Verified Document

Privacy Protection Act The United Term Paper

For example, almost all companies doing business on the Internet will have a link disclosing their privacy policy and the steps they will take to ensure the customer's privacy. Privacy matters become an issue because, in order to transact business of the Internet, one is required to enter such personal information as credit card numbers, addresses, emails and personal phone numbers.

The vast majority of online businesses will have policy disclosure statements outlining exactly what the business does with this collected information. For example, most businesses value a customer's privacy as this encourages customers to do more business with them. Therefore, a typical privacy disclosure statement will begin by stating exactly what information they collect. For example, a company may state that on pages where one can order products, make requests or register to receive materials, the type of information collected includes, but is not limited to: the customer's name, physical address, email address, phone number, credit card or other form of payment information. Likewise, on pages where one can submit information about other people, such as when one orders a gift to be sent directly to the recipient, the type of information collected includes, but is not limited to: the recipient's name, address and telephone number.

Next, the privacy disclosure will state exactly what will be done with the aforementioned gathered data information. This part of the disclosure will typically state that the information provided is used only to complete the order and that the information is not shared with any outside party except as needed to complete the order. For example, when one orders a product online the information will be shared with the delivery company in order to ensure the proper shipment.

The privacy statement will also state how the company ensures that all submitted information is secure. For example, it will state that a company utilizes non-identifying and aggregate information to assist with website design and working with advertisers and that they never discloses personal or identifying information in this process. Further, it will state that to prevent unauthorized access to secure information and to ensure data accuracy, the company employs appropriate physical, electronic and managerial procedures and safeguards.

Finally, as does the Privacy Act, the privacy disclosure statements must state how one can access and/or modify their personal records. For example, a business will typically always allow a customer to access personally identifiable information either via online, telephone or through an account link found on every page.

Clearly, the Privacy Act, originally intended to apply only to government agencies, now applies to such non-governmental entities as the healthcare...

What can be concluded from this expansion of the Act's jurisdiction is that, because of the Act, individuals now have an expectation of personal privacy. In order to ensure this expectation is met, all customer-related organizations must take steps, per the Privacy Act, to protect an individual's personal privacy.
Bibliography

Beaver, Kevin, Rebecca Herold. Practical Guide to HIPPA Privacy and Security Compliance. New York: CRC Press, 2003.

Carter, Patricia I. HIPPA Compliance Handbook. New York: Wolters Kluwer Company, 2002.

Casey, Timothy D. ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy Regulations. New York: Wiley, John and Sons, Inc., 2001.

Cate, Fred, Wallison, Peter, Litan, Robert and Michael Staten. Financial Privacy, Consumer Prosperity and the Public Good. Brookings Institution Press, 2001.

Clayton, Richard, Tomlinson, Hugh. Privacy and Freedom of Expression. New York: Oxford University Press, 2001.

Countryman, Clay, Mohre, Elizabeth H., and Heather C. Jahnke. HIPAA Compliance Handbook: Final Rule on Standards for Privacy. New York: Aspen Law and Business, 2001.

Davis, Tom. Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records. Washington, D.C.: DIANE Publishing Co., 2005.

Douglas-Steward, Jeremy. Annotated National Privacy Principles. BPR Publishers, 2001.

Flipp, Mark R., Castagnera, James O. Employment Law Handbook. New York: Aspen Law & Business, 2005.

Hudson, David L., Marzilli Alan. Open Government. Chelsea House Publishers, 2005.

Jasper, Mararet C. Privacy and the Internet: Your Expectations and Rights Under the Law. New York: Oxford University Press, 2001.

Knag, Paul E. And Lisa M. Boyle. HIPPA: A Guide to Health Care Privacy and Security Law. New York: Aspen Law & Business, 2002.

Maida, Pamela. Freedom of Information Act Guide and Privacy Act Overview. Washington, D.C.: U.S. Government, 1996.

Privacy Act. Washington D.C.: U.S. Government Publishers, 1988.

Rotenberg, Marc. Privacy Law SourceBook 2000: United States Law, International Law and Recent Developments. Electronic Privacy Information Center, 2000.

Staples, William G. Encyclopedia of Privacy. New York: Greenwood Publishing Group, Inc., 2006.

Sterns, Cliff. Consumer Privacy Protection Act of 2002: Congressional Hearing. Washington, D.C.: U.S. Government, 2004.

Tugendhat, Michael, Iain, Christie. Law of Privacy and the Media. New York: Oxford University Press, 2001.

Wolf, Bennett M. "Local Perspective of the Impact of the HIPPA Privacy Rule on Research." Cancer, 2006, p. 106.

Sources used in this document:
Bibliography

Beaver, Kevin, Rebecca Herold. Practical Guide to HIPPA Privacy and Security Compliance. New York: CRC Press, 2003.

Carter, Patricia I. HIPPA Compliance Handbook. New York: Wolters Kluwer Company, 2002.

Casey, Timothy D. ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy Regulations. New York: Wiley, John and Sons, Inc., 2001.

Cate, Fred, Wallison, Peter, Litan, Robert and Michael Staten. Financial Privacy, Consumer Prosperity and the Public Good. Brookings Institution Press, 2001.
Cite this Document:
Copy Bibliography Citation

Related Documents

Privacy What Ways Privacy Legally Protected United
Words: 486 Length: 2 Document Type: Essay

PRIVACY What ways privacy legally protected United States Essay Question: Explain general ways privacy legally protected United States Essay 250 words length APA format. 2 references Book Reference Bennett-Alexander, D. Explain the three general ways in which privacy is legally protected in the United States The right to privacy is not specifically enumerated in the U.S. Constitution but the U.S. Supreme Court over the years has ruled that it is a protected right

Protection Act 1998 Was Instituted in Order
Words: 867 Length: 3 Document Type: Essay

Protection Act (1998) was instituted in order to protect the privacy of individuals in terms of communication. The fundamentals of this Act are: (i) data may only be used for the specific purposes for which it was collected, (ii) with certain exceptions, data may only be shared with other parties with key individual's authorizations, (iii) with certain exceptions, key individual's have a right to know about personally-relevant data. (iv)

Nursing Research HIPAA Proposal Patient Privacy Protection
Words: 4636 Length: 11 Document Type: Essay

Nursing Research HIPAA Proposal Patient privacy protection is a cornerstone of any patient bill of rights and is a major goal of any nurse or medical professional. Without privacy, the basis of trust necessary to facilitate patient healing simply can not occur. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) increasingly dominates the nursing landscape. Safeguarding private patient information is not just important. It is the law. HIPAA provides

Privacy of an Individual in the Workplace
Words: 2222 Length: 8 Document Type: Essay

Privacy of an Individual in the Workplace Argument Length: 2,000 words Task Construct argument notion individual's privacy important consideration workplace, Use ethical theory support position. Rationale This task designed: demonstrate capacity understand evaluate privacy; demonstrate understanding issues encroach individual's privacy workplace; demonstrate ability construct a compelling argument logically consistent supported ethical theory; Privacy of an individual in the workplace In the workplace, it is expected that employees must relinquish some of their most

USA Patriot Act
Words: 1150 Length: 3 Document Type: Research Paper

Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism is the extended terminology that refers to the U.S.A. Patriot Act which, following the events of 9/11 was passed by the Senate immediately and almost unanimously. When the Pentagon and the World Trade Center were attacked in 2001, concerns over national security and America's susceptibility to terrorist threats emerged more so as the country remained baffled

US Obligation to Privacy
Words: 1076 Length: 4 Document Type: Essay

Privacy & Civil Liberties needs to communicate goals to the American public that include protecting the nation against threats to national security, ensuring the safety of citizens, friends, allies, and nations with cooperative relationships (Clarke, 2013). Promote national security and foreign policy interests, including counterintelligence, counteracting, and international elements of organized crime. Protect the right to privacy. Protect democracy, civil liberties, and the rule of law, eliminating excessive surveillance and unjustified

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now