Consumer's Privacy Bill Of Rights Term Paper

PAGES
5
WORDS
1482
Cite

This is achieved by forcing them to maintain a list of individuals who do not wish to be conducted about purchasing a variety of products and services. Furthermore, these protections were enacted to ensure that businesses are not engaging in tactics that are abusive by limiting the times when they can call and what they can say. (Caudill, 2000) In contrast with the Consumer Privacy Bill of Rights, the proposed regulations are designed to enhance protections. This is occurring over the Internet vs. On the telephone. These differences are showing how there is a loop hole in existing regulations as to how these laws are applied. The new guidelines are building upon the provisions from the Telephone Consumer Protections Act of 1991 by establishing procedures as to the way confidential information is used and collected from firms. This is occurring is through placing limits on an organization's online activities. ("Consumer Privacy Bill of Rights," 2012) (Caudill, 2000) (Jones, 2012)

The Do Not Call Implementation Act of 2003 is building upon the protections that consumers' are receiving from harassing phone calls by telemarketers. This is occurring with the law requiring them to keep an enhanced do not call list utilizing an opt-out provision. The way it works is businesses are required to update who has requested to never be contacted by continually checking the federal registry for changes. These provisions apply to residential consumers. For businesses, nonprofits and political organizations; they are excluded from these guidelines. At the same time, the law established practices which are used to enforce its provisions by establishing procedures for going after firms that are in violation of the act. (Barlough, 2003)

The Consumer Privacy Bill of Rights is different from the Do Not Call Implementation Act of 2003. This is occurring through not requiring firms to maintain a do not contact list for online transactions. Instead, it is concentrating on protecting how their information is collected, stored and used for marketing purposes. ("Consumer Privacy Bill of Rights," 2012) (Barlough, 2003) (Jones, 2012)

However, these provisions are similar with each other by establishing the way they can be contacted and the tactics that are utilized with the information they obtain. In this aspect, both laws are similar and different through establishing how these practices are being used. The only dissimilarity is the form of communication that is utilized in the process. ("Consumer Privacy Bill...

...

This is occurring through establishing procedures with online transactions, the way information is stored and how data is being collected. In the past, existing laws were designed to prevent businesses from using these new mediums to obtain additional information about individuals. The proposed regulations will take this one step further by dealing with loopholes that are limiting these practices when it comes to the Internet. In the future, this will make certain that society has similar protections despite transformations in technology. ("Consumer Privacy Bill of Rights," 2012) (Jones, 2012)
Conclusion

Clearly, the Consumer Privacy Bill of Rights is designed to enhance protections under existing regulations. The most notable include: the Fair Credit Reporting Act, the Electronics Communications Privacy Act, the Telephone Consumer Protections Act of 1991 and the Do Not Call Implementation Act of 2003. These laws are limiting how information is collected, stored and utilized.

In some cases, this data is used to aggressively market various products and services to the public. While at other times, access to it will give them an unfair advantage that is in direct violation of the provisions of the Constitution. These factors are having a positive impact on society by creating a change in the way personal information is utilized. This is protecting consumers through ensuring that everyone is able maintain their privacy in era when technology is continually evolving at a rapid pace.

Sources Used in Documents:

References

Consumer Privacy Bill of Rights. (2012). CNN Money. Retrieved from: http://money.cnn.com/2012/02/22/technology/bill_of_rights_privacy/index.htm

Fact Sheet. (2012). White House.gov. Retrieved from: http://www.whitehouse.gov/the-press-office/2012/02/23/fact-sheet-plan-protect-privacy-internet-age-adopting-consumer-privacy-b

Barlough, R. (2003). The Do Not Call Registry Model. Marshall Journal Computer and Information, 22, 79 -- 85.

Caudill, E. (2000). Consumer Online Privacy. Journal of Public Policy, 19 (1), 7 -- 19.


Cite this Document:

"Consumer's Privacy Bill Of Rights" (2013, March 25) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/consumer-privacy-bill-of-rights-86957

"Consumer's Privacy Bill Of Rights" 25 March 2013. Web.24 April. 2024. <
https://www.paperdue.com/essay/consumer-privacy-bill-of-rights-86957>

"Consumer's Privacy Bill Of Rights", 25 March 2013, Accessed.24 April. 2024,
https://www.paperdue.com/essay/consumer-privacy-bill-of-rights-86957

Related Documents

Consumer's Privacy Bill Of Rights The Obama Administration proposed the Consumer's Privacy Bill of Rights in 2012 as a roadmap for future legislation. The legislation was put forth on the premise that a huge portion of personal information gathered by American-based businesses regarding their customers and probable customers was still mostly unregulated (Sanders, 2012). In the past few years, the privacy of consumer information that is collected by businesses has been

Right to Privacy Being a citizen of the United States comes with many benefits in comparison to citizenship in other countries. Through the U.S. Constitution and the Bill of Rights we are granted certain rights -- the right to free speech, freedom of religion, freedom of the press, and freedom of assembly -- just to name a few. However, despite the 27 amendments the Bill of Rights that guarantee American protections

The Center for Digital Democracy, represented by Jeffrey Chester, executive director, claims the Obama administration raises money from Google -- "Google is a Democratic darling in many ways" -- and hence the suspicion is that Obama asked his FTC to go easy on Google. "Our fear is that Google gets special treatment," Chester insists. Conclusion Whether or not Google was aware it was gathering this data from households and businesses in 30

" (Al-Ghaith, Sanzogni, and Sandhu, 2010) With a focus on Saudi Arabia it is reported that there is "no reliable local production in the fields of software or the hardware. The increased demand for ICTs is met by acquiring overseas technologies. The trend towards increased reliance on ICTs by the Saudi people, in particular computers and internet services, is one of the highest when compared with other developing countries; however it is

Privacy or Surveillance -- Political Topic Privacy or Surveillance? We live in an age of heightened concerns about terrorism and public safety. The events of 9/11, the constant threat of future terrorist plots and mass shootings and public bombings have put both the American people and government on high alert. Some of the government's responses have included development of the Department of Homeland Security and terrorist threat level systems (Hiranandani, 2011). Other

Privacy Abuse and Protection
PAGES 13 WORDS 3618

Privacy and Abuse Protection Efforts of Businesses Facts Many workforces in most nations all over the world are increasingly becoming global. These workforces cooperate, communicate, and link up in multinationals and global marketplaces via web-based applications across countries and territories. The phenomenon of globalization has removed quite a number of differences amongst peoples and nations both in workplaces and in other areas[footnoteRef:2]. However, some questions have been raised on the origins of