Knowledge

Consumer privacy

Source đź“ť

207:
privacy issues and supporting confidential agreements. Whether a firm provides services or products to consumers, firms are expected to use methods such as obfuscation or encoding methods to cover up consumer data when analyzing data or trends for example. Firms are also expected to protect consumer privacy both within the organizations themselves and from outside third entities including third party providers of services, suppliers who provide product components and supplies, and government institutions or community partnership organizations. In addition, businesses are sometime required to provide an agreement/contract to service clients or product consumer that states customer or client information and data will be kept confidential and that it will not be used for advertising or promotional purposes for example. The US government, including the FTC, have
328:, commercial organizations also cannot spend unlimited funds on precautions while remaining competitive; a commercial context tends to limit privacy measures and to motivate organizations to share data when working in partnership. The damage done by privacy loss is not measurable, nor can it be undone, and commercial organizations have little or no interest in taking unprofitable measures to drastically increase the privacy of customers. Corporations may be inclined to share data for commercial advantage and fail to officially recognize it as sensitive to avoid legal liability in the chance that lapses of security may occur. This has led to many 402:)—had access to unprecedented levels of information: the direct customer's communication habits and correspondents and the data of those who shared the household. Telephone operators could frequently hear conversations—inadvertently or deliberately—and their job required them to dial the exact numbers. The data gathering required for the process of billing began to become a privacy risk as well. Accordingly, strong rules on operator behaviour, customer confidentiality, records keeping and destruction were enforced on telephone companies in every country. Typically only police and military authorities had legal powers to 351:. In the US and Canada, telecom data must be kept for seven years to permit dispute and consultation about phone charges. These sensitivities have led telecom regulation to be a leader in consumer privacy regulation, enforcing a high level of confidentiality on the sensitive customer communication records. The focus of consumer rights activists on the telecoms industry has super-sided as other industries also gather sensitive consumer data. Such common commercial measures as software-based 1737: 22: 263:
are approaches taken by commercial organizations to ensure that confidential customer data is not stolen or abused. Since most organizations have strong competitive incentives to retain exclusive access to customer data, and since customer trust is usually a high priority, most companies take some
206:
Businesses have consumer data and information obtained from consumer and client purchases, products, and services. Thus, businesses have the responsibility to keep these data and information safe and confidential. Consumers expect that businesses will take an active stance when protecting consumer
578:
solely due to their political views, and there appears to be minimal public will to stop practices of this nature. The need for stricter laws is more pronounced after the American web service provider, Yahoo admitted that sensitive information (including email addresses and passwords) of half a
438:
was applied in these situations. But in the 1980s, smaller organizations also began to get access to computer hardware and software, and these simply did not have the procedures or personnel or expertise, nor less the time, to take rigorous measures to protect their customers. Meanwhile, via
178:
is the use of laws and regulations to protect individuals from privacy loss due to the failures and limitations of corporate customer privacy measures. Corporations may be inclined to share data for commercial advantage and fail to officially recognize it as sensitive to avoid
387:, which includes a requirement for doctors to avoid mentioning the ills of patients to others—not only to protect them, but to protect their families— and also recognizes that innocent third parties can be harmed by the loss of control of sensitive personal information. 168:. Consumer concerned about the invasion of individual information, thus doubtful when thinking about using certain services. Many organizations have a competitive incentive to collect, retain, and use customer data for various purposes, and many companies adopt 307:, for example, protects the use of consumer privacy data by firms and governments. This act makes it harder for firms to extract personal information from consumers and use it for commercial purposes. Some of the rights included in this act include: 359:
tend to drastically increase the amount of information gathered (and sometimes shared). These very drastically increase privacy risks and have accelerated the shift to regulation, rather than relying on the corporate desire to preserve goodwill.
427:
began to acquire sensitive data, but there were few or no regulations in place to prevent them from sharing or abusing the data. Customer trust and goodwill were generally thought to be sufficient in first-world countries, notably the
558:, have occupied advocates of strong privacy measures. Whereas it may have appeared prior to 2002 that commercial organizations and the consumer data they gathered were of primary concern, it has appeared since then in most 579:
billion users was stolen by hackers in 2014. The data breach was a massive setback for the company and raised several questions about the revelation of the news after two years of the hacking incident.
1255: 383:
has no such law and relies on corporate customer privacy disclosed in privacy policies to ensure consumer privacy in general. Modern privacy law and regulation may be compared to parts of the
268:
measures to protect customer privacy. There is also a concern that companies may sell consumer data if they have to declare bankruptcy, although it often violates their own privacy policies.
1364: 235:
who enforced strong measures to protect customer privacy. Harsh punitive measures were passed as the result of failing to keep a customer's information private. In modern times, the
1359: 1409: 347:—require collecting a vast array of information about users' activities in the course of business, and may also require consultation of these data to prepare 1424: 1305: 522:
around the 1990s, the mere mention of a client's name in a semi-public social setting was enough to earn a junior bank executive a stiff jail sentence.
1636: 1344: 498:
brought the situation to the forefront, and most countries had to implement strong consumer privacy laws, often over the objections of business. The
458:) that could store a large amount of data in a portable location. Explicit regulation of consumer privacy gained further support, especially in the 1601: 1540: 1429: 1104: 1075: 908: 187:
had access to unprecedented levels of information. Customer privacy measures were seen as deficient to deal with the many hazards of corporate
215:
and Data Transparency and Privacy Act. Individuals States have laws and regulation that protect consumers as well. One example of this is The
183:
in the chance that lapses of security may occur. Modern consumer privacy law originated from telecom regulation when it was recognized that a
1295: 1374: 1040:
Foxman, Ellen R., and Paula Kilcoyne (March 1, 1993). "Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues".
271:
The measures companies take to protect consumer privacy vary in effectiveness, and would not typically meet the much higher standards of
450:
Gradually, customer privacy measures were seen as deficient to deal with the many hazards of corporate data sharing, corporate mergers,
645:
Foxman, Ellen R.; Kilcoyne, Paula (March 1993). "Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues".
1384: 1300: 1290: 1118: 399: 768:
Lee, Dong-Joo (June 2011). "Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection".
518:(where no federal law for consumer privacy exists, although there are requirements specific to banking and telecom privacy). In 86: 1616: 884: 539: 531: 58: 1439: 1245: 1089:
Papacharissi, Zizi, and Jan Fernback. "Online privacy and consumer protection: An analysis of portal privacy statements".
690:"Revealing or concealing: privacy information disclosure in intelligent voice assistant usage- a configurational approach" 1596: 1404: 1394: 1354: 624: 65: 1336: 1310: 1270: 1143: 1513: 1434: 1419: 1315: 1179: 599: 212: 105: 39: 1202: 487: 352: 689: 72: 1389: 1320: 1285: 304: 216: 1611: 1591: 1545: 1508: 1414: 1369: 604: 43: 406:
or see records. Even stricter requirements emerged for various banks' electronic records. In some countries,
1518: 1349: 1324: 736: 311:
The right to know about the personal information a business collects about them and how it is used and shared
54: 172:
measures to control this data and manage customer expectations and legal requirements for consumer privacy.
1379: 470:); it was possible to violate privacy within the EU simply doing these things from different places in the 1399: 550:
have tended to go unheard of as questions of citizen privacy versus the state, and the development of a
1631: 1575: 1555: 1280: 1240: 128:
A variety of social, legal and political issues arise from the interaction of the public's potential
192: 1626: 1621: 1493: 1275: 32: 999: 1667: 1265: 1260: 1207: 879:. Klaus Matthias Miller, Yuxi Jin, Lennart Kraft, René Laub, Julia Schmitt. Frankfurt am Main. 471: 272: 244: 161: 129: 79: 1646: 1217: 1172: 1098: 1069: 390:
Modern consumer privacy law originated from telecom regulation when it was recognized that a
1465: 1250: 265: 169: 152:
and bankers who enforced strong measures to protect customer privacy. In modern times, the
8: 1766: 1682: 1550: 1535: 1485: 1222: 940: 594: 325: 300: 208: 122: 239:
of most professions specify privacy measures for the consumer of any service, including
1722: 1057: 1017: 982: 958: 923: 902: 807: 785: 717: 670: 467: 340: 506:
passed particularly strong laws that were used as a template for more limited laws in
1761: 1692: 1475: 1061: 1022: 1004: 963: 945: 890: 880: 744: 721: 709: 674: 662: 563: 543: 451: 407: 391: 333: 296: 248: 196: 184: 165: 1771: 1740: 1606: 1565: 1503: 1212: 1165: 1049: 1012: 994: 953: 935: 808:"Coming to a Retailer near You: Consumer Privacy Protection in Retail Bankruptcies" 777: 701: 654: 559: 495: 444: 440: 424: 384: 314:
The right to delete personal information collected from them (with some exceptions)
410:
is a major focus of the economy, with severe criminal penalties for violating it.
