This is achieved by forcing them to maintain a list of individuals who do not wish to be conducted about purchasing a variety of products and services. Furthermore, these protections were enacted to ensure that businesses are not engaging in tactics that are abusive by limiting the times when they can call and what they can say. (Caudill, 2000)
In contrast with the Consumer Privacy Bill of Rights, the proposed regulations are designed to enhance protections. This is occurring over the Internet vs. On the telephone. These differences are showing how there is a loop hole in existing regulations as to how these laws are applied. The new guidelines are building upon the provisions from the Telephone Consumer Protections Act of 1991 by establishing procedures as to the way confidential information is used and collected from firms. This is occurring is through placing limits on an organization's online activities. ("Consumer Privacy Bill of Rights," 2012) (Caudill, 2000) (Jones, 2012)
The Do Not Call Implementation Act of 2003 is building upon the protections that consumers' are receiving from harassing phone calls by telemarketers. This is occurring with the law requiring them to keep an enhanced do not call list utilizing an opt-out provision. The way it works is businesses are required to update who has requested to never be contacted by continually checking the federal registry for changes. These provisions apply to residential consumers. For businesses, nonprofits and political organizations; they are excluded from these guidelines. At the same time, the law established practices which are used to enforce its provisions by establishing procedures for going after firms that are in violation of the act. (Barlough, 2003)
The Consumer Privacy Bill of Rights is different from the Do Not Call Implementation Act of 2003. This is occurring through not requiring firms to maintain a do not contact list for online transactions. Instead, it is concentrating on protecting how their information is collected, stored and used for marketing purposes. ("Consumer Privacy Bill of Rights," 2012) (Barlough, 2003) (Jones, 2012)
However, these provisions are similar with each other by establishing the way they can be contacted and the tactics that are utilized with the information they obtain. In this aspect, both laws are similar and different through establishing how these practices are being used. The only dissimilarity is the form of communication that is utilized in the process. ("Consumer Privacy Bill...
Consumer's Privacy Bill Of Rights The Obama Administration proposed the Consumer's Privacy Bill of Rights in 2012 as a roadmap for future legislation. The legislation was put forth on the premise that a huge portion of personal information gathered by American-based businesses regarding their customers and probable customers was still mostly unregulated (Sanders, 2012). In the past few years, the privacy of consumer information that is collected by businesses has been
Right to Privacy Being a citizen of the United States comes with many benefits in comparison to citizenship in other countries. Through the U.S. Constitution and the Bill of Rights we are granted certain rights -- the right to free speech, freedom of religion, freedom of the press, and freedom of assembly -- just to name a few. However, despite the 27 amendments the Bill of Rights that guarantee American protections
The Center for Digital Democracy, represented by Jeffrey Chester, executive director, claims the Obama administration raises money from Google -- "Google is a Democratic darling in many ways" -- and hence the suspicion is that Obama asked his FTC to go easy on Google. "Our fear is that Google gets special treatment," Chester insists. Conclusion Whether or not Google was aware it was gathering this data from households and businesses in 30
" (Al-Ghaith, Sanzogni, and Sandhu, 2010) With a focus on Saudi Arabia it is reported that there is "no reliable local production in the fields of software or the hardware. The increased demand for ICTs is met by acquiring overseas technologies. The trend towards increased reliance on ICTs by the Saudi people, in particular computers and internet services, is one of the highest when compared with other developing countries; however it is
Privacy or Surveillance -- Political Topic Privacy or Surveillance? We live in an age of heightened concerns about terrorism and public safety. The events of 9/11, the constant threat of future terrorist plots and mass shootings and public bombings have put both the American people and government on high alert. Some of the government's responses have included development of the Department of Homeland Security and terrorist threat level systems (Hiranandani, 2011). Other
Privacy and Abuse Protection Efforts of Businesses Facts Many workforces in most nations all over the world are increasingly becoming global. These workforces cooperate, communicate, and link up in multinationals and global marketplaces via web-based applications across countries and territories. The phenomenon of globalization has removed quite a number of differences amongst peoples and nations both in workplaces and in other areas[footnoteRef:2]. However, some questions have been raised on the origins of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now