207:
privacy issues and supporting confidential agreements. Whether a firm provides services or products to consumers, firms are expected to use methods such as obfuscation or encoding methods to cover up consumer data when analyzing data or trends for example. Firms are also expected to protect consumer privacy both within the organizations themselves and from outside third entities including third party providers of services, suppliers who provide product components and supplies, and government institutions or community partnership organizations. In addition, businesses are sometime required to provide an agreement/contract to service clients or product consumer that states customer or client information and data will be kept confidential and that it will not be used for advertising or promotional purposes for example. The US government, including the FTC, have
328:, commercial organizations also cannot spend unlimited funds on precautions while remaining competitive; a commercial context tends to limit privacy measures and to motivate organizations to share data when working in partnership. The damage done by privacy loss is not measurable, nor can it be undone, and commercial organizations have little or no interest in taking unprofitable measures to drastically increase the privacy of customers. Corporations may be inclined to share data for commercial advantage and fail to officially recognize it as sensitive to avoid legal liability in the chance that lapses of security may occur. This has led to many
402:)—had access to unprecedented levels of information: the direct customer's communication habits and correspondents and the data of those who shared the household. Telephone operators could frequently hear conversations—inadvertently or deliberately—and their job required them to dial the exact numbers. The data gathering required for the process of billing began to become a privacy risk as well. Accordingly, strong rules on operator behaviour, customer confidentiality, records keeping and destruction were enforced on telephone companies in every country. Typically only police and military authorities had legal powers to
351:. In the US and Canada, telecom data must be kept for seven years to permit dispute and consultation about phone charges. These sensitivities have led telecom regulation to be a leader in consumer privacy regulation, enforcing a high level of confidentiality on the sensitive customer communication records. The focus of consumer rights activists on the telecoms industry has super-sided as other industries also gather sensitive consumer data. Such common commercial measures as software-based
1737:
22:
263:
are approaches taken by commercial organizations to ensure that confidential customer data is not stolen or abused. Since most organizations have strong competitive incentives to retain exclusive access to customer data, and since customer trust is usually a high priority, most companies take some
206:
Businesses have consumer data and information obtained from consumer and client purchases, products, and services. Thus, businesses have the responsibility to keep these data and information safe and confidential. Consumers expect that businesses will take an active stance when protecting consumer
578:
solely due to their political views, and there appears to be minimal public will to stop practices of this nature. The need for stricter laws is more pronounced after the
American web service provider, Yahoo admitted that sensitive information (including email addresses and passwords) of half a
438:
was applied in these situations. But in the 1980s, smaller organizations also began to get access to computer hardware and software, and these simply did not have the procedures or personnel or expertise, nor less the time, to take rigorous measures to protect their customers. Meanwhile, via
178:
is the use of laws and regulations to protect individuals from privacy loss due to the failures and limitations of corporate customer privacy measures. Corporations may be inclined to share data for commercial advantage and fail to officially recognize it as sensitive to avoid
387:, which includes a requirement for doctors to avoid mentioning the ills of patients to others—not only to protect them, but to protect their families— and also recognizes that innocent third parties can be harmed by the loss of control of sensitive personal information.
168:. Consumer concerned about the invasion of individual information, thus doubtful when thinking about using certain services. Many organizations have a competitive incentive to collect, retain, and use customer data for various purposes, and many companies adopt
307:, for example, protects the use of consumer privacy data by firms and governments. This act makes it harder for firms to extract personal information from consumers and use it for commercial purposes. Some of the rights included in this act include:
359:
tend to drastically increase the amount of information gathered (and sometimes shared). These very drastically increase privacy risks and have accelerated the shift to regulation, rather than relying on the corporate desire to preserve goodwill.
427:
began to acquire sensitive data, but there were few or no regulations in place to prevent them from sharing or abusing the data. Customer trust and goodwill were generally thought to be sufficient in first-world countries, notably the
558:, have occupied advocates of strong privacy measures. Whereas it may have appeared prior to 2002 that commercial organizations and the consumer data they gathered were of primary concern, it has appeared since then in most
579:
billion users was stolen by hackers in 2014. The data breach was a massive setback for the company and raised several questions about the revelation of the news after two years of the hacking incident.