1470: 1460: 567: 463: 292: 240: 180: 157: 363:
Concerns have led to consumer privacy laws in most countries, especially in the
1707: 1687: 1560: 1053: 658: 619: 555: 499: 483: 462:, where each nation had laws that were incompatible (e.g., some restricted the 459: 364: 256: 252: 156:
of various professions specify measures to protect customer privacy, including
894: 705: 1755: 1677: 1672: 1570: 1530: 1525: 1008: 949: 748: 713: 666: 547: 535: 515: 434: 429: 380: 356: 834:
State of California - Department of Justice - Office of the Attorney General
1717: 1498: 1026: 967: 874: 551: 329: 276: 236: 188: 153: 1712: 1232: 614: 575: 546:
in legislators' minds. Accordingly, concerns of consumer privacy in the
503: 455: 372: 317:
The right to opt-out of the sale or sharing of their personal information
200: 789: 735:
Morey, Timothy; Forbath, Theodore “Theo”; Schoop, Allison (2015-05-01).
1697: 571: 280: 1662: 781: 507: 368: 1039: 21: 589: 491: 395: 344: 145: 141: 137: 829: 203:) that could store a large amount of data in a portable location. 1188: 609: 519: 403: 348: 284: 228: 149: 1088: 320:
The right to non-discrimination for exercising their CCPA rights
511: 376: 1702: 1144:"Yahoo faces questions after hack of half a billion accounts" 227:
Consumer privacy concerns date back to the first commercial
1641: 1123:
Essays, Research Papers and Articles on Business Management
232: 133: 1157: 288: 125:
as it relates to the consumers of products and services.
876:
The impact of the GDPR on the online advertising market
983:"Hippocratic oath: Losing relevance in today's world?" 737:"Customer Data: Designing for Transparency and Trust" 432:, to ensure the protection of truly sensitive data; 854:
Vagle, Jeffrey L. "Cybersecurity and Moral Hazard".
1119:"Consumer Privacy: Meaning, Principles and Example" 148:privacy concerns date back to the first commercial 46:. Unsourced material may be challenged and removed. 1637:International Association of Privacy Professionals 734: 1753: 1602:Computer Professionals for Social Responsibility 924:"The Physician's Oath: Historical Perspectives" 423:Through the 1970s, many other organizations in 1091:Journal of Broadcasting & Electronic Media 644: 251:. These codes are particularly important in a 1173: 255:, where no privacy in any form nor limits on 1103:: CS1 maint: multiple names: authors list ( 1074:: CS1 maint: multiple names: authors list ( 981:Indla, Vishal; Radhika, M. S. (April 2019). 980: 1000:10.4103/psychiatry.IndianJPsychiatry_140_19 447:, companies were acquiring ever more data. 199:, and theft of data storage devices (e.g., 1180: 1166: 907:: CS1 maint: location missing publisher ( 454:, and theft of data storage devices (e.g. 379:. Notably, among developed countries, the 1016: 998: 957: 939: 106:Learn how and when to remove this message 1042:Journal of Public Policy & Marketing 830:"California Consumer Privacy Act (CCPA)" 694:Industrial Management & Data Systems 647:Journal of Public Policy & Marketing 482:Through the 1990s, the proliferation of 132:and the collection and dissemination of 687: 1754: 872: 801: 799: 688:Cao, Gaohui; Wang, Ping (2022-05-16). 