Fundamentals of Information Systems
9th Edition
ISBN: 9781337097536
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 10, Problem 2.2CTQ
Measures that should be taken to avoid potential litigation over any new privacy policy.
Explanation of Solution
To avoid potential litigation over any new privacy policy following measure could be taken:
- Completely understand and disclose your data collection practices: The Company should have clear understanding of what type of data they will be collected from the users and to which purpose they will use. They should make it clear that the data will be used solely for the benefits of its customers not for unethical practices. Once this information is clear and structured you should include this in your privacy policy.
- Avoid collection of unrequired data: You should understand the type of data that is required by you and the volume of this. Only acquire that much data from the customer which is required for business purposes and customer service enhancement...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What measures can be taken to enhance the protection of personal information privacy?
What methods are there for improving information privacy?
When it comes to information, how exactly should one define the concept of privacy?
How many different safety measures should you take in order to protect the privacy of your
personal information?
Chapter 10 Solutions
Fundamentals of Information Systems
Ch. 10 - Prob. 1LOCh. 10 - Prob. 2LOCh. 10 - Prob. 3LOCh. 10 - Prob. 4LOCh. 10 - Prob. 5LOCh. 10 - Prob. 6LOCh. 10 - Prob. 7LOCh. 10 - Prob. 8LOCh. 10 - What is the harm in nonproductive use of...Ch. 10 - Prob. 1.2RQ
Ch. 10 - Prob. 1.1CTQCh. 10 - Prob. 1.2CTQCh. 10 - Prob. 2.1RQCh. 10 - Prob. 2.2RQCh. 10 - Prob. 2.1CTQCh. 10 - Prob. 2.2CTQCh. 10 - Prob. 3.1RQCh. 10 - Prob. 3.2RQCh. 10 - Prob. 3.1CTQCh. 10 - Prob. 3.2CTQCh. 10 - Prob. 4.1RQCh. 10 - Prob. 4.2RQCh. 10 - Prob. 4.1CTQCh. 10 - Prob. 4.2CTQCh. 10 - Prob. 1SATCh. 10 - Prob. 2SATCh. 10 - Prob. 3SATCh. 10 - Prob. 4SATCh. 10 - Prob. 5SATCh. 10 - Prob. 6SATCh. 10 - Prob. 7SATCh. 10 - Prob. 8SATCh. 10 - Prob. 9SATCh. 10 - Prob. 10SATCh. 10 - Prob. 11SATCh. 10 - Prob. 12SATCh. 10 - Prob. 13SATCh. 10 - Prob. 14SATCh. 10 - Prob. 15SATCh. 10 - Prob. 16SATCh. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQCh. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 4DQCh. 10 - Prob. 5DQCh. 10 - Prob. 6DQCh. 10 - Prob. 7DQCh. 10 - Prob. 8DQCh. 10 - Prob. 9DQCh. 10 - Prob. 10DQCh. 10 - Prob. 1PSECh. 10 - Prob. 2PSECh. 10 - Prob. 1WECh. 10 - Prob. 2WECh. 10 - Prob. 3WECh. 10 - Prob. 1CECh. 10 - Prob. 2CECh. 10 - Prob. 3CECh. 10 - Prob. 1.1CSCh. 10 - Prob. 1.2CSCh. 10 - Prob. 1.3CSCh. 10 - Prob. 2.1CSCh. 10 - Prob. 2.2CSCh. 10 - Prob. 2.3CS
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- When it comes to information, how exactly should one define the concept of privacy?How many different safety measures should you take in order to protect the privacy of your personal information?arrow_forwardTo what extent does the term "privacy" apply when discussing information?How many safeguards should you implement to protect your private information?arrow_forwardLegislation imposes limitations on safeguarding confidential information, whereas ethical principles offer direction on how to accomplish this task in a morally appropriate fashion. Privacy What are your opinions or perspectives on the matter at hand?arrow_forward
- What is the definition of privacy in relation to information?In order to secure your personal information, how many precautions should you take?arrow_forwardLegislation imposes limitations on safeguarding confidential information, whereas ethical principles offer direction on how to achieve this objective in a morally appropriate fashion. Privacy What are your opinions or perspectives on the matter at hand?arrow_forwardWhat does it mean to say privacy is a prudential right?arrow_forward
- Why has the expanded use of National Security Letters raised privacy concerns?arrow_forwardWhy Should a Company Keep Their Records Private? Which abuses are conceivable if there are no safeguards pertaining to privacy? What kinds of wrongdoing could be prevented by stricter standards of privacy?arrow_forwardUnderstanding the concept of privacy in relation to the protection of sensitive information may be challenging.arrow_forward
- How can privacy be maintained while using communal facilities like a printer and many computers?arrow_forwardWhat does the word "privacy" signify in its most basic form? Here are five distinct approaches that may be taken to guarantee the safety of the private information you provide.arrow_forwardWhat exactly does "privacy" entail in terms of protecting sensitive information? Does one's sense of privacy alter as they get older, and if so, how does that shift manifest?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning