees. There&#8217;s been a lot of discussion and concern about this because of the potential of invasion of privacy by employers.<\/p>\n<h2 id=\"protected\"><b>What can businesses do to stay protected over the next few years?<\/b><\/h2>\n<p>Some key privacy principles continue to be valuable. One is applying data minimisation to reduce risk. This involves minimising the amount of data we are processing by also limiting access and retention of the data. One thing that happens too often is that because collecting data, storing it and allowing access is so easy now, we collect too much. It is just easier to allow broad access, even when it is not necessary. This requires working with engineers, product managers, and IT to implement privacy best practices by design and not as an afterthought.<\/p>\n<p>Another key area, in partnership with the CISO, is to map and classify data and then potentially apply data vaulting or data tokenisation to protect the \u2018crown jewels\u2019 and the highly sensitive personal data.<br \/>\nThese best practices will be very good for several years, regardless of how technology evolves.<\/p>\n<h2 id=\"trust\"><b>Trust in RingCentral<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Paola\u2019s team is currently focused on extending even more privacy and security controls for our customers. To find out more about what we\u2019re doing around data privacy, check out our<\/span> <a href=\"https:\/\/www.ringcentral.com\/gb\/en\/trust-centre\"><span style=\"font-weight: 400;\">Trust Centre<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data is now everyone\u2019s business. It\u2019s become intrinsic to almost every department of every organisation. But as the amount of data collected and processed has skyrocketed, so too have privacy &hellip; <a href=\"\/gb\/en\/blog\/interview-with-paola-zeni\/\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;\u200b\u200bRingside: Insider Interview with Paola Zeni, Chief Privacy Officer&#8221;<\/span><\/a><\/p>\n","protected":false},"author":130,"featured_media":25557,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[120,264],"tags":[290,90],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u200b\u200bRingside: Insider Interview with Paola Zeni, Chief Privacy Officer | RingCentral UK Blog<\/title>\n<meta name=\"description\" content=\"ata is now everyone\u2019s business. It\u2019s become intrinsic to almost every department of every organisation. But as the amount of data collected and pr\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/interview-with-paola-zeni\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Samantha Clayton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u200b\u200bRingside: Insider Interview with Paola Zeni, Chief Privacy Officer | RingCentral UK Blog","description":"ata is now everyone\u2019s business. It\u2019s become intrinsic to almost every department of every organisation. But as the amount of data collected and pr","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/interview-with-paola-zeni\/","twitter_misc":{"Written by":"Samantha Clayton","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":":\/gb\/en\/blog\/interview-with-paola-zeni\/#article","isPartOf":{"@id":"\/gb\/en\/blog\/interview-with-paola-zeni\/"},"author":{"name":"Samantha Clayton","@id":"\/gb\/en\/blog\/#\/schema\/person\/f5e7b51c5870a1f2e6f07368d605e574"},"headline":"\u200b\u200bRingside: Insider Interview with Paola Zeni, Chief Privacy Officer","datePublished":"2023-01-25T08:30:09+00:00","dateModified":"2025-05-29T08:51:57+00:00","mainEntityOfPage":{"@id":"\/gb\/en\/blog\/interview-with-paola-zeni\/"},"wordCount":1064,"commentCount":0,"publisher":{"@id":"\/gb\/en\/blog\/#organization"},"keywords":["privacy","security"],"articleSection":["Interviews","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":[":\/gb\/en\/blog\/interview-with-paola-zeni\/#respond"]}]},{"@type":"WebPage","@id":"\/gb\/en\/blog\/interview-with-paola-zeni\/","url":":\/gb\/en\/blog\/interview-with-paola-zeni\/","name":"\u200b\u200bRingside: Insider Interview with Paola Zeni, Chief Privacy Officer | RingCentral UK Blog","isPartOf":{"@id":"\/gb\/en\/blog\/#website"},"datePublished":"2023-01-25T08:30:09+00:00","dateModified":"2025-05-29T08:51:57+00:00","description":"ata is now everyone\u2019s business. It\u2019s become intrinsic to almost every department of every organisation. But as the amount of data collected and pr","breadcrumb":{"@id":":\/gb\/en\/blog\/interview-with-paola-zeni\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":[":\/gb\/en\/blog\/interview-with-paola-zeni\/"]}]},{"@type":"BreadcrumbList","@id":":\/gb\/en\/blog\/interview-with-paola-zeni\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"RingCentral Blog","item":"\/gb\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Interviews"}]},{"@type":"WebSite","@id":"\/gb\/en\/blog\/#website","url":"\/gb\/en\/blog\/","name":"RingCentral UK Blog","description":"RingCentral News and Tips","publisher":{"@id":"\/gb\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/gb\/en\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"\/gb\/en\/blog\/#organization","name":"RingCentral UK","url":"\/gb\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/","url":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","contentUrl":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","width":1921,"height":416,"caption":"RingCentral UK"},"image":{"@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"\/gb\/en\/blog\/#\/schema\/person\/f5e7b51c5870a1f2e6f07368d605e574","name":"Samantha Clayton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/person\/image\/","url":"https:\/\/rcbloguk.wpengine.com\/gb\/en\/blog\/wp-content\/plugins\/rc-profile-photo\/images\/default-avatar.png","contentUrl":"https:\/\/rcbloguk.wpengine.com\/gb\/en\/blog\/wp-content\/plugins\/rc-profile-photo\/images\/default-avatar.png","caption":"Samantha Clayton"},"description":"Samantha is RingCentral\u2019s Content Manager for EMEA Marketing. Before joining the business, she worked in content and public relations roles. She has worked with companies in ed tech, marketing and advertising, connected home, telecoms and publishing. She has a BA in English Literature and an interest in story writing. In her spare time, she enjoys reading and live music.","sameAs":["https:\/\/www.linkedin.com\/in\/claytonsamantha\/"],"url":"\/gb\/en\/blog\/author\/samantha-clayton\/"}]}},"_links":{"self":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/25555"}],"collection":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/users\/130"}],"replies":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/comments?post=25555"}],"version-history":[{"count":0,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/25555\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media\/25557"}],"wp:attachment":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media?parent=25555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/categories?post=25555"},{"taxonomy":"post_tag","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/tags?post=25555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}