Privacy 1. Definitions of Privacy The right to be let alone – Harvard Law Review article by Brandeis and Chase in 1890. Abigail v. Franklin Mills.

Slides:



Advertisements
Similar presentations
Marketing Research 4.06 Acquire foundational knowledge of marketing-information management to understand its nature and scope.
Advertisements

4.00 Understand promotion and intermediate uses of marketing-information Acquire foundational knowledge of marketing-information management to.
CHAPTER 4 E-ENVIRONMENT
Relationship Marketing MBA Term-3 MK1 Faculty- Salil Bhatia.
Back to Table of Contents
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Learning Goals Be able to identify the major forces shaping the new digital age. Understand how companies have responded to the Internet with e-business.
Copyright © 2004 Pearson Education, Inc. Slide 1-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech / Privacy.
Privacy as an International Information Issue MD823 October 18, 2004.
1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009.
Relationship Marketing SHSMD Luncheon October 5, 2007 Leean Kravitz Mudhouse Advertising.
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
“Privacy Implications of RFID Technology in Health Care Settings” Marc Rotenberg President EPIC Dept. of Health & Human Services Washington, DC 11 January.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Consumer motivation CHAPTER 8. Consumer motivation Represents the drive to satisfy both physiological and psychological needs through product purchase.
Consumer Motivation. Represents the drive to satisfy both physiological and psychological needs through product purchase and consumption Gives insights.
COPYRIGHT © 2006 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license.
1 25 October EPFL Conference Data Protection in Intergovernmental Organizations Workshop 7 February 2013 K. Ernst S. Lüders C. Viala.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods What.
Private, Secure, Guaranteed ACH Credits – The Next Generation of Online Payments Samantha Carrier, Director, eCommerce, NACHA.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Consumer Behavior, Market Research
FIRST LOOK.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Chapter 11 E-Commerce.
Copyright Cengage Learning 2013 All Rights Reserved 1 Chapter 21: Customer Relationship Management (CRM) Introduction to Designed & Prepared by Laura Rush.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Privacy of Home Energy Usage Data Jim Williams June 26, 2012 Jim Williams June 26, 2012.
1 E-Commerce Overview Prepared by Terry Morris Kappa Beta Delta Harper College 11/03/04.
Consumer Protection. How Does Government Protect Consumers Through Legislation: – Consumer laws are a form of government regulation which protects the.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
RFID and Privacy Dan White RFID Technical Evangelist Engineering & Development Retail Solutions Division.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Copyright © 2005 Pearson Education Inc. Marketing in the Digital Age Chapter 3 PowerPoint slides Express version Instructor name Course name School name.
WHAT IS E-BUSINESS? Conducting business via the Internet. Capabilities and Benefits of E-Business Global reach, personalization, interactivity, right-time.
As defined in the Generally Accepted Privacy Principles, “privacy” refers to the rights and obligations of individuals and organizations with respect to.
C4HCO Security and Privacy Discussion Bill Jenkins C4HCO Security and Privacy Officer 16 October 2013.
Federal Agencies and Laws for Consumer Rights
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Privacy and Free Speech: It's Good for Business Nicole A. Ozer, Esq. Technology and Civil Liberties Policy Director ACLU of Northern California Online.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
Consumer Behavior and Loyalty. Electronic CommercePrentice Hall © Learning about Consumer Behavior Online A Model of Consumer Behavior Online –The.
Consumer Motivation.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003OHT 6.1 e-CRM Building customer relationships in cyberspace…
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Privacy Introduction Emerson Murphy-Hill. Why do we care about privacy? Much of what we do in today’s society involves information exchange e.g. government,
COPYRIGHT © 2006 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license.
Identity and Access Management
Privacy and Public Policy Implications of IoT
MGMT 452 Corporate Social Responsibility
Information Session.
Who Uses Encryption? Module 7 Section 3.
Protecting Your Credit
Other Sources of Information
Presentation transcript:

Privacy 1

Definitions of Privacy The right to be let alone – Harvard Law Review article by Brandeis and Chase in Abigail v. Franklin Mills Chief Judge Alton B Parker and his interesting reversal of opinion The right to control information about yourself Who owns information about you? How do they get it?

