Você está na página 1de 3

CHAPTER IV: PRIVACY You already have zero privacy-get over it PRIVACY PROTECTION AND THE LAW The

use of information technology in business requires the balancing of the needs of those who use information about individuals against the rights and desires of those individuals whose information may be used. The Right of Privacy right to be left alone the most comprehensive of rights, and the most valued by a free people. The impact of information technology on individual rights The right of individual to control all collection and use of information about themselves. Recent History of Privacy Protection 1. The Communications Act of 1934 2. The Freedom of Information Act (FOIA) Procedures of FOIA to obtain Information: You must submit your request for records in writing to the appropriate agency. You must state specially what information you are requesting and the purpose of the information. By law, agency must respond to your request within ten days. If your initial request is denied, you may file a FOIA appeal, and agencies have 20 days to respond to your appeal or you can take your claim to federal district court. 3. The Fair Credit Reporting Act of 1970 4. The Privacy Act of 1974 Summary of the 1980 OECD Privacy Guidelines Collection Limitation Data Quality Purpose Specification Use Limitation Security Safeguards Openness Principle Individual Participation Accountability

Recent History about Privacy Electronic Communication Privacy Act (ECPA) of 1986 1994 Communication Assistance for Law Enforcement Act (CALEA) Childrens Online Protection Act (COPA) European Community Directive 95/46/EC BBB Online and TRUST Gramm- Leach - Biley Act 999 USA Patriot Act Opt- Out Policy assumes that the costumer approve of companies collecting and storing their personal information. Opt- In Policy must obtain specific permission from consumers before collecting any data. Cryptography Science of encoding message Only sender and intended receiver can understand the message.

Encryption -process of converting electronic messages into a form that can be understood only by the intended recipients. Public Key Encryption System Uses two keys to encode and decode messages.

Private Key Encryption System Uses a single key to both encode and decode messages. Consumer Profiling Companies openly collect personal information about people who sent this Internet when those register at sites, complete surveys, fill out forms or enter contest online. - Marketing firms aggregate the information they gather about consumer from disparate sources to build database containing a huge amount of consumer behavioral data. Types of Personalization Software

1. Rule-based personalization software uses business rules tied to customer2. 3.


provided preference information or online behavior to determine the most appropriate page views and product information to display. Collaborative Filtering offers consumer recommendations based on the types of products purchased by other individuals who brought the same product as another customer. Contextual Commerce associates product promotions and other e-commerce, associates offerings with specific content a user may be receiving in a news story online.

TREATING CONSUMER DATA RESPONSIBILTY When dealing with the consumer data, strong measures are required to avoid the development of customer relationship problems. Workplace Monitoring - Many organization have developed a policy on the use of information technology to protect against employee abuses that reduce worker productivity or that could expose the employer to harassment lawsuits. Spamming- sending copies of the same email message to a large umber of people in an attempt to cause those people to read a message they might otherwise choose not to receive. Carnivore- network diagnostic tool created by the U.S Federal Bureau of Investigation (FBI) to assist in crime investigations. -to monitor email and electronic communications. Surveillance Technology Electronic equipment or interception or electronically transmitted information. - Use of governments and law enforcement to maintain social control, recognize and monitor threats and pervert or investigate criminal activity. -Thank YouEvaluation form Mastery of Proper attire the topic 20% 30%

Presenter

Visual aid 25%

Self confidence 25%

Score

Patricio, Mabell Taafranca, Clevin Cellan, Rogie Pedrezuela, Jeanyper Barquin, Marissa Salinas, Jiezel Total

Evaluator: _________________________ Comment:______________________________________

Você também pode gostar