They must address what information is collected and stored as well as whether there is a business need for that particular information.
Depending on the type of business operations, privacy laws govern how companies collect, store, and use customer identifiable information. It is important for business administration to ensure the company is in compliance with all federal and state privacy law to avoid consequences and losses stemming from security breaches of sensitive customer information. By doing so, customers build confidence in doing business with the organization.
Bibliography
Clearinghouse, Privacy Rights. Fact Sheet 6a: Facts on FACTA, the Fair and Accurate Credit Transaction Act. Mar 2013. Document. 23 Apr 2013.
Deybach, G. "Identity theft and employer liability." Risk Management, 54(1) (2007): 14-17. Article.
Federal Law Requires All Businesses to Truncate Credit Card Information on Receipts. n.d. Document. 23 Apr 2013.
FTC. Privacy and Security. n.d. Article. 21 Apr 2013.
Gramm-Leach Bliley Act. n.d. Article. 23 Apr 2013.
Hoffman, S., & Podgurski, a.,. "Securing the HIPAA Security Rule." Journal of Internet Law, 10(8) (2997): 1-16. Article.
Holtfreter, R.E., & Holtfreter, K. "Gauging the effectiveness of U.S. identity theft legislation." Journal of Financial Crime, 13(1) (2006): 56-64. Article.
Levin, M. Privacy and Security Alert. 21 Feb 2007. Newsletter. 22 Apr 2013.
NACUANOTES. 10 May 2006. Article. 23 Apr 2013.
Safe Harbor Overview. Aug 2000. Article. 23 Apr 2013.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now