574:). Indeed, people have recently been 324:Since companies operate to generate a 1617:Electronic Privacy Information Center 1161: 921: 812:Emory Bankruptcy Developments Journal 164:. State interests include matters of 941:10.4103/HEARTVIEWS.HEARTVIEWS_131_17 805: 261:Corporate customer privacy practices 44:adding citations to reliable sources 15: 1597:Center for Democracy and Technology 796: 767: 625:Personally identifiable information 295:measures in medicine, nor rigorous 13: 562:to be much less of a concern than 14: 1783: 853: 600:Information technology management 213:Telephone Consumer Protection Act 1736: 1735: 1203:Right of access to personal data 488:customer relationship management 353:customer relationship management 20: 1136: 1111: 1082: 1033: 974: 466:, the data compilation and the 305:California Consumer Privacy Act 217:California Consumer Privacy Act 31:needs additional citations for 1612:Electronic Frontier Foundation 1592:American Civil Liberties Union 1546:Privacy-enhancing technologies 915: 866: 856:Stanford Technology Law Review 847: 822: 761: 728: 681: 638: 605:Management information systems 542:, privacy took a back-seat to 259:oversight or data use exists. 222: 1: 631: 987:Indian Journal of Psychiatry 398:(known in many nations as a 7: 1337:Data protection authorities 1187: 582: 474:as it existed before 1992. 176:Consumer privacy protection 10: 1788: 1541:Social networking services 1054:10.1177/074391569501200111 659:10.1177/074391569501200111 413: 301:intelligence organizations 1731: 1655: 1632:Global Network Initiative 1584: 1576:Virtual assistant privacy 1556:Privacy-invasive software 1484: 1448: 1335: 1231: 1195: 706:10.1108/IMDS-08-2021-0485 299:measures in military and 525: 477: 418: 355:, rewards programs, and 1627:Future of Privacy Forum 1622:European Digital Rights 741:Harvard Business Review 514:and some states of the 1668:Cellphone surveillance 1585:Advocacy organizations 1208:Expectation of privacy 993:(Suppl 4): S773–S775. 922:Hajar, Rachel (2017). 873:Skiera, Bernd (2022). 570:(e.g., as violated by 486:, the introduction of 472:European Common Market 339:Some services—notably 273:client confidentiality 245:client confidentiality 162:client confidentiality 130:expectation of privacy 1647:Privacy International 1218:Right to be forgotten 490:, and the use of the 1150:. 23 September 2016. 806:Siam, Kayla (2017). 266:security engineering 170:security engineering 40:improve this article 1683:Global surveillance 1551:Privacy engineering 1536:Personal identifier 1486:Information privacy 1223:Post-mortem privacy 595:Information privacy 576:stopped at airports 209:consumer protection 123:information privacy 1723:Personality rights 540:September 11, 2001 468:data dissemination 341:telecommunications 55:"Consumer privacy" 1749: 1748: 1693:Mass surveillance 886:978-3-9824173-0-1 564:political privacy 560:developed nations 544:national security 532:terrorist attacks 496:developed nations 452:employee turnover 425:developed nations 408:financial privacy 392:telephone company 334:privacy violation 297:national security 249:national security 197:employee turnover 193:corporate mergers 185:telephone company 166:national security 116: 115: 108: 90: 1779: 1739: 1738: 1607:Data Privacy Lab 1566:Privacy software 1213:Right to privacy 1182: 1175: 1168: 1159: 1158: 1152: 1151: 1140: 1134: 1133: 1131: 1130: 1115: 1109: 1108: 1102: 1094: 1086: 1080: 1079: 1073: 1065: 1037: 1031: 1030: 1020: 1002: 978: 972: 971: 961: 943: 919: 913: 912: 906: 898: 870: 864: 863: 851: 845: 844: 842: 841: 826: 820: 819: 803: 794: 793: 782:10.2307/23044050 765: 759: 758: 756: 755: 732: 726: 725: 700:(5): 1215–1245. 