1255:
383:
has no such law and relies on corporate customer privacy disclosed in privacy policies to ensure consumer privacy in general. Modern privacy law and regulation may be compared to parts of the
268:
measures to protect customer privacy. There is also a concern that companies may sell consumer data if they have to declare bankruptcy, although it often violates their own privacy policies.
1364:
235:
who enforced strong measures to protect customer privacy. Harsh punitive measures were passed as the result of failing to keep a customer's information private. In modern times, the
1359:
1409:
347:—require collecting a vast array of information about users' activities in the course of business, and may also require consultation of these data to prepare
1424:
1305:
522:
around the 1990s, the mere mention of a client's name in a semi-public social setting was enough to earn a junior bank executive a stiff jail sentence.
1636:
1344:
498:
brought the situation to the forefront, and most countries had to implement strong consumer privacy laws, often over the objections of business. The
458:) that could store a large amount of data in a portable location. Explicit regulation of consumer privacy gained further support, especially in the
1601:
1540:
1429:
1104:
1075:
908:
187:
had access to unprecedented levels of information. Customer privacy measures were seen as deficient to deal with the many hazards of corporate
215:
and Data
Transparency and Privacy Act. Individuals States have laws and regulation that protect consumers as well. One example of this is The
183:
in the chance that lapses of security may occur. Modern consumer privacy law originated from telecom regulation when it was recognized that a
1295:
1374:
1040:
Foxman, Ellen R., and Paula
Kilcoyne (March 1, 1993). "Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues".
271:
The measures companies take to protect consumer privacy vary in effectiveness, and would not typically meet the much higher standards of
450:
Gradually, customer privacy measures were seen as deficient to deal with the many hazards of corporate data sharing, corporate mergers,
645:
Foxman, Ellen R.; Kilcoyne, Paula (March 1993). "Information
Technology, Marketing Practice, and Consumer Privacy: Ethical Issues".
1384:
1300:
1290:
1118:
399:
768:
Lee, Dong-Joo (June 2011). "Managing
Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection".
518:(where no federal law for consumer privacy exists, although there are requirements specific to banking and telecom privacy). In
86:
1616:
884:
539:
531:
58:
1439:
1245:
1089:
Papacharissi, Zizi, and Jan
Fernback. "Online privacy and consumer protection: An analysis of portal privacy statements".
690:"Revealing or concealing: privacy information disclosure in intelligent voice assistant usage- a configurational approach"
1596:
1404:
1394:
1354:
624:
65:
1336:
1310:
1270:
1143:
1513:
1434:
1419:
1315:
1179:
599:
212:
105:
39:
1202:
487:
352:
689:
72:
1389:
1320:
1285:
304:
216:
1611:
1591:
1545:
1508:
1414:
1369:
604:
43:
406:
or see records. Even stricter requirements emerged for various banks' electronic records. In some countries,
1518:
1349:
1324:
736:
311:
The right to know about the personal information a business collects about them and how it is used and shared
54:
172:
measures to control this data and manage customer expectations and legal requirements for consumer privacy.
1379:
470:); it was possible to violate privacy within the EU simply doing these things from different places in the
1399:
550:
have tended to go unheard of as questions of citizen privacy versus the state, and the development of a
1631:
1575:
1555:
1280:
1240:
128:
A variety of social, legal and political issues arise from the interaction of the public's potential
192:
1626:
1621:
1493:
1275:
32:
999:
1667:
1265:
1260:
1207:
879:. Klaus Matthias Miller, Yuxi Jin, Lennart Kraft, René Laub, Julia Schmitt. Frankfurt am Main.