Abigail’s Image

Definitions of Privacy “The claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” Weston “The extent to which we are known to others, the extent to which others have physical access to us, and the extent to which we are the subject of others’ attention” Gavison

Right to privacy Is there a right to privacy? US Bill of Rights Declaration of Human Rights California State Constitution

The Players Government Business Technology Norms

Fair Information Practices An organization: –Must be accountable for all PII in its possession –Must identify the purposes for collecting PII –Must have the knowledge and consent of the person before collecting PII –Must not permit forward transfer of of PII without the person’s permission –Should retain the PII only for as long as necessary –Allow persons to access their PII with the opportunity to amend it –Must ensure the security of the PII in its possession –Provide a means of recourse if any of the previous are violated

The Census and Mission Creep Original census was simply a head count Scope expanded to include a variety of demographic information Today the role of the census includes determining eligibility for various federal programs

A National Identifier The Social Security Number –Problems as an identifier –Scope creep re. The SSN Other identification schemes – national ID cards Driver’s License

Other Identification Issues Homeland Security – Arrival Departure Information System (ADIS), US Visitor and Immigrant Status Technology (US – VISIT) VeriChip™ – Applied Digital Technology RFID scheme

Fair Credit Reporting Act How it came to be The credit reporting industry Errors in credit reporting and the presumption of guilt

Identity Theft How prevalent is identity theft? What factors make it an attractive crime? – Sutton’s Law What are the effects? –On the individual –On society

Absolute Identification Fingerprints DNA –Identifies bodies, not people The UPS signature problem The more trust we place in identification systems, the more rewarding fraud becomes Identification systems and the presumption of guilt

The Potential of e-Commerce Up to now, e-commerce revenues have not lived up to predictions. The dilemma for business –Exploit Personally Identifiable Information? –Be a strong supporter of consumer privacy? Who owns the customer’s information?

Cost of Privacy Studies aimed at showing that the cost of privacy is prohibitive, e.g. commissioned studies sponsored by the DMA (see paper by Robert Gellman at Costs of failing to protect privacy Are there benefits of protecting privacy?

What are the costs of failing to protect privacy? Privacy Chernobyls –Eli Lilly –DoubleClick –San Diego State University Effects of negative publicity –Lost sales –Decline in stock price

Cost/Benefit of Privacy Cyber Dialogue survey October 2001 –27% abandoned an order online –21% switched an online order to an offline order –7% online and 5% offline switched to another store –Expanding to the entire population, these defections were estimated to have had a cost of $6.2B for the year

Trust Consumers do not fully trust business and government on privacy – Harris Interactive Poll April/May 2001 Privacy policies are growing more common, but not necessarily more understandable

Loyalty and Retention Customer loyalty results in higher retention rates By increasing customer retention 5%, a company will increase its profits from 25% to 95% (Reichheld, HBR)

Cost/Benefit of Privacy (2) Forrester Report – October 2001 –37% would buy more online if they were not worried about privacy issues –34% do not buy online due to privacy issues –50% of online buyers extremely concerned about privacy, 34% somewhat concerned –Only 6% thought benefits from sharing personal information outweighed privacy concerns –Bottom line – Potential loss of $15B or 27% of projected e-commerce revenues for the year

Steps Consumers Take to Protect Privacy Read privacy policy Many don’t understand ‘cookies’ 24% of Internet users surveyed falsified information to protect privacy (Pew Internet & American Life Project, August 2000) 86% favor opt-in (Pew Internet & American Life Project, August 2000) Consumers most likely to take steps to protect their privacy are those of greatest interest to marketers (IBM Multi-national consumer privacy survey 1999)

Privacy and B2B B2B predicted revenues and reality – analogy to B2C Privacy expectations shaped by B2C experiences Trust and B2B

The Public and Privacy (Weston) Privacy unconcerned – 12% Privacy pragmatics – 63% Privacy fundamentalists – 25%