scholarly journals “I Just Bought a Flat Screen T.V. in Kolkata?” Application of Laws for International Outsourcing Related Identity Theft

Author(s):  
Samantha Grant

Because the internet makes it economical to do so, many American companies have sent their customer service jobs overseas. Workers in these outsourced jobs often have access to personal financial information of American citizens. Recent identity thefts, both in America and abroad, highlight the need for laws mandating tighter security by the companies that hold and trade personal information. This paper explores American legislation attempting to deal with identity theft crime as well as parallel laws in India, where many of the outsourced jobs are located. Furthermore, this paper suggests that any federal legislation ought not to preempt state law, as California law is currently protecting consumer privacy stronger than proposed legislation would.

2020 ◽  
Vol 20 (1) ◽  
Author(s):  
Rebecca Iafrati

The California Consumer Privacy Act access right has the potential to give Californians a level of control over their personal information that is unprecedented in the United States. However, consumer privacy interests will be in peril unless the access right is accompanied by an effective access request verification requirement. Requiring companies to respond to access requests when they cannot verify that the requestor is the subject of the requested data puts sensitive personal information at risk. Inversely, allowing companies to shirk their access request responsibilities by claiming that data is unverifiable diminishes consumers’ data control rights. Thus, in the context of access request verification policy, there is an inherent tension between privacy as confidentiality and privacy as control. The success of the access right, and thus all CCPA data control rights, hinges on an access request verification policy that successfully balances these competing privacy interests. The endemic identity theft caused by credit application verification systems demonstrates why such balancing cannot be wholly left to private companies. In the credit context, balancing has been driven by the profit maximization interests of businesses, which currently do not align with consumer privacy interests. Fortunately, several scholars have proposed methods for aligning these divergent interests. The strengths and weaknesses from these proposed solutions to identity theft provide a useful framework for building a system that incentivizes companies to prioritize consumer privacy when developing access request verification systems.


2021 ◽  
Author(s):  
◽  
Dale Stephens

<p>The Internet has rapidly become the world’s most prevalent form of communication. It can be accessed twenty-four hours a day from virtually any location in the world from a myriad of technologically savvy devices. Internet users can keep up to date with world events, watch movies, listen to music, interact with government agencies, analyse business trends, undertake research and maintain contact with people anywhere. The Internet also provides the ability for users to shop ‘online’ with virtually any product or service supplier anywhere in the world. This has created concerns regarding the use of personal information obtained through the medium of the Internet. An individual’s right to privacy is a right enshrined in legislation and through tort law. With the uptake of technology and the burgeoning use of the Internet the subject of online privacy has become a complex issue for law and policy makers both in New Zealand and internationally. The aim of this paper is to look at the online shopper or consumer and how their information could be protected. This paper looks at the key areas of privacy legislation, the storage of data and the rise of new technologies including ‘cloud’ computing and suggests that the complexity of online privacy is such that a different approach to access and use of personal information of online shoppers may be required. The rate of technology change, the enormity of the data capture situation and the international accessibility of the Internet are all factors that create an almost impossible situation for ensuring consumer privacy so this paper proposes that the onus moves away from the law and policy makers and put into the hands of the users of the Internet.</p>


2019 ◽  
Author(s):  
Ignacio Cofone ◽  
Adriana Robertson

In 2017, Congress repealed the FCC’s latest attempt to protect consumer privacy on the internet and allowed ISPs to continue to track their users’ online behavior. We evaluate the impact of this decision on consumer privacy in light of biased beliefs and information overload. We do so through a well-documented behavioral bias: Non-belief in the Law of Large Numbers. In doing so, we provide a framework for deciding why and how to protect consumer privacy. We then suggest private law and regulatory solutions to do so in a more effective way than either the current or the now-repealed regime.


