This is achieved by forcing them to maintain a list of individuals who do not wish to be conducted about purchasing a variety of products and services. Furthermore, these protections were enacted to ensure that businesses are not engaging in tactics that are abusive by limiting the times when they can call and what they can say. (Caudill, 2000)
In contrast with the Consumer Privacy Bill of Rights, the proposed regulations are designed to enhance protections. This is occurring over the Internet vs. On the telephone. These differences are showing how there is a loop hole in existing regulations as to how these laws are applied. The new guidelines are building upon the provisions from the Telephone Consumer Protections Act of 1991 by establishing procedures as to the way confidential information is used and collected from firms. This is occurring is through placing limits on an organization's online activities. ("Consumer Privacy Bill of Rights," 2012) (Caudill, 2000) (Jones, 2012)
The Do Not Call Implementation Act of 2003 is building upon the protections that consumers' are receiving from harassing phone calls by telemarketers. This is occurring with the law requiring them to keep an enhanced do not call list utilizing an opt-out provision. The way it works is businesses are required to update who has requested to never be contacted by continually checking the federal registry for changes. These provisions apply to residential consumers. For businesses, nonprofits and political organizations; they are excluded from these guidelines. At the same time, the law established practices which are used to enforce its provisions by establishing procedures for going after firms that are in violation of the act. (Barlough, 2003)
The Consumer Privacy Bill of Rights is different from the Do Not Call Implementation Act of 2003. This is occurring through not requiring firms to maintain a do not contact list for online transactions. Instead, it is concentrating on protecting how their information is collected, stored and used for marketing purposes. ("Consumer Privacy Bill of Rights," 2012) (Barlough, 2003) (Jones, 2012)
However, these provisions are similar with each other by establishing the way they can be contacted and the tactics that are utilized with the information they obtain. In this aspect, both laws are similar and different through establishing how these practices are being used. The only dissimilarity is the form of communication that is utilized in the process. ("Consumer Privacy Bill...
Consumer's Privacy Bill Of Rights The Obama Administration proposed the Consumer's Privacy Bill of Rights in 2012 as a roadmap for future legislation. The legislation was put forth on the premise that a huge portion of personal information gathered by American-based businesses regarding their customers and probable customers was still mostly unregulated (Sanders, 2012). In the past few years, the privacy of consumer information that is collected by businesses has been
The Center for Digital Democracy, represented by Jeffrey Chester, executive director, claims the Obama administration raises money from Google -- "Google is a Democratic darling in many ways" -- and hence the suspicion is that Obama asked his FTC to go easy on Google. "Our fear is that Google gets special treatment," Chester insists. Conclusion Whether or not Google was aware it was gathering this data from households and businesses in 30
Unfortunately, many consumers may not be aware of their photographic image being used in this fashion and even if they were, existing privacy laws fail to provide any substantive protections. For example, in response to these trends, the Harvard Law Review published an essay entitled, "In the Face of Danger: Facial Recognition and Privacy Law," with a majority of the article describing how "privacy law, in its current form, is
Geolocation of the user based on the user's Internet protocol (IP) address. Location-based service companies that specialize in identity protection use this approach, and IP addresses, blocks of IP addresses and credit card billing addresses can all be used to develop a location profile. 2. Personal computer/web browser identification examines the hypertext transfer protocol (HTTP) browser header and other information from the user's computer or device, and compares them to
Protecting Customer Rights Compliance research paper Compliance Research Paper: protecting customer rights The most significant aspect of any business organization or venture is the data constituting its intelligence. Consequently, the procedure of planning the business venture and accessing required data and maintaining that data is a priority to any business or industry. A business cannot operate without customers, as the core aim of any business is to make remarkable profits. Customer satisfaction dictates
Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now