From the Learning Activity titled “Privacy Protection,” (please see the attached notes) identify two of the U.S. Federal Privacy Rights and Laws listed. Now, imagine you are a business analyst. What are some considerations you would make to ensure customer data is protected? In terms of creating a privacy policy, who would you involve in this process and why? If a manager asked you to provide him with a list of all customer emails for a marketing campaign, how would you respond? How would you determine if providing the list would be a violation of the company’s privacy policy?

Understanding Business
12th Edition
ISBN:9781259929434
Author:William Nickels
Publisher:William Nickels
Chapter1: Taking Risks And Making Profits Within The Dynamic Business Environment
Section: Chapter Questions
Problem 1CE
icon
Related questions
Question

Q3- From the Learning Activity titled “Privacy Protection,” (please see the attached notes) identify two of the U.S. Federal Privacy Rights and Laws listed. Now, imagine you are a business analyst. What are some considerations you would make to ensure customer data is protected? In terms of creating a privacy policy, who would you involve in this process and why? If a manager asked you to provide him with a list of all customer emails for a marketing campaign, how would you respond? How would you determine if providing the list would be a violation of the company’s privacy policy?

Note- Privacy Protection is attached to view. 

Privacy Protection
As you read this section on privacy rights in the U.S. and data protection laws in Europe,
consider the ethical and social issues that arise for businesses using information technology in
relation to employee and customer privacy. Share your thoughts about the ethical
implications of this practice in the Discussion Board. Be sure to respond to at least one other
post on this topic.
Privacy and freedom are important parts of every American's life, although many take these
rights for granted. Privacy is the right individuals have to be left alone, unobstructed, and free
from unwarranted interference or surveillance. When this right exists, it extends to all
individuals and protects them from other individuals, organizations, and government
agencies. Freedom refers to the absence of undue restriction or confinement and the
opportunity to exercise all inherent rights.
Privacy rights are protected in many countries, including the United States, Canada, and many
European nations. In the United States, the Bill of Rights within the Constitution protects not
only the right to privacy but also freedoms of speech, religion, and association. Table 2.1 lists
federal privacy rights and laws in the United States.
Table 2.1 U.S. Federal Privacy Rights and Laws
Federal Privacy Laws and Rights
Fourth Amendment to the Constitution
(1791)
Freedom of Information Act of 1966
Privacy Act of 1974
Protections
Protects against unreasonable search and
seizure
Allows access to federal agency records
Establishes a code of fair information
practices
Electronic Communication Privacy Act of
1986
Computer Matching and Privacy Protection
Act of 1988
Computer Security Act of 1987
Federal Managers Financial Integrity Act of
1982
E-Government Act of 2002
Extends restrictions on wire taps to
computer data
Extends privacy act of 1974 to include
computers
Requires computer security for sensitive
information
Requires evaluation of executive agency
accounting
Improves citizen access to government
information
In business, rights to privacy and certain freedoms also exist. However, every day millions of
employees are watched, listened to, and visually and audibly recorded. Information
technology and high-tech data retrieval systems threaten the privacy and freedoms of many
workers across the country by making the surveillance and recording of employee actions and
conversations not only very easy, but also relatively cheap, effective, and in some cases
profitable.
For example, senior-level management at Cyclops Investment Services discovers that
employees are giving less than stellar investment advice to their clients over the phone and
via private emails. If management in this case violates the privacy of its employees by
accessing their emails or by electronically recording telephone conversations, it may find that
it can better control the investment advice given to clients. However, is it worth the invasion
of privacy, even if there may potentially be greater profits in doing so? Dilemmas like these
are faced by senior level managers in a wide variety of companies every day.
European Data Protection
Transcribed Image Text:Privacy Protection As you read this section on privacy rights in the U.S. and data protection laws in Europe, consider the ethical and social issues that arise for businesses using information technology in relation to employee and customer privacy. Share your thoughts about the ethical implications of this practice in the Discussion Board. Be sure to respond to at least one other post on this topic. Privacy and freedom are important parts of every American's life, although many take these rights for granted. Privacy is the right individuals have to be left alone, unobstructed, and free from unwarranted interference or surveillance. When this right exists, it extends to all individuals and protects them from other individuals, organizations, and government agencies. Freedom refers to the absence of undue restriction or confinement and the opportunity to exercise all inherent rights. Privacy rights are protected in many countries, including the United States, Canada, and many European nations. In the United States, the Bill of Rights within the Constitution protects not only the right to privacy but also freedoms of speech, religion, and association. Table 2.1 lists federal privacy rights and laws in the United States. Table 2.1 U.S. Federal Privacy Rights and Laws Federal Privacy Laws and Rights Fourth Amendment to the Constitution (1791) Freedom of Information Act of 1966 Privacy Act of 1974 Protections Protects against unreasonable search and seizure Allows access to federal agency records Establishes a code of fair information practices Electronic Communication Privacy Act of 1986 Computer Matching and Privacy Protection Act of 1988 Computer Security Act of 1987 Federal Managers Financial Integrity Act of 1982 E-Government Act of 2002 Extends restrictions on wire taps to computer data Extends privacy act of 1974 to include computers Requires computer security for sensitive information Requires evaluation of executive agency accounting Improves citizen access to government information In business, rights to privacy and certain freedoms also exist. However, every day millions of employees are watched, listened to, and visually and audibly recorded. Information technology and high-tech data retrieval systems threaten the privacy and freedoms of many workers across the country by making the surveillance and recording of employee actions and conversations not only very easy, but also relatively cheap, effective, and in some cases profitable. For example, senior-level management at Cyclops Investment Services discovers that employees are giving less than stellar investment advice to their clients over the phone and via private emails. If management in this case violates the privacy of its employees by accessing their emails or by electronically recording telephone conversations, it may find that it can better control the investment advice given to clients. However, is it worth the invasion of privacy, even if there may potentially be greater profits in doing so? Dilemmas like these are faced by senior level managers in a wide variety of companies every day. European Data Protection
There is a much higher standard of rights of privacy of consumers in Europe than in the
United States. In Europe, businesses are not allowed to use the personal information of their
customers without prior consent. Such consent, referred to as informed consent, can only be
given when there is knowledge by the consent giver of all of the facts and information
required to make a rational decision. European countries also have tighter protection as to
what personal data may be transmitted across county borders and out of the European
Union. This has led to interesting court cases as Web servers within a country make data
available to the Internet without consideration that the data may be accessed from clients
(browsers) outside the borders. Court rulings have upheld that just because data
was available beyond borders does not mean that it was accessed beyond the borders,
therefore not in violation of privacy laws.
Although the United States does not have the same level of consumer protections in place,
U.S. companies must adhere to these stricter guidelines and provisions when doing business
with European companies or with European consumers. Although there may not be
government enforcement of such policies, safe harbor frameworks are in place. A safe
harbor is a self-regulating policy that, in absence of government regulation or enforcement,
acts to meet regulations set by governments. With safe harbor policies in place, European
and American joint business ventures thrive.
Technology integration provides opportunities to both serve organizations and their
customers. However, it also opens up the possibility of infringing on individuals' privacy and
freedom. Organizations that utilize voice over IP (VOIP) telephone service are able to provide
exception services beyond what a more traditional private branch exchange (PBX) system can
provide. When a customer calls into a VoIP system, the system is capable of looking up the
caller's phone number, looking up past communications (orders, problem resolution, and
anything else that the organization has stored), all before the call has been answered. As a
customer's call may be transferred, all data associated with the call is also transferred. This
may be great for customer service, but also reduces the privacy of the caller and the ability
for an anonymous inquiry is lost.
Next ActivityScroll To Top
Transcribed Image Text:There is a much higher standard of rights of privacy of consumers in Europe than in the United States. In Europe, businesses are not allowed to use the personal information of their customers without prior consent. Such consent, referred to as informed consent, can only be given when there is knowledge by the consent giver of all of the facts and information required to make a rational decision. European countries also have tighter protection as to what personal data may be transmitted across county borders and out of the European Union. This has led to interesting court cases as Web servers within a country make data available to the Internet without consideration that the data may be accessed from clients (browsers) outside the borders. Court rulings have upheld that just because data was available beyond borders does not mean that it was accessed beyond the borders, therefore not in violation of privacy laws. Although the United States does not have the same level of consumer protections in place, U.S. companies must adhere to these stricter guidelines and provisions when doing business with European companies or with European consumers. Although there may not be government enforcement of such policies, safe harbor frameworks are in place. A safe harbor is a self-regulating policy that, in absence of government regulation or enforcement, acts to meet regulations set by governments. With safe harbor policies in place, European and American joint business ventures thrive. Technology integration provides opportunities to both serve organizations and their customers. However, it also opens up the possibility of infringing on individuals' privacy and freedom. Organizations that utilize voice over IP (VOIP) telephone service are able to provide exception services beyond what a more traditional private branch exchange (PBX) system can provide. When a customer calls into a VoIP system, the system is capable of looking up the caller's phone number, looking up past communications (orders, problem resolution, and anything else that the organization has stored), all before the call has been answered. As a customer's call may be transferred, all data associated with the call is also transferred. This may be great for customer service, but also reduces the privacy of the caller and the ability for an anonymous inquiry is lost. Next ActivityScroll To Top
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Understanding Business
Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education
Management (14th Edition)
Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON
Spreadsheet Modeling & Decision Analysis: A Pract…
Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning
Management Information Systems: Managing The Digi…
Management Information Systems: Managing The Digi…
Management
ISBN:
9780135191798
Author:
Kenneth C. Laudon, Jane P. Laudon
Publisher:
PEARSON
Business Essentials (12th Edition) (What's New in…
Business Essentials (12th Edition) (What's New in…
Management
ISBN:
9780134728391
Author:
Ronald J. Ebert, Ricky W. Griffin
Publisher:
PEARSON
Fundamentals of Management (10th Edition)
Fundamentals of Management (10th Edition)
Management
ISBN:
9780134237473
Author:
Stephen P. Robbins, Mary A. Coulter, David A. De Cenzo
Publisher:
PEARSON