Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Term Paper:
This is achieved by forcing them to maintain a list of individuals who do not wish to be conducted about purchasing a variety of products and services. Furthermore, these protections were enacted to ensure that businesses are not engaging in tactics that are abusive by limiting the times when they can call and what they can say. (Caudill, 2000)
In contrast with the Consumer Privacy Bill of Rights, the proposed regulations are designed to enhance protections. This is occurring over the Internet vs. On the telephone. These differences are showing how there is a loop hole in existing regulations as to how these laws are applied. The new guidelines are building upon the provisions from the Telephone Consumer Protections Act of 1991 by establishing procedures as to the way confidential information is used and collected from firms. This is occurring is through placing limits on an organization's online activities. ("Consumer Privacy Bill of Rights," 2012) (Caudill, 2000) (Jones, 2012)
The Do Not Call Implementation Act of 2003 is building upon the protections that consumers' are receiving from harassing phone calls by telemarketers. This is occurring with the law requiring them to keep an enhanced do not call list utilizing an opt-out provision. The way it works is businesses are required to update who has requested to never be contacted by continually checking the federal registry for changes. These provisions apply to residential consumers. For businesses, nonprofits and political organizations; they are excluded from these guidelines. At the same time, the law established practices which are used to enforce its provisions by establishing procedures for going after firms that are in violation of the act. (Barlough, 2003)
The Consumer Privacy Bill of Rights is different from the Do Not Call Implementation Act of 2003. This is occurring through not requiring firms to maintain a do not contact list for online transactions. Instead, it is concentrating on protecting how their information is collected, stored and used for marketing purposes. ("Consumer Privacy Bill of Rights," 2012) (Barlough, 2003) (Jones, 2012)
However, these provisions are similar with each other by establishing the way they can be contacted and the tactics that are utilized with the information they obtain. In this aspect, both laws are similar and different through establishing how these practices are being used. The only dissimilarity is the form of communication that is utilized in the process. ("Consumer Privacy Bill of Rights," 2012) (Barlough, 2003) (Jones, 2012)
The Validity of the Consumer Privacy Bill of Rights Implementation in Society Today
The Consumer Privacy Bill of Rights is enhancing the current regulations that are protecting consumers. This is occurring through establishing procedures with online transactions, the way information is stored and how data is being collected. In the past, existing laws were designed to prevent businesses from using these new mediums to obtain additional information about individuals. The proposed regulations will take this one step further by dealing with loopholes that are limiting these practices when it comes to the Internet. In the future, this will make certain that society has similar protections despite transformations in technology. ("Consumer Privacy Bill of Rights," 2012) (Jones, 2012)
Clearly, the Consumer Privacy Bill of Rights is designed to enhance protections under existing regulations. The most notable include: the Fair Credit Reporting Act, the Electronics Communications Privacy Act, the Telephone Consumer Protections Act of 1991 and the Do Not Call Implementation Act of 2003. These laws are limiting how information is collected, stored and utilized.
In some cases, this data is used to aggressively market various products and services to the public. While at other times, access to it will give them an unfair advantage that is in direct violation of the provisions of the Constitution. These factors are having a positive impact on society by creating a change in the way personal information is utilized. This is protecting consumers through ensuring that everyone is able maintain their privacy in era when technology is continually evolving at a rapid pace.
Consumer Privacy Bill of Rights. (2012). CNN Money. Retrieved from: http://money.cnn.com/2012/02/22/technology/bill_of_rights_privacy/index.htm
Fact Sheet. (2012). White House.gov. Retrieved from: http://www.whitehouse.gov/the-press-office/2012/02/23/fact-sheet-plan-protect-privacy-internet-age-adopting-consumer-privacy-b
Barlough, R. (2003). The Do Not Call Registry Model. Marshall Journal Computer and Information, 22, 79 -- 85.
Caudill, E. (2000). Consumer Online Privacy. Journal of Public Policy, 19 (1), 7 -- 19.…[continue]
"Consumer's Privacy Bill Of Rights" (2013, March 25) Retrieved October 25, 2016, from http://www.paperdue.com/essay/consumer-privacy-bill-of-rights-86957
"Consumer's Privacy Bill Of Rights" 25 March 2013. Web.25 October. 2016. <http://www.paperdue.com/essay/consumer-privacy-bill-of-rights-86957>
"Consumer's Privacy Bill Of Rights", 25 March 2013, Accessed.25 October. 2016, http://www.paperdue.com/essay/consumer-privacy-bill-of-rights-86957
The Center for Digital Democracy, represented by Jeffrey Chester, executive director, claims the Obama administration raises money from Google -- "Google is a Democratic darling in many ways" -- and hence the suspicion is that Obama asked his FTC to go easy on Google. "Our fear is that Google gets special treatment," Chester insists. Conclusion Whether or not Google was aware it was gathering this data from households and businesses in 30
Right to Privacy Being a citizen of the United States comes with many benefits in comparison to citizenship in other countries. Through the U.S. Constitution and the Bill of Rights we are granted certain rights -- the right to free speech, freedom of religion, freedom of the press, and freedom of assembly -- just to name a few. However, despite the 27 amendments the Bill of Rights that guarantee American protections
Geolocation of the user based on the user's Internet protocol (IP) address. Location-based service companies that specialize in identity protection use this approach, and IP addresses, blocks of IP addresses and credit card billing addresses can all be used to develop a location profile. 2. Personal computer/web browser identification examines the hypertext transfer protocol (HTTP) browser header and other information from the user's computer or device, and compares them to
Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of
Emergency The mobile phone is extremely useful in the case of emergency situation. The owner of such a mobile device can call 911 for free from their mobile phone, even if the owner's phone credit does not allow for calls to be made. Also, the camera of the mobile phone can be used in recording certain aspects that are useful in such situations (Reardon, 2006). Storage An important feature of mobile phones consists
Privacy or Surveillance -- Political Topic Privacy or Surveillance? We live in an age of heightened concerns about terrorism and public safety. The events of 9/11, the constant threat of future terrorist plots and mass shootings and public bombings have put both the American people and government on high alert. Some of the government's responses have included development of the Department of Homeland Security and terrorist threat level systems (Hiranandani, 2011). Other
Nursing Research HIPAA Proposal Patient privacy protection is a cornerstone of any patient bill of rights and is a major goal of any nurse or medical professional. Without privacy, the basis of trust necessary to facilitate patient healing simply can not occur. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) increasingly dominates the nursing landscape. Safeguarding private patient information is not just important. It is the law. HIPAA provides