Customer Privacy Essay

Decent Essays
WHAT IS CUSTOMER PRIVACY?
Customer Privacy is a process of protecting and handling of sensitive personal information’s that individuals release in the course of doing their everyday business. This information’s can be gathered and exchanged with the use of telephone, online and even direct one on one with a company representative.
But since the evolution of internet and other social electronic device of mass communication, I can boldly tell you that consumer privacy has become a very sensitive and major issue in our community. Personal information in the hands of a wrong person can do so much harm ranging from financial fraud, identity theft and other serious money and criminal crime that could cost an organization, government and people billions
…show more content…
In recent the issue of customer privacy has been gaining lots of controversy whereby consumer are demanding action to protect their privacy online according to a research done by ComRes in nine countries in which more than 10,000 people were asked questions about Customer Privacy at least 75% responded that they are concerned about their privacy online, whereby about 40% lamented that they are been harmed by big companies who gather large amount of personal information for their own personal …show more content…
P3P will let user know about sites practice and also make decision based the website practices when necessary. But users need to be aware that they have to read the privacy at every site they visit. And also it can be used to monitor customers who return goods with or without receipt and this information can be sent to a third party company, which can create a folder for such customers and track them. A company known as The Retail Equation (TRE) offer such service right here in California at Irvine, and when asked they said they don’t share information in the profiles with other stores or

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Facebook Vs Ehling

    • 759 Words
    • 4 Pages

    The advent of the internet and internet communications have brought about a wide range of unresolved questions about the issue of privacy. Many of these issues have only been addressed by the courts on a case-by-case basis; not much legal precedent has been developed that can be applied across the board. Therefore, everyone has to be mindful about their privacy when using the internet for any purpose. I am not surprised that the employers of Souza or Leone read their postings to Facebook and they should not be surprised either. They both willingly put the information out on the internet, which is a public medium.…

    • 759 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The communication privacy theory focuses on privacy boundaries and what information one chooses to withhold from another person. This privacy management system is focused on three parts: privacy ownership, privacy control, and privacy turbulence. Privacy ownership is our private information that only we know and others do not. This also encompasses our personal privacy boundaries. Depending on the person, our privacy boundaries could either be thin and porous, or thick and hard to break through (Griffin p. 151).…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In this paper the topics about ethics and privacy are going to be the main topics of discussion. Two businesses are going to be used in order to give examples about ethics and privacy. The bank Wells Fargo is going to be used to explained bad ethics and bad privacy. Wells Fargo has failed the code of ethics, and also violated their costumer’s privacy, because they used information that should have been used without the customer’s consent. The company Nike is going to be used to represent good ethics and good privacy, and what they do in order to be the amazing company they are today.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    There has been an increased interest and knowledge in relation to privacy rights and issues. The reason for this is that they are a fundamental right which ensures the personhood of individuals by allowing them to control who has access to personal information about them. Privacy issues are also of importance because it helps individuals avoid unwanted intrusions in their personal dealings. Consequently, for the reason that privacy is such a complex concept, there have been ongoing concerns and discussions in relation to the legal concept of privacy rights. Various theorists have provided their interpretation of privacy which includes an understanding of how privacy rights should be defined as well as what they should protect.…

    • 1075 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The 21st century is often referred to as the era of information. This is due to the radical amount of social networking that takes place on a day to day basis. This includes everything from Facebooking your close friends to googling answers for that last minute history assignment. Information is constantly being streamed onto the internet and it only takes a matter of seconds to go viral. The question is then raised, are privacy rights being violated and if so who is to blame?…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays