StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Customer Information Privacy - Essay Example

Cite this document
Summary
In the paper “Customer Information Privacy” the author discusses business operations through e-division, which involves the firm collecting customers’ information. No confidential information concerning the customers and their buying behavior should be disclosed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
Customer Information Privacy
Read Text Preview

Extract of sample "Customer Information Privacy"

The report further documents that "it is inappropriate and illegal to sell customer information when it was collected under the assumption that it wouldn't be shared" (Sandoval, 2000). Since it has been assured by the firms to their customers that their personal data would not be transferred, it is quite unethical and unprofessional to share such information with other business organizations or agencies. If a firm decides to share the information about its customers with outside organizations, there exists a breach of contract between the company and the customers.

As a result, the customers can approach the concerned authority to make good of such breach. At the time of filling up the forms or any other requirements, it is usually seen that the customers' information would not be disclosed under any circumstances. In its privacy policy of Dell Company, it has been specified that they won't sell their customers' information to anybody without the customers' consent. The company is of the opinion that if they want to share it with any outside organization, the same has to be disclosed in the policy and get the consent of the customers (Disclosure of information, n. d.).

In the United States of America, the privacy information cases are handled by The Federal Trade Commission (FTC), which insists on companies using websites to specify their information collection policy to customers. FTC, using its privilege under section 5 of the Act, the Commission makes it obligatory that the security of consumers' personal information should be ensured and handled properly (Customer Information and Privacy, n. d.). It is, therefore, imperative that the personal information collected by companies through their e-division and websites should not be sold to other organizations or agencies to make a profit.

If companies want the information to be sold, consent for the same has to be sought and the customer should not exhibit any displeasure in this regard. Once the company performs this unethical practice, its reputation and credibility as a trusted company will be endangered and the company will lose confidence among customers and the public and eventually result in loss of business and profit. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Customer Information Privacy Essay Example | Topics and Well Written Essays - 500 words - StudentShare, n.d.)
Customer Information Privacy Essay Example | Topics and Well Written Essays - 500 words - StudentShare. https://studentshare.org/business/1533549-customer-information-privacy
(Customer Information Privacy Essay Example | Topics and Well Written Essays - 500 Words - StudentShare)
Customer Information Privacy Essay Example | Topics and Well Written Essays - 500 Words - StudentShare. https://studentshare.org/business/1533549-customer-information-privacy.
“Customer Information Privacy Essay Example | Topics and Well Written Essays - 500 Words - StudentShare”. https://studentshare.org/business/1533549-customer-information-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Customer Information Privacy

Customer Relationship Management

The differences between privacy and data security are important in handling customer information.... The differences will ensure that the company responsibly uses customer data to avoid legal suits related to misuse of customer information.... The questions below will be addressed in the succeeding discussions: What the differences between privacy and data security?... The paper tells that privacy refers to a state of personal information being kept free from unsanctioned intrusion....
3 Pages (750 words) Essay

The Value of Digital Privacy in an Information Technology Age

The paper “The Value of Digital privacy in an Information Technology Age” will discuss computer hacking, which has been rampantly used to access sensitive individual information.... Different cabling companies have different terms of use in regard to privacy.... Invasion of personal privacy shows inefficiency on the government's part and other organizations that keep citizens' records.... In the wrong hands, unauthorized access to information may lead to the destruction of vital information or usage of information for destructive purposes....
4 Pages (1000 words) Research Paper

Customer Relationship Management at Castle Bingo

nalytical CRM involves analyzing customer vital information in order to effectively meet the marketing and customer service goals and deliver an appropriate message to the right customer at the right time through an appropriate channel.... It renders people process as well as data together and further facilities in channeling the data along with customer-related information for ensuring proactive decision making.... It ensures the timely sharing of information and results in enhanced customer services....
8 Pages (2000 words) Case Study

Organizational Analysis: Nordstrom Inc

A fashion reward program is also offered to Nordstrom card holders where points are accumulated depending on the amount of spending for 2,000 points, a twenty thousand dollars reward is issued to the customer in form of Nordstrom notes redeemable from Nordstrom stores or online (Reuters, 2013).... Nordstrom mission statement While operating through the Nordstrom retail stores, upscale shoppers are attracted and provided with nothing less than quality customer service and stylish experience (Team2misnordstrom, 2012)....
6 Pages (1500 words) Essay

Ethical and Social Responsibilities of a Peugeot Group

The company's CSR Group presents its shareholders with comprehensive and transparent information and precisely the records and events of its activities that are related to its accounts.... The laws abided by the company include conformity with laws and regulations, non-admittance of inner information and genuineness of accounting statistics, information and indicator (PSA Peugeot Citroen, 2010)....
6 Pages (1500 words) Essay

Structured Query Language Database

In the new data model the customer information is subsidiary to sales information, the trigger is identified as “for each statement type” and is an additional data set for the salesperson each time the tour booking triggers the event.... Under the new structure in which the client information is subordinate to sales information, this trigger would be identified as “for each statement type” and would add data set for the... The first step will form a new separate table for the tours sold table with the customerId field as the primary key of the customer table and The customerID field is a unique area because each customer will have their unique customerID thus the reason for its use as the primary key....
3 Pages (750 words) Essay

Information Collection and Retention of Sensitive Information on Users

The paper "information Collection and Retention of Sensitive information on Users" analyzes the extent to which companies retain user's sensitive information and the kind of information that companies hold and the reasons for holding such sensitive information.... In fact, Martin (2014) notes that every time an individual surfs on the Internet and click on a website, use a mobile app, post something on social media or make a comment via an e-mail or call centre, the information provided is retained by the companies for future use....
8 Pages (2000 words) Research Paper

Privacy Issues

While modern technology has enabled governments and private corporations to engage in activities which people may regard as extremely invasive of their privacy.... This article highlights some of the most important ways in which a person's right to privacy may be threatened through modern technology … In the globalized world, there needs to be international regulation to ensure that the right to privacy is not violated.... But looking at all this from another perspective, we can say that the advances in technology severely threaten people's right to privacy....
5 Pages (1250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us