685: 679: 678: 642: 445:rewards programs 441:target marketing 385:Hippocratic Oath 357:target marketing 119:Consumer privacy 111: 104: 100: 97: 91: 89: 48: 24: 16: 1787: 1786: 1782: 1781: 1780: 1778: 1777: 1776: 1752: 1751: 1750: 1745: 1727: 1651: 1580: 1480: 1444: 1331: 1325:amended in 2020 1227: 1191: 1186: 1156: 1155: 1142: 1141: 1137: 1128: 1126: 1117: 1116: 1112: 1096: 1095: 1087: 1083: 1067: 1066: 1038: 1034: 979: 975: 920: 916: 900: 899: 887: 871: 867: 862:(2020): 71–113. 852: 848: 839: 837: 828: 827: 823: 804: 797: 766: 762: 753: 751: 733: 729: 686: 682: 643: 639: 634: 629: 585: 568:medical privacy 528: 480: 464:data collection 421: 416: 293:patient privacy 241:medical privacy 225: 181:legal liability 158:medical privacy 112: 101: 95: 92: 49: 47: 37: 25: 12: 11: 5: 1785: 1775: 1774: 1769: 1764: 1747: 1746: 1744: 1743: 1732: 1729: 1728: 1726: 1725: 1720: 1715: 1710: 1708:Search warrant 1705: 1700: 1695: 1690: 1688:Identity theft 1685: 1680: 1675: 1670: 1665: 1659: 1657: 1653: 1652: 1650: 1649: 1644: 1639: 1634: 1629: 1624: 1619: 1614: 1609: 1604: 1599: 1594: 1588: 1586: 1582: 1581: 1579: 1578: 1573: 1568: 1563: 1561:Privacy policy 1558: 1553: 1548: 1543: 1538: 1533: 1528: 1523: 1522: 1521: 1516: 1511: 1501: 1496: 1490: 1488: 1482: 1481: 1479: 1478: 1473: 1468: 1463: 1458: 1452: 1450: 1446: 1445: 1443: 1442: 1440:United Kingdom 1437: 1432: 1427: 1422: 1417: 1412: 1407: 1402: 1397: 1392: 1387: 1382: 1377: 1372: 1367: 1362: 1357: 1355:European Union 1352: 1347: 1341: 1339: 1333: 1332: 1330: 1329: 1328: 1327: 1313: 1311:United Kingdom 1308: 1303: 1298: 1293: 1288: 1283: 1278: 1273: 1271:European Union 1268: 1263: 1258: 1253: 1248: 1243: 1237: 1235: 1229: 1228: 1226: 1225: 1220: 1215: 1210: 1205: 1199: 1197: 1193: 1192: 1185: 1184: 1177: 1170: 1162: 1154: 1153: 1135: 1110: 1081: 1032: 973: 934:(4): 154–159. 914: 885: 865: 846: 821: 795: 760: 727: 680: 653:(1): 106–119. 636: 635: 633: 630: 628: 627: 622: 620:Privacy policy 617: 612: 607: 602: 597: 592: 586: 584: 581: 556:carceral state 527: 524: 500:European Union 484:mobile telecom 479: 476: 460:European Union 420: 417: 415: 412: 394:—especially a 365:European Union 322: 321: 318: 315: 312: 253:carceral state 224: 221: 211:laws like The 114: 113: 96:September 2012 28: 26: 19: 9: 6: 4: 3: 2: 1784: 1773: 1770: 1768: 1765: 1763: 1760: 1759: 1757: 1742: 1734: 1733: 1730: 1724: 1721: 1719: 1716: 1714: 1711: 1709: 1706: 1704: 1701: 1699: 1696: 1694: 1691: 1689: 1686: 1684: 1681: 1679: 1678:Eavesdropping 1676: 1674: 1673:Data security 1671: 1669: 1666: 1664: 1661: 1660: 1658: 1654: 1648: 1645: 1643: 1640: 1638: 1635: 1633: 1630: 1628: 1625: 1623: 1620: 1618: 1615: 1613: 1610: 1608: 1605: 1603: 1600: 1598: 1595: 1593: 