Consumer Privacy��Unit 4
What Is Information Privacy?�In this age of information, we need some way to control what is known about us and how this knowledge is used. Information privacy is about the rights of individuals in relation to information about them that is circulating in society.
Information privacy is important in our information age because:�1. Computer systems routinely record and store lots of information about us and our consumer activities. �2. Computer files containing information about us can be shared between public and private organizations. For example, the IRS can access financial data about you from your bank. �3. Computer data can travel across the globe and change hands in an instant. �For these reasons, accurate data is vitally important. Inaccurate data widely shared can be very damaging to individuals.
True or False (next 4)
Inaccurate information can do great damage to a person’s credit or jeopardize a person’s ability to obtain employment.
Information gathered from consumers is never used in ways the consumer does not intend.
Information on consumer spending patterns is regularly rented and sold to interested companies.
The circulation of consumer lists among businesses and organizations can result in annoying solicitation calls and direct mail to consumers.
Where Does the Information Come From?�
Amending or Correcting Records�
How Information Is Used
What’s in a Database Profile?�
The Benefit to Consumers
The Benefit to Businesses�
The Privacy Dilemma�
The Problem for Consumers
What the Law Says
The Gramm-Leach-Bliley Act�The Gramm-Leach-Bliley Act regulates the ability of financial companies to share your personal and financial information with unrelated companies, called non-affiliates. If these financial companies want to share your information, they must advise you beforehand and give you the choice to “opt out” or limit what information can be shared.�
The Fair and Accurate Transaction Act�The Fair and Accurate Credit Transaction Act (FACTA) helps consumers combat identity theft by giving them the right to request a free credit report from each of the three major credit agencies every year.�More information on how to order the free credit reports is available at the Federal Trade Commission’s website at www.ftc.org.
Privacy and Direct Mail�Consumers provide their information directly to businesses and organizations when they: �Complete warranty cards on purchases and fill in sweepstakes cards. �Subscribe to magazines or request catalogs. �Make charitable contributions.�
Warranty Card Example�Information you supply on a warranty card can be used by interested businesses. The following are some common elements that businesses use:
“Opting Out” of Direct Marketing Programs�As a consumer you have the right to “opt out” of direct marketing programs and remove or restrict the information direct marketers use.
Privacy and Telecommunications�New technology has made it lot easier for people to communicate worldwide, but communication itself has become less secure, raising a host of privacy issues.
The Value of Telecommunications Services�The following telecommunications devices and services allow instantaneous communication between any two people worldwide:�Telephones and cellular phones �Facsimiles (faxes) �Online computer services �Caller ID �Automatic Number Identification (ANI) �These technologies are tremendously useful for business, research activities, law enforcement and personal communication.
The Privacy Dilemma�The use of newer digital technology has raised privacy questions:�Conversations on cordless phones or cellular phones are vulnerable to eavesdropping, which may violate the 1986 Electronic Communications Privacy Act. �Confidential faxes may be vulnerable to interception. �Some online computer network services offer a degree of security, but others do not. �Caller ID allows people you call to view your phone number before they answer the call. �Automatic Number Identification (ANI) identifies a caller’s telephone number when 800 or 900 numbers are dialed. �
Regulating Telemarketers�Federal and state governments have responded to consumer complaints of privacy violations by telemarketers.
Federal Regulations�Federal law prohibits companies from soliciting you at home by phone if you’ve asked them not to do so. The company must maintain a list of consumers who do not want solicitation calls at home. �Companies cannot solicit you at home before 8 AM or after 9 PM. �Companies may not send unsolicited ads by fax. �Companies that use prerecorded, machine-delivered advertising must disconnect you within 5 seconds after you hang up. �
State Regulations�Some state laws prohibit telemarketers from calling people who do not want to receive solicitation calls. �Contact your state attorney general or local consumer protection agency to learn about regulations in your area. �
Privacy and Your Social Security Number�Today Social Security numbers are used in ways that go beyond their original intended purpose.
Privacy and the Workplace�Privacy in the workplace is a big issue. Is it an invasion of privacy to screen job applicants for drugs? Who should have access to personnel files and a person’s work history? What are the proper limits of information sharing and how do the rights of individuals get protected?�
Personnel Files�There are no federal statutes that comprehensively regulate employee access to personnel files. Access depends largely on company policy and any state laws that may apply.�Before accepting a job, it is a good idea to inquire about the employer’s policy regarding personnel files. �Many companies subscribe to guidelines issued by the Privacy Protection Study Commission in 1977 regarding access and correction of records, and the internal disclosure of documents. �
Electronic Monitoring in the Workplace�Monitoring employee activity in the workplace is controversial. There are clear benefits to customer service and productivity, but these activities are often at odds with the privacy needs of employees.
Types of Monitoring�Electronic monitoring varies from company to company but can include any of the following:�Telephone monitoring �Voice mail and electronic mail monitoring �Computer keystroke monitoring �Location detectors and surveillance video cameras �