471:
272:
244:
161:
129:
79:
1646:
1217:
1172:
1098:
1069:
390:
Modern consumer privacy law originated from telecom regulation when it was recognized that a
1465:
1250:
265:
169:
152:
and bankers who enforced strong measures to protect customer privacy. In modern times, the
8:
1766:
1682:
1550:
1535:
1485:
1222:
940:
594:
325:
300:
208:
122:
239:
of most professions specify privacy measures for the consumer of any service, including
1722:
1057:
1017:
982:
958:
923:
902:
807:
785:
717:
670:
467:
340:
506:
passed particularly strong laws that were used as a template for more limited laws in
1761:
1692:
1475:
1061:
1022:
1004:
963:
945:
890:
880:
744:
721:
709:
674:
662:
563:
543:
451:
407:
391:
333:
296:
248:
196:
184:
165:
1771:
1740:
1606:
1565:
1503:
1212:
1165:
1049:
1012:
994:
953:
935:
808:"Coming to a Retailer near You: Consumer Privacy Protection in Retail Bankruptcies"
777:
701:
654:
559:
495:
444:
440:
424:
384:
314:
The right to delete personal information collected from them (with some exceptions)
410:
is a major focus of the economy, with severe criminal penalties for violating it.
1470:
1460:
567:
463:
292:
240:
180:
157:
363:
Concerns have led to consumer privacy laws in most countries, especially in the
1707:
1687:
1560:
1053:
658:
619:
555:
499:
483:
462:, where each nation had laws that were incompatible (e.g., some restricted the
459:
364:
256:
252:
156:
of various professions specify measures to protect customer privacy, including
894:
705:
1755:
1677:
1672:
1570:
1530:
1525:
1008:
949:
748:
713:
666:
547:
535:
515:
434:
429:
380:
356:
834:
State of
California - Department of Justice - Office of the Attorney General
1717:
1498:
1026:
967:
874:
551:
329:
276:
236:
188:
153:
1712:
1232:
614:
575:
546:
in legislators' minds. Accordingly, concerns of consumer privacy in the
503:
455:
372:
317:
The right to opt-out of the sale or sharing of their personal information
200:
789:
735:
Morey, Timothy; Forbath, Theodore “Theo”; Schoop, Allison (2015-05-01).
1697:
571:
280:
1662:
781:
507:
368:
1039:
21:
589:
491:
395:
344:
145:
141:
137:
829:
203:) that could store a large amount of data in a portable location.
1188:
609:
519:
403:
348:
284:
228:
149:
1088:
320:
The right to non-discrimination for exercising their CCPA rights
511:
376:
1702:
1144:"Yahoo faces questions after hack of half a billion accounts"
227:
Consumer privacy concerns date back to the first commercial
1641:
1123:
Essays, Research Papers and
Articles on Business Management
232:
133:
1157:
288:
125:
as it relates to the consumers of products and services.
876:
The impact of the GDPR on the online advertising market
983:"Hippocratic oath: Losing relevance in today's world?"
737:"Customer Data: Designing for Transparency and Trust"
432:, to ensure the protection of truly sensitive data;
854:
Vagle, Jeffrey L. "Cybersecurity and Moral Hazard".
1119:"Consumer Privacy: Meaning, Principles and Example"
148:privacy concerns date back to the first commercial
46:. Unsourced material may be challenged and removed.
1637:International Association of Privacy Professionals
734:
1753:
1602:Computer Professionals for Social Responsibility
924:"The Physician's Oath: Historical Perspectives"
423:Through the 1970s, many other organizations in
1091:Journal of Broadcasting & Electronic Media
644:
251:. These codes are particularly important in a
1173:
255:, where no privacy in any form nor limits on
1103:: CS1 maint: multiple names: authors list (
1074:: CS1 maint: multiple names: authors list (
981:Indla, Vishal; Radhika, M. S. (April 2019).
980:
1000:10.4103/psychiatry.IndianJPsychiatry_140_19
447:, companies were acquiring ever more data.
199:, and theft of data storage devices (e.g.,
1180:
1166:
907:: CS1 maint: location missing publisher (
454:, and theft of data storage devices (e.g.
379:. Notably, among developed countries, the
1016:
998:
957:
939:
106:Learn how and when to remove this message
1042:Journal of Public Policy & Marketing
830:"California Consumer Privacy Act (CCPA)"
694:Industrial Management & Data Systems
647:Journal of Public Policy & Marketing
482:Through the 1990s, the proliferation of
132:and the collection and dissemination of
687:
1754:
872:
801:
799:
688:Cao, Gaohui; Wang, Ping (2022-05-16).