1590: 1589: 1587: 1583: 1577: 1574: 1572: 1571:Secret ballot 1569: 1567: 1564: 1562: 1559: 1557: 1554: 1552: 1549: 1547: 1544: 1542: 1539: 1537: 1534: 1532: 1531:Personal data 1529: 1527: 1524: 1520: 1517: 1515: 1512: 1510: 1507: 1506: 1505: 1502: 1500: 1497: 1495: 1492: 1491: 1489: 1487: 1483: 1477: 1474: 1472: 1469: 1467: 1464: 1462: 1459: 1457: 1454: 1453: 1451: 1447: 1441: 1438: 1436: 1433: 1431: 1428: 1426: 1423: 1421: 1418: 1416: 1413: 1411: 1408: 1406: 1403: 1401: 1398: 1396: 1393: 1391: 1388: 1386: 1383: 1381: 1378: 1376: 1373: 1371: 1368: 1366: 1363: 1361: 1358: 1356: 1353: 1351: 1348: 1346: 1343: 1342: 1340: 1338: 1334: 1326: 1322: 1319: 1318: 1317: 1316:United States 1314: 1312: 1309: 1307: 1304: 1302: 1299: 1297: 1294: 1292: 1289: 1287: 1284: 1282: 1279: 1277: 1274: 1272: 1269: 1267: 1264: 1262: 1259: 1257: 1254: 1252: 1249: 1247: 1244: 1242: 1239: 1238: 1236: 1234: 1230: 1224: 1221: 1219: 1216: 1214: 1211: 1209: 1206: 1204: 1201: 1200: 1198: 1194: 1190: 1183: 1178: 1176: 1171: 1169: 1164: 1163: 1160: 1149: 1145: 1139: 1124: 1120: 1114: 1106: 1100: 1092: 1085: 1077: 1071: 1063: 1059: 1055: 1051: 1047: 1043: 1036: 1028: 1024: 1019: 1014: 1010: 1006: 1001: 996: 992: 988: 984: 977: 969: 965: 960: 955: 951: 947: 942: 937: 933: 929: 925: 918: 910: 904: 896: 892: 888: 882: 878: 877: 869: 861: 857: 850: 835: 831: 825: 817: 813: 809: 802: 800: 791: 787: 783: 779: 776:(2): 428–A8. 775: 771: 770:MIS Quarterly 764: 750: 746: 742: 738: 731: 723: 719: 715: 711: 707: 703: 699: 695: 691: 684: 676: 672: 668: 664: 660: 656: 652: 648: 641: 637: 626: 623: 621: 618: 616: 613: 611: 608: 606: 603: 601: 598: 596: 593: 591: 588: 587: 580: 577: 573: 569: 565: 561: 557: 553: 549: 548:United States 545: 541: 537: 536:United States 533: 523: 521: 517: 516:United States 513: 509: 505: 501: 497: 493: 489: 485: 475: 473: 469: 465: 461: 457: 453: 448: 446: 442: 437: 436: 435:caveat emptor 431: 430:United States 426: 411: 409: 405: 401: 397: 393: 388: 386: 382: 381:United States 378: 374: 370: 366: 361: 358: 354: 350: 346: 342: 337: 335: 332:and customer 331: 330:moral hazards 327: 319: 316: 313: 310: 309: 308: 306: 302: 298: 294: 290: 286: 282: 278: 277:ethical codes 274: 269: 267: 262: 258: 254: 250: 246: 242: 238: 237:ethical codes 234: 230: 220: 218: 214: 210: 204: 202: 198: 194: 190: 186: 182: 177: 173: 171: 167: 163: 159: 155: 154:ethical codes 151: 147: 143: 139: 135: 131: 126: 124: 120: 110: 107: 99: 88: 85: 81: 78: 74: 71: 67: 64: 60: 57: â€“  56: 52: 51:Find sources: 45: 41: 35: 34: 29:This article 27: 23: 18: 17: 1718:Human rights 1455: 1233:Privacy laws 1148:The Guardian 1147: 1138: 1127:. Retrieved 1125:. 2016-06-22 1122: 1113: 1099:cite journal 1090: 1084: 1070:cite journal 1045: 1041: 1035: 990: 986: 976: 931: 927: 917: 875: 868: 859: 855: 849: 838:. Retrieved 836:. 2018-10-15 833: 824: 815: 811: 773: 769: 763: 752:. Retrieved 740: 730: 697: 693: 683: 650: 646: 640: 552:police state 534:against the 529: 481: 449: 433: 422: 389: 362: 343:, including 338: 323: 270: 260: 226: 205: 189:data sharing 175: 174: 127: 118: 117: 102: 93: 83: 76: 69: 62: 50: 38:Please help 33:verification 30: 1713:Wiretapping 1425:Switzerland 1410:South Korea 1400:Philippines 1390:Netherlands 1385:Isle of Man 1306:Switzerland 1286:New Zealand 1048:: 106–119. 