From the Learning Activity titled “Privacy Protection,” (please see the attached notes) identify two of the U.S. Federal Privacy Rights and Laws listed. Now, imagine you are a business analyst. What are some considerations you would make to ensure customer data is protected? In terms of creating a privacy policy, who would you involve in this process and why? If a manager asked you to provide him with a list of all customer emails for a marketing campaign, how would you respond? How would you determine if providing the list would be a violation of the company’s privacy policy?
From the Learning Activity titled “Privacy Protection,” (please see the attached notes) identify two of the U.S. Federal Privacy Rights and Laws listed. Now, imagine you are a business analyst. What are some considerations you would make to ensure customer data is protected? In terms of creating a privacy policy, who would you involve in this process and why? If a manager asked you to provide him with a list of all customer emails for a marketing campaign, how would you respond? How would you determine if providing the list would be a violation of the company’s privacy policy?
Chapter1: Taking Risks And Making Profits Within The Dynamic Business Environment
Section: Chapter Questions
Problem 1CE
Related questions
Question
Q3- From the Learning Activity titled “Privacy Protection,” (please see the attached notes) identify two of the U.S. Federal Privacy Rights and Laws listed. Now, imagine you are a business analyst. What are some considerations you would make to ensure customer data is protected? In terms of creating a privacy policy, who would you involve in this process and why? If a manager asked you to provide him with a list of all customer emails for a marketing campaign, how would you respond? How would you determine if providing the list would be a violation of the company’s privacy policy?
Note- Privacy Protection is attached to view.

Transcribed Image Text:Privacy Protection
As you read this section on privacy rights in the U.S. and data protection laws in Europe,
consider the ethical and social issues that arise for businesses using information technology in
relation to employee and customer privacy. Share your thoughts about the ethical
implications of this practice in the Discussion Board. Be sure to respond to at least one other
post on this topic.
Privacy and freedom are important parts of every American's life, although many take these
rights for granted. Privacy is the right individuals have to be left alone, unobstructed, and free
from unwarranted interference or surveillance. When this right exists, it extends to all
individuals and protects them from other individuals, organizations, and government
agencies. Freedom refers to the absence of undue restriction or confinement and the
opportunity to exercise all inherent rights.
Privacy rights are protected in many countries, including the United States, Canada, and many
European nations. In the United States, the Bill of Rights within the Constitution protects not
only the right to privacy but also freedoms of speech, religion, and association. Table 2.1 lists
federal privacy rights and laws in the United States.
Table 2.1 U.S. Federal Privacy Rights and Laws
Federal Privacy Laws and Rights
Fourth Amendment to the Constitution
(1791)
Freedom of Information Act of 1966
Privacy Act of 1974
Protections
Protects against unreasonable search and
seizure
Allows access to federal agency records
Establishes a code of fair information
practices
Electronic Communication Privacy Act of
1986
Computer Matching and Privacy Protection
Act of 1988
Computer Security Act of 1987
Federal Managers Financial Integrity Act of
1982
E-Government Act of 2002
Extends restrictions on wire taps to
computer data
Extends privacy act of 1974 to include
computers
Requires computer security for sensitive
information
Requires evaluation of executive agency
accounting
Improves citizen access to government
information
In business, rights to privacy and certain freedoms also exist. However, every day millions of
employees are watched, listened to, and visually and audibly recorded. Information
technology and high-tech data retrieval systems threaten the privacy and freedoms of many
workers across the country by making the surveillance and recording of employee actions and
conversations not only very easy, but also relatively cheap, effective, and in some cases
profitable.
For example, senior-level management at Cyclops Investment Services discovers that
employees are giving less than stellar investment advice to their clients over the phone and
via private emails. If management in this case violates the privacy of its employees by
accessing their emails or by electronically recording telephone conversations, it may find that
it can better control the investment advice given to clients. However, is it worth the invasion
of privacy, even if there may potentially be greater profits in doing so? Dilemmas like these
are faced by senior level managers in a wide variety of companies every day.
European Data Protection

Transcribed Image Text:There is a much higher standard of rights of privacy of consumers in Europe than in the
United States. In Europe, businesses are not allowed to use the personal information of their
customers without prior consent. Such consent, referred to as informed consent, can only be
given when there is knowledge by the consent giver of all of the facts and information
required to make a rational decision. European countries also have tighter protection as to
what personal data may be transmitted across county borders and out of the European
Union. This has led to interesting court cases as Web servers within a country make data
available to the Internet without consideration that the data may be accessed from clients
(browsers) outside the borders. Court rulings have upheld that just because data
was available beyond borders does not mean that it was accessed beyond the borders,
therefore not in violation of privacy laws.
Although the United States does not have the same level of consumer protections in place,
U.S. companies must adhere to these stricter guidelines and provisions when doing business
with European companies or with European consumers. Although there may not be
government enforcement of such policies, safe harbor frameworks are in place. A safe
harbor is a self-regulating policy that, in absence of government regulation or enforcement,
acts to meet regulations set by governments. With safe harbor policies in place, European
and American joint business ventures thrive.
Technology integration provides opportunities to both serve organizations and their
customers. However, it also opens up the possibility of infringing on individuals' privacy and
freedom. Organizations that utilize voice over IP (VOIP) telephone service are able to provide
exception services beyond what a more traditional private branch exchange (PBX) system can
provide. When a customer calls into a VoIP system, the system is capable of looking up the
caller's phone number, looking up past communications (orders, problem resolution, and
anything else that the organization has stored), all before the call has been answered. As a
customer's call may be transferred, all data associated with the call is also transferred. This
may be great for customer service, but also reduces the privacy of the caller and the ability
for an anonymous inquiry is lost.
Next ActivityScroll To Top
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 2 steps

Recommended textbooks for you

Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education

Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON

Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning

Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education

Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON

Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning

Management Information Systems: Managing The Digi…
Management
ISBN:
9780135191798
Author:
Kenneth C. Laudon, Jane P. Laudon
Publisher:
PEARSON

Business Essentials (12th Edition) (What's New in…
Management
ISBN:
9780134728391
Author:
Ronald J. Ebert, Ricky W. Griffin
Publisher:
PEARSON

Fundamentals of Management (10th Edition)
Management
ISBN:
9780134237473
Author:
Stephen P. Robbins, Mary A. Coulter, David A. De Cenzo
Publisher:
PEARSON