574:). Indeed, people have recently been
324:Since companies operate to generate a
1617:Electronic Privacy Information Center
1161:
921:
812:Emory Bankruptcy Developments Journal
164:. State interests include matters of
941:10.4103/HEARTVIEWS.HEARTVIEWS_131_17
805:
261:Corporate customer privacy practices
44:adding citations to reliable sources
15:
1597:Center for Democracy and Technology
796:
767:
625:Personally identifiable information
295:measures in medicine, nor rigorous
13:
562:to be much less of a concern than
14:
1783:
853:
600:Information technology management
213:Telephone Consumer Protection Act
1736:
1735:
1203:Right of access to personal data
488:customer relationship management
353:customer relationship management
20:
1136:
1111:
1082:
1033:
974:
466:, the data compilation and the
305:California Consumer Privacy Act
217:California Consumer Privacy Act
31:needs additional citations for
1612:Electronic Frontier Foundation
1592:American Civil Liberties Union
1546:Privacy-enhancing technologies
915:
866:
856:Stanford Technology Law Review
847:
822:
761:
728:
681:
638:
605:Management information systems
542:, privacy took a back-seat to
259:oversight or data use exists.
222:
1:
631:
987:Indian Journal of Psychiatry
398:(known in many nations as a
7:
1337:Data protection authorities
1187:
582:
474:as it existed before 1992.
176:Consumer privacy protection
10:
1788:
1541:Social networking services
1054:10.1177/074391569501200111
659:10.1177/074391569501200111
413:
301:intelligence organizations
1731:
1655:
1632:Global Network Initiative
1584:
1576:Virtual assistant privacy
1556:Privacy-invasive software
1484:
1448:
1335:
1231:
1195:
706:10.1108/IMDS-08-2021-0485
299:measures in military and
525:
477:
418:
355:, rewards programs, and
1627:Future of Privacy Forum
1622:European Digital Rights
741:Harvard Business Review
514:and some states of the
1668:Cellphone surveillance
1585:Advocacy organizations
1208:Expectation of privacy
993:(Suppl 4): S773–S775.
922:Hajar, Rachel (2017).
873:Skiera, Bernd (2022).
570:(e.g., as violated by
486:, the introduction of
472:European Common Market
339:Some services—notably
273:client confidentiality
245:client confidentiality
162:client confidentiality
130:expectation of privacy
1647:Privacy International
1218:Right to be forgotten
490:, and the use of the
1150:. 23 September 2016.
806:Siam, Kayla (2017).
266:security engineering
170:security engineering
40:improve this article
1683:Global surveillance
1551:Privacy engineering
1536:Personal identifier
1486:Information privacy
1223:Post-mortem privacy
595:Information privacy
576:stopped at airports
209:consumer protection
123:information privacy
1723:Personality rights
540:September 11, 2001
468:data dissemination
341:telecommunications
55:"Consumer privacy"
1749:
1748:
1693:Mass surveillance
886:978-3-9824173-0-1
564:political privacy
560:developed nations
544:national security
532:terrorist attacks
496:developed nations
452:employee turnover
425:developed nations
408:financial privacy
392:telephone company
334:privacy violation
297:national security
249:national security
197:employee turnover
193:corporate mergers
185:telephone company
166:national security
116:
115:
108:
90:
1779:
1739:
1738:
1607:Data Privacy Lab
1566:Privacy software
1213:Right to privacy
1182:
1175:
1168:
1159:
1158:
1152:
1151:
1140:
1134:
1133:
1131:
1130:
1115:
1109:
1108:
1102:
1094:
1086:
1080:
1079:
1073:
1065:
1037:
1031:
1030:
1020:
1002:
978:
972:
971:
961:
943:
919:
913:
912:
906:
898:
870:
864:
863:
851:
845:
844:
842:
841:
826:
820:
819:
803:
794:
793:
782:10.2307/23044050
765:
759:
758:
756:
755:
732:
726:
725:
700:(5): 1215–1245.