928:Heart Views 615:Privacy law 504:New Zealand 456:hard drives 373:New Zealand 336:incidents. 281:legal codes 275:applied by 223:Legislation 201:hard drives 1767:E-commerce 1756:Categories 1698:Panopticon 1321:California 1196:Principles 1129:2020-12-06 895:1303894344 840:2024-02-23 818:: 487–521. 754:2024-04-22 632:References 572:biometrics 530:After the 138:businesses 66:newspapers 1663:Anonymity 1499:Financial 1476:Workplace 1466:Education 1375:Indonesia 1345:Australia 1301:Sri Lanka 1296:Singapore 1241:Australia 1062:158361537 1009:0019-5545 950:1995-705X 903:cite book 749:0017-8012 722:248313942 714:0263-5577 675:158361537 667:0748-6766 508:Australia 369:Australia 142:merchants 1762:Consumer 1741:Category 1656:See also 1509:Facebook 1504:Internet 1456:Consumer 1430:Thailand 1027:31040472 968:29326783 790:23044050 590:Big data 583:See also 492:Internet 396:monopoly 345:Internet 229:couriers 150:couriers 146:Consumer 1772:Privacy 1519:Twitter 1471:Medical 1461:Digital 1380:Ireland 1365:Germany 1350:Denmark 1276:Germany 1266:England 1261:Denmark 1189:Privacy 1018:6482690 959:5755201 610:Privacy 520:Austria 414:History 404:wiretap 285:banking 233:bankers 80:scholar 1514:Google 1435:Turkey 1420:Sweden 1405:Poland 1395:Norway 1360:France 1291:Russia 1251:Canada 1246:Brazil 1060:  1025:  1015:  1007:  966:  956:  948:  893:  883:  788:  747:  720:  712:  673:  665:  512:Canada 377:Canada 326:profit 303:. The 291:, nor 247:, and 82:  75:  68:  61:  53:  1703:PRISM 1526:Email 1449:Areas 1415:Spain 1370:India 1281:Ghana 1256:China 1058:S2CID 786:JSTOR 718:S2CID 671:S2CID 526:2000s 478:1990s 419:1970s 349:bills 257:state 87:JSTOR 73:books 1642:NOYB 1105:link 1076:link 1023:PMID 1005:ISSN 964:PMID 946:ISSN 909:link 891:OCLC 881:ISBN 745:ISSN 710:ISSN 663:ISSN 566:and 510:and 502:and 443:and 375:and 231:and 160:and 134:data 59:news 1494:Law 1050:doi 1013:PMC 995:doi 954:PMC 936:doi 778:doi 702:doi 698:122 655:doi 554:or 538:on 494:in 400:PTT 289:law 287:or 283:in 279:or 140:or 136:by 121:is 42:by 1758:: 1323:, 1146:. 1121:. 1101:}} 1097:{{ 1072:}} 1068:{{ 1056:. 1046:12 1044:. 1021:. 1011:. 1003:. 991:61 989:. 985:. 962:. 952:. 944:. 932:18 930:. 926:. 905:}} 901:{{ 889:. 860:67 858:. 832:. 816:33 814:. 810:. 798:^ 784:. 774:35 772:. 743:. 739:. 716:. 708:. 696:. 692:. 669:. 661:. 651:12 649:. 371:, 367:, 243:, 219:. 195:, 191:, 144:. 1181:e 1174:t 1167:v 1132:. 1107:) 1093:. 1078:) 1064:. 1052:: 1029:. 997:: 970:. 938:: 911:) 897:. 843:. 792:. 780:: 757:. 724:. 704:: 677:. 657:: 109:) 103:( 98:) 94:( 84:· 77:· 70:· 63:· 36:.

Index


verification
improve this article
adding citations to reliable sources
"Consumer privacy"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
information privacy
expectation of privacy
data
businesses
merchants
Consumer
couriers
ethical codes
medical privacy
client confidentiality
national security
security engineering
legal liability
telephone company
data sharing
corporate mergers
employee turnover
hard drives
consumer protection

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