Author(s):  
Jerry Pournelle

Whether you’re a compulsive gadget freak, an eBay addict, or a restrained occasional buyer, the Internet is a shopper’s paradise—open 24/7, offering unlimited choices, and giving us the luxury of shopping—through sleet and snow or summer heat—from our own homes. But at no time have caveats been more important for emptors than now. Devious and ingenious scam artists are just waiting to pounce on anyone who doesn’t take appropriate precautions. A few sound practices can help assure that you get what you pay for, get it on time, and don’t lose your shirt in the bargain. 1. Use a secure browser—Believe it or not, you can’t take browsers for granted. Be sure that you have the latest version of yours, including the latest updates and security patches, and that you’ve set your browser to notify you when you are entering or leaving a secure site. Be sure as well that it complies, as major browsers do (e.g., Netscape and Internet Explorer), with common industry security standards, like SSL and SET technology (see 2 just below). 2. Check out your vendor—Try to use vendors you’re familiar with. Many well-known bricks-and-mortar stores are now “clicks-and-mortar” operations, with both physical stores and sites on the Internet. If you must buy from a place you don’t know, check the site’s security. A secure site will use VeriSign’s Secure Sockets Layer technology (SSL), displaying a locked padlock at the bottom of the screen, Secure Electronic Transaction technology (SET), which shows an unbroken key, or a VeriSign logo indicating that you are at a secure Site. These are not just decorative icons. They are intended to ensure that all personal information you submit to the site will be scrambled en route through the ether and decrypted only when it reaches the licensed merchant. However, this is just the first step. Particularly if you clicked on an ad or a URL sent to you in an e-mail, and therefore did not type the URL in the address bar yourself, you should verify the security certificate (see How to Protect yourself from Frauds, Scams, and Identity Theft, p. 130).


2005 ◽  
Vol 14 (6) ◽  
pp. 647-655 ◽  
Author(s):  
Ian R. Kerr ◽  
Marcus Bornfreund

Intelligent agents are currently being deployed in virtual environments to enable interaction with consumers in furtherance of various corporate strategies involving marketing, sales, and customer service. Some online businesses have recently begun to adopt automation technologies that are capable of altering both their own, and consumers', legal rights and obligations. In a rapidly evolving field known as affective computing, the creators of some automation technologies are utilizing various principles of cognitive science and artificial intelligence to generate avatars capable of garnering consumer trust. Unfortunately, this trust has been exploited by some to undertake extensive, clandestine consumer profiling under the guise of friendly conversation. Buddy bots and other such applications have been used by businesses to collect valuable personal information and private communications without lawful consent. This article critically examines such practices and provides basic consumer protection principles, an adherence to which promises to generate a more socially responsible vision of the application of artificial intelligence in automated electronic commerce. I care so much for you—didn't think that I could, I can't tell my heart that you're no good. Bob Dylan, Honest With Me


Think India ◽  
2019 ◽  
Vol 22 (2) ◽  
pp. 174-187
Author(s):  
Harmandeep Singh ◽  
Arwinder Singh

Nowadays, internet satisfying people with different services related to different fields. The profit, as well as non-profit organization, uses the internet for various business purposes. One of the major is communicated various financial as well as non-financial information on their respective websites. This study is conducted on the top 30 BSE listed public sector companies, to measure the extent of governance disclosure (non-financial information) on their web pages. The disclosure index approach to examine the extent of governance disclosure on the internet was used. The governance index was constructed and broadly categorized into three dimensions, i.e., organization and structure, strategy & Planning and accountability, compliance, philosophy & risk management. The empirical evidence of the study reveals that all the Indian public sector companies have a website, and on average, 67% of companies disclosed some kind of governance information directly on their websites. Further, we found extreme variations in the web disclosure between the three categories, i.e., The Maharatans, The Navratans, and Miniratans. However, the result of Kruskal-Wallis indicates that there is no such significant difference between the three categories. The study provides valuable insights into the Indian economy. It explored that Indian public sector companies use the internet for governance disclosure to some extent, but lacks symmetry in the disclosure. It is because there is no