685:
679:
678:
642:
445:rewards programs
441:target marketing
385:Hippocratic Oath
357:target marketing
119:Consumer privacy
111:
104:
100:
97:
91:
89:
48:
24:
16:
1787:
1786:
1782:
1781:
1780:
1778:
1777:
1776:
1752:
1751:
1750:
1745:
1727:
1651:
1580:
1480:
1444:
1331:
1325:amended in 2020
1227:
1191:
1186:
1156:
1155:
1142:
1141:
1137:
1128:
1126:
1117:
1116:
1112:
1096:
1095:
1087:
1083:
1067:
1066:
1038:
1034:
979:
975:
920:
916:
900:
899:
887:
871:
867:
862:(2020): 71–113.
852:
848:
839:
837:
828:
827:
823:
804:
797:
766:
762:
753:
751:
733:
729:
686:
682:
643:
639:
634:
629:
585:
568:medical privacy
528:
480:
464:data collection
421:
416:
293:patient privacy
241:medical privacy
225:
181:legal liability
158:medical privacy
112:
101:
95:
92:
49:
47:
37:
25:
12:
11:
5:
1785:
1775:
1774:
1769:
1764:
1747:
1746:
1744:
1743:
1732:
1729:
1728:
1726:
1725:
1720:
1715:
1710:
1708:Search warrant
1705:
1700:
1695:
1690:
1688:Identity theft
1685:
1680:
1675:
1670:
1665:
1659:
1657:
1653:
1652:
1650:
1649:
1644:
1639:
1634:
1629:
1624:
1619:
1614:
1609:
1604:
1599:
1594:
1588:
1586:
1582:
1581:
1579:
1578:
1573:
1568:
1563:
1561:Privacy policy
1558:
1553:
1548:
1543:
1538:
1533:
1528:
1523:
1522:
1521:
1516:
1511:
1501:
1496:
1490:
1488:
1482:
1481:
1479:
1478:
1473:
1468:
1463:
1458:
1452:
1450:
1446:
1445:
1443:
1442:
1440:United Kingdom
1437:
1432:
1427:
1422:
1417:
1412:
1407:
1402:
1397:
1392:
1387:
1382:
1377:
1372:
1367:
1362:
1357:
1355:European Union
1352:
1347:
1341:
1339:
1333:
1332:
1330:
1329:
1328:
1327:
1313:
1311:United Kingdom
1308:
1303:
1298:
1293:
1288:
1283:
1278:
1273:
1271:European Union
1268:
1263:
1258:
1253:
1248:
1243:
1237:
1235:
1229:
1228:
1226:
1225:
1220:
1215:
1210:
1205:
1199:
1197:
1193:
1192:
1185:
1184:
1177:
1170:
1162:
1154:
1153:
1135:
1110:
1081:
1032:
973:
934:(4): 154–159.
914:
885:
865:
846:
821:
795:
760:
727:
680:
653:(1): 106–119.
636:
635:
633:
630:
628:
627:
622:
620:Privacy policy
617:
612:
607:
602:
597:
592:
586:
584:
581:
556:carceral state
527:
524:
500:European Union
484:mobile telecom
479:
476:
460:European Union
420:
417:
415:
412:
394:—especially a
365:European Union
322:
321:
318:
315:
312:
253:carceral state
224:
221:
211:laws like The
114:
113:
96:September 2012
28:
26:
19:
9:
6:
4:
3:
2:
1784:
1773:
1770:
1768:
1765:
1763:
1760:
1759:
1757:
1742:
1734:
1733:
1730:
1724:
1721:
1719:
1716:
1714:
1711:
1709:
1706:
1704:
1701:
1699:
1696:
1694:
1691:
1689:
1686:
1684:
1681:
1679:
1678:Eavesdropping
1676:
1674:
1673:Data security
1671:
1669:
1666:
1664:
1661:
1660:
1658:
1654:
1648:
1645:
1643:
1640:
1638:
1635:
1633:
1630:
1628:
1625:
1623:
1620:
1618:
1615:
1613:
1610:
1608:
1605:
1603:
1600:
1598:
1595:
1593:
1590:
1589:
1587:
1583:
1577:
1574:
1572:
1571:Secret ballot
1569:
1567:
1564:
1562:
1559:
1557:
1554:
1552:
1549:
1547:
1544:
1542:
1539:
1537:
1534:
1532:
1531:Personal data
1529:
1527:
1524:
1520:
1517:
1515:
1512:
1510:
1507:
1506:
1505:
1502:
1500:
1497:
1495:
1492:
1491:
1489:
1487:
1483:
1477:
1474:
1472:
1469:
1467:
1464:
1462:
1459:
1457:
1454:
1453:
1451:
1447:
1441:
1438:
1436:
1433:
1431:
1428:
1426:
1423:
1421:
1418:
1416:
1413:
1411:
1408:
1406:
1403:
1401:
1398:
1396:
1393:
1391:
1388:
1386:
1383:
1381:
1378:
1376:
1373:
1371:
1368:
1366:
1363:
1361:
1358:
1356:
1353:
1351:
1348:
1346:
1343:
1342:
1340:
1338:
1334:
1326:
1322:
1319:
1318:
1317:
1316:United States
1314:
1312:
1309:
1307:
1304:
1302:
1299:
1297:
1294:
1292:
1289:
1287:
1284:
1282:
1279:
1277:
1274:
1272:
1269:
1267:
1264:
1262:
1259:
1257:
1254:
1252:
1249:
1247:
1244:
1242:
1239:
1238:
1236:
1234:
1230:
1224:
1221:
1219:
1216:
1214:
1211:
1209:
1206:
1204:
1201:
1200:
1198:
1194:
1190:
1183:
1178:
1176:
1171:
1169:
1164:
1163:
1160:
1149:
1145:
1139:
1124:
1120:
1114:
1106:
1100:
1092:
1085:
1077:
1071:
1063:
1059:
1055:
1051:
1047:
1043:
1036:
1028:
1024:
1019:
1014:
1010:
1006:
1001:
996:
992:
988:
984:
977:
969:
965:
960:
955:
951:
947:
942:
937:
933:
929:
925:
918:
910:
904:
896:
892:
888:
882:
878:
877:
869:
861:
857:
850:
835:
831:
825:
817:
813:
809:
802:
800:
791:
787:
783:
779:
776:(2): 428–A8.
775:
771:
770:MIS Quarterly
764:
750:
746:
742:
738:
731:
723:
719:
715:
711:
707:
703:
699:
695:
691:
684:
676:
672:
668:
664:
660:
656:
652:
648:
641:
637:
626:
623:
621:
618:
616:
613:
611:
608:
606:
603:
601:
598:
596:
593:
591:
588:
587:
580:
577:
573:
569:
565:
561:
557:
553:
549:
548:United States
545:
541:
537:
536:United States
533:
523:
521:
517:
516:United States
513:
509:
505:
501:
497:
493:
489:
485:
475:
473:
469:
465:
461:
457:
453:
448:
446:
442:
437:
436:
435:caveat emptor
431:
430:United States
426:
411:
409:
405:
401:
397:
393:
388:
386:
382:
381:United States
378:
374:
370:
366:
361:
358:
354:
350:
346:
342:
337:
335:
332:and customer
331:
330:moral hazards
327:
319:
316:
313:
310:
309:
308:
306:
302:
298:
294:
290:
286:
282:
278:
277:ethical codes
274:
269:
267:
262:
258:
254:
250:
246:
242:
238:
237:ethical codes
234:
230:
220:
218:
214:
210:
204:
202:
198:
194:
190:
186:
182:
177:
173:
171:
167:
163:
159:
155:
154:ethical codes
151:
147:
143:
139:
135:
131:
126:
124:
120:
110:
107:
99:
88:
85:
81:
78:
74:
71:
67:
64:
60:
57: –
56:
52:
51:Find sources:
45:
41:
35:
34:
29:This article
27:
23:
18:
17:
1718:Human rights
1455:
1233:Privacy laws
1148:The Guardian
1147:
1138:
1127:. Retrieved
1125:. 2016-06-22
1122:
1113:
1099:cite journal
1090:
1084:
1070:cite journal
1045:
1041:
1035:
990:
986:
976:
931:
927:
917:
875:
868:
859:
855:
849:
838:. Retrieved
836:. 2018-10-15
833:
824:
815:
811:
773:
769:
763:
752:. Retrieved
740:
730:
697:
693:
683:
650:
646:
640:
552:police state
534:against the
529:
481:
449:
433:
422:
389:
362:
343:, including
338:
323:
270:
260:
226:
205:
189:data sharing
175:
174:
127:
118:
117:
102:
93:
83:
76:
69:
62:
50:
38:Please help
33:verification
30:
1713:Wiretapping
1425:Switzerland
1410:South Korea
1400:Philippines
1390:Netherlands
1385:Isle of Man
1306:Switzerland
1286:New Zealand
1048:: 106–119.
928:Heart Views
615:Privacy law
504:New Zealand
456:hard drives
373:New Zealand
336:incidents.
281:legal codes
275:applied by
223:Legislation
201:hard drives
1767:E-commerce
1756:Categories
1698:Panopticon
1321:California
1196:Principles
1129:2020-12-06
895:1303894344
840:2024-02-23
818:: 487–521.
754:2024-04-22
632:References
572:biometrics
530:After the
138:businesses
66:newspapers
1663:Anonymity
1499:Financial
1476:Workplace
1466:Education
1375:Indonesia
1345:Australia
1301:Sri Lanka
1296:Singapore
1241:Australia
1062:158361537
1009:0019-5545
950:1995-705X
903:cite book
749:0017-8012
722:248313942
714:0263-5577
675:158361537
667:0748-6766
508:Australia
369:Australia
142:merchants
1762:Consumer
1741:Category
1656:See also
1509:Facebook
1504:Internet
1456:Consumer
1430:Thailand
1027:31040472
968:29326783
790:23044050
590:Big data
583:See also
492:Internet
396:monopoly
345:Internet
229:couriers
150:couriers
146:Consumer
1772:Privacy
1519:Twitter
1471:Medical
1461:Digital
1380:Ireland
1365:Germany
1350:Denmark
1276:Germany
1266:England
1261:Denmark
1189:Privacy
1018:6482690
959:5755201
610:Privacy
520:Austria
414:History
404:wiretap
285:banking
233:bankers
80:scholar
1514:Google
1435:Turkey
1420:Sweden
1405:Poland
1395:Norway
1360:France
1291:Russia
1251:Canada
1246:Brazil
1060:
1025:
1015:
1007:
966:
956:
948:
893:
883:
788:
747:
720:
712:
673:
665:
512:Canada
377:Canada
326:profit
303:. The
291:, nor
247:, and
82:
75:
68:
61:
53:
1703:PRISM
1526:Email
1449:Areas
1415:Spain
1370:India
1281:Ghana
1256:China
1058:S2CID
786:JSTOR
718:S2CID
671:S2CID
526:2000s
478:1990s
419:1970s
349:bills
257:state
87:JSTOR
73:books
1642:NOYB
1105:link
1076:link
1023:PMID
1005:ISSN
964:PMID
946:ISSN
909:link
891:OCLC
881:ISBN
745:ISSN
710:ISSN
663:ISSN
566:and
510:and
502:and
443:and
375:and
231:and
160:and
134:data
59:news
1494:Law
1050:doi
1013:PMC
995:doi
954:PMC
936:doi
778:doi
702:doi
698:122
655:doi
554:or
538:on
494:in
400:PTT
289:law
287:or
283:in
279:or
140:or
136:by
121:is
42:by
1758::
1323:,
1146:.
1121:.
1101:}}
1097:{{
1072:}}
1068:{{
1056:.
1046:12
1044:.
1021:.
1011:.
1003:.
991:61
989:.
985:.
962:.
952:.
944:.
932:18
930:.
926:.
905:}}
901:{{
889:.
860:67
858:.
832:.
816:33
814:.
810:.
798:^
784:.
774:35
772:.
743:.
739:.
716:.
708:.
696:.
692:.
669:.
661:.
651:12
649:.
371:,
367:,
243:,
219:.
195:,
191:,
144:.
1181:e
1174:t
1167:v
1132:.
1107:)
1093:.
1078:)
1064:.
1052::
1029:.
997::
970:.
938::
911:)
897:.
843:.
792:.
780::
757:.
724:.
704::
677:.
657::
109:)
103:(
98:)
94:(
84:·
77:·
70:·
63:·
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.