StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Web Site Privacy Policies and Procedures - Assignment Example

Cite this document
Summary
The paper "Web Site Privacy Policies and Procedures" argues that with the rapid growth of the internet, digital privacy concerns have also grown at the same rate. Federal laws and regulations through various Acts have been set up to protect people’s privacy on websites. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful

Extract of sample "Web Site Privacy Policies and Procedures"

Web site Privacy policies and procedures There is increasing number of internet users who are not aware sometimes that information is being collected about them. Internet has greater potentials of changing lives of many people globally given that with a mouse click one is able to follow up on news updates, have new friend globally, have business transaction where they can easily get goods and services they are looking for and one can look for facts on the internet. Web site users sometimes over emphasis on privacy issues which makes them unable to transact online at all cost. Users also give out their details easily over the internet sometimes without their knowledge compared to traditional way of transacting business. It is therefore important for businesses to be informed that consumers want to transact on a secure environment which they know their personal information is fairly protected. To foster e-commerce globally internet privacy must be taken seriously and employ various techniques to gain consumers’ confidence. Reasons for privacy concerns Internet has been identified as cheap and effective method of collecting data from consumers without their knowledge. Consumer preferences, credit card numbers, e-mails among other details can easily be collected by web sites. According to Federal Trade Commission, in their study for March 1999 (www.ftc.gov) 92.8% of web sites collect at least one information of their users such as e-mail name etc. there were 56.8% who captured demographic data such as gender. This study worries the customers about their privacy and security concerns on their personal data. The following are some of the concerns raised by the consumers Once they visit a web site they will be tracked secretly For the marketing purposes by most web sites consumer’s emails and other personal data will be captured without their consent. Web sites will sale their personal information to third party without their information. Consumers fear credit card theft Apart from the above concerns, advances in internet technology for instance, the use of databases which stores information of every transaction captured in forms. It is easy for one to combine these data and have a full record of an individual. Data mining is another serious concerns where transaction files are mined using advanced tools can reveal individual’s personal details. Cookies are other reasons to worry about internet use and privacy. There are some people who argue against web site privacy concerns. They point out that they are not special issues unique from the supermarkets or stores where buyers are monitored in cameras as they do shopping hence tracking of users is not a privacy concern. Although cookies can be used to identify the web site of the user’s personal data cannot be stored by the cookies (Cattapan, 2000). Web site Privacy policies Many countries around the globe have established privacy laws on the web sites. Privacy Act 1993 for New Zealand ensures that any business venture in electronic data must comply with the Privacy Act for its citizens. This act ensures that personal information collected and handled by organizations both government and private sector is secured (Slane, 2000). Web site Privacy Statements A company must inform people on important issues when they are collecting information from them. The following are some of the issues the Privacy statement should address: The fact of collection The purpose of collection Intended recipients of the information Contact details for the company collecting and holding information The legality of data collection required by the law and which one or voluntary information Outcomes for not disclosing part or all information Rights of individuals to access and correct the information offered. Online privacy protection There have been comprehensive bills that protect online users of their privacy. In US several bills such as Rep. Bush (D-IL) (H.R. 611) and Sen. McCain (R-AZ)(S.799) are bills with an aim to promote transparency on commercial use of data where consumers should be given a chance to choose what they want concerning collection and disclosure of personal information. The bill by Sen. Rockefeller (D-WV) which addresses the tracking issues where consumers have options to stop being tracked. This bill fills the gap by the Kerry-McCain’s legislation. The bill also ensures that violators are regulated. The children Privacy Act had gaps too which were bridged by Rep. Markey (D-MA) and Rep. Barton (R-TX)(H.R 1895) which addresses the provisions of collecting, using and disclosing personal information collected from children. They define personal information about teens and children. According to the Children’s Online Privacy Protection Act of 1998, parental permission for children’s personal information under age of 13 years was required (www.ftc.gov). The new law restricts companies from issuing out personal information for individuals below 18 years to third parties. Tracking individual’s location Smart phones have been sending out information about the location of their users to the manufacturing companies automatically without their consent. Apple and Google are examples of developers of such companies that have been receiving their clients geographical location information. Federal laws allow companies to obtain users geographical location information from their cell phones and smart phones. These has raised privacy concerns about the location privacy of an individual. Sen. Leahy (D-VT) drafted an act named Electronic Communications Privacy Act (ECPA). To address technological advances in communication industry to deal with emerging trends such as Social media and smart phones which were not addressed in the traditional laws. Sen. Franken (D-MN) and Sen. Blumenthal (D-CT) (S. 1223) among others came up with legislations that will close the gaps or loopholes in the federal law on communication which gives consumers and option earthier to be tracked or not basing on their geographical location. Geolocation bills have also been introduced to give guidelines on when geolocation of an individual can be accessed. Rep. Smith (R-TX), introduces an Act that protects children from accessing pornographic sites by ensuring that internet service providers keep logs for 18 months enough to prosecute child pornography. Personal details such as credit card numbers, the names and phone number of such internet users are captured especially for campus networks. Privacy Act 1974 This act ensures that federal government does not disclose personal information it holds without authorization Fair Credit Reporting Act Fraudulent collection of financial information and other credit reports about an individual are protected by this act which gives limited access to such information collected by thr credit agencies. Data security and breach notification Several bills on data security are still pending such as the Data Accountability and Trust Act by Rep. Rush, Secure And Fortify Electronic (SAFE) Data Act. These acts are aimed at empowering Federal Trade Commission to ensure that personal data is well secured by having information security managers appointed to safeguard personal information. A bill by Rep. Bono Mack closes the gap in the previous bill by ensuring that the company holds only information deemed important and necessary to it for business purposes and dispose all other personal details. Data breach ensures notification of the individuals affected in the event of a breach. SEn. Leahy’s bill further points out that the company should disclose risk analysis report to the government even if there are no risks. The bill in this section have varied definitions of the term ‘personal information’ personal data is an individual’s first name, last name and other details that may identify someone such as social security number, driving license, address, bank account number. The bill by Sen. Leahy brings in unique biometric data as personal data given that they are identification details of an individual. Conclusion With the rapid growth of internet, digital privacy concers have also grown at the same rate. Federal laws and regulations through various Acts have been set up to protect people’s privacy in the web sites. There are other laws which allow invasion of internet user’s privacy. Patriot Act makes it easir for one to copy files from one’s computer through a ‘sneak and peak’ search warrant. Investigation agencies such as FBI have also been given access to internet service providers recording its users. Homeland Security Act has loopholes where privacy of an individual in is compromised given the monitoring of internet communication. Legislation should gain digital freedom by striking a balance between laws and regulations aimed at safeguarding privacy. Civic education is necessary to educate internet users of their rights and dangers of disclosing their private information without considerations. Reference United States Federal Trade Commission. (1999). Federal Trade Commission online. http: www.ftc.gov. Cattapan, T. (2000). “Destroying e-commerce's "cookie monster" image”. Direct Marketing. 62(12): 20-24+. 2000 Apr. Federal Trade Commission, Privacy Online: A Report to Congress, at 3 & n.1 l (June 1998), available in http://www.ftc.gov/reports/privacy3/priv-23a.pdf (citing Business Week/ Harris Poll: Online Insecurity, Bus. Wx., Mar. 16, 1998, at 102) Slane, B (2000). “Killing the Goose? Information Privacy Issues on the Web.” http://www.privacy.org.nz/media/Killgoos.html. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Web Server - Assessment ONE Example | Topics and Well Written Essays - 1462 words, n.d.)
Web Server - Assessment ONE Example | Topics and Well Written Essays - 1462 words. https://studentshare.org/logic-programming/2047658-web-server-assessment-one
(Web Server - Assessment ONE Example | Topics and Well Written Essays - 1462 Words)
Web Server - Assessment ONE Example | Topics and Well Written Essays - 1462 Words. https://studentshare.org/logic-programming/2047658-web-server-assessment-one.
“Web Server - Assessment ONE Example | Topics and Well Written Essays - 1462 Words”. https://studentshare.org/logic-programming/2047658-web-server-assessment-one.
  • Cited: 0 times

CHECK THESE SAMPLES OF Web Site Privacy Policies and Procedures

E-commerce Data Privacy and Security

The essay highlighted issues related to teenagers publishing every activity on a social network, as these sites are also illustrating negative impact in terms of incomplete and doubtful privacy policies.... Moreover, we have also highlighted issues related to teenagers publishing every activity on a social network, as these sites are also illustrating negative impact in terms of incomplete and doubtful privacy policies.... In this report, we have prioritized issues related to privacy of e-commerce and social networking based websites....
25 Pages (6250 words) Essay

Curriculum Development Related to Information Security Policies and Procedures

For providing improved functionality for the organization,policies and procedures must be defined.... n order to implement policies and procedures,group discussions are required for constructing and implementing them in a real world scenario.... security policy comprises in the form of a document or rules that specify the statement ‘What must be done' in order to assure security measures in the system or the network For providing improved functionality for the organization, policies and procedures must be defined....
3 Pages (750 words) Case Study

Balance in the Administration of Justice Security

asically, what this piece emphasizes are the various implications to the legal and governmental system of the rules and procedures implemented just to respond to the needs of justice and security.... The Universal Declaration of Human Rights (1948-1998) also affords the right to privacy.... In the piece, Communications privacy in the Digital Age (1997), a number of legal issues confronted by people, in general, are laid out.... Most of the time also, the parties concerned contest the method of obtaining data quite too late and they barely survive to win in the proceedings ("Communications privacy in the Digital Age", 1997)....
8 Pages (2000 words) Coursework

The Protecting Consumer Privacy

Particularly, on the World Wide Web, the customer's personal information may be used by unscrupulous web site organizers.... This paper ''The Protecting Consumer privacy'' tells us that in today's era of massive technological advancement, privacy remains of paramount importance in the minds of consumers.... At the same time that individuals are increasing their awareness and vigilance concerning privacy matters.... James Nehf in his article entitled, 'Shopping for privacy on the internet' highlighted 'rational reasons why Web users do not shop for privacy' (2007, p....
12 Pages (3000 words) Coursework

Psychological Aspects of Cybersecurity

The relative size of the addresses in these social networks is huge, which is often not known to the users of the site.... The author of the following term paper "Psychological Aspects of Cybersecurity" states that present-day technologies and innovations based on the use of computer systems, mobile phones, and the internet have become extensively prone to cyber attacks....
10 Pages (2500 words) Term Paper

Information Privacy in the Digital Age

This paper "Information privacy in the Digital Age" investigates the measures to protect information privacy and intellectual property rights using the examples of famous companies.... The definition and degree of information privacy may depend on each organization or individual who imposes it.... But with the rampant evolution of information technology, information privacy has also been one of the most controversial issues society has ever faced today....
9 Pages (2250 words) Term Paper

Enterprise Application SystemsIntegration- Assessment Documentation

Operational documentation can be found within department Standard Operating procedures (SOP) or Work Instructions (WI).... It is the intent of this paper ''Enterprise Application SystemsIntegration- Assessment Documentation'' to align the business and system requirements that get articulated during the Enterprise Application Service Integration (EASI) design process with business requirements for availability, performance and manageability....
26 Pages (6500 words) Research Paper

Privacy of Data at Web Server

Additionally, these institutions are expected to create their own organizational policies that aim at protecting individual privacy (Commonwealth of Australia, 2011).... n addition to the privacy act, many other legislations and policies have been enacted by the associations of IT professionals to further protect the privacy of information and data of individuals that are handled by organizations and institutions.... As the paper "privacy of Data at Web Server" tells, the use of information technology and information systems to facilitate operations has been the most common practice today....
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us