490 likes | 705 Views
Privacy & Content. MKTG 330 Spring 2014. Mini-lecture overview. Some terminology Three theories of privacy Privacy principles Consumer attitudes toward privacy Current Laws The FTC FIPs The Consumer Privacy Bill of Rights (2012). Disclosing Information. GOOGLE: reverse phone lookup.
E N D
Privacy & Content MKTG 330 Spring 2014
Mini-lecture overview • Some terminology • Three theories of privacy • Privacy principles • Consumer attitudes toward privacy • Current Laws • The FTC FIPs • The Consumer Privacy Bill of Rights (2012)
GOOGLE: reverse phone lookup
Now GOOGLE: Beenverified
GOOGLE Back Check
Terminology • Personal identifying information PII • Anonymization (and de-identify) • Positive right (claim right) • Negative right • 3 consumer attitudes about privacy: • marginalist, • fundamentalist • pragmatist • Privacy paradox
3 theories of privacy Reductionist: “Privacy is nothing in-itself; it is just a shorthand way of talking about something else that may or may not have moral import.” Privacy Skeptic “if you’re not doing anything wrong, you have nothing to hide, and you should have no rational interest in preserving your privacy.” Privacy Realist “privacy is a precondition for intimacy which (itself) is a fundamental human need” “human beings are by nature vulnerable to errors in judgment and decision making, privacy for the individual is necessary to protect against embarrassment and society’s ridicule.”
Federal Agencies 1914 1934 1938 1934
Email Marketing • CAN-SPAM ACT (US LAW) email marketer must provide an “opt out”. • Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003
In some instances, Cisco may collect non-personal (aggregate or demographic) data through cookies, web logs, web beacons and other similar applications. This information is used to better understand and improve the usability, performance, and effectiveness of the website. Please read the “Cookies” section below for more information. In addition, by using some of our Solutions, anonymous network information may be transmitted to us such as the performance of the Solution and types of devices attached to the network. With this information we can determine how users are interacting with the Solution, to assist us with improving it, to manage your network, and to provide alerts via the Solution of available software updates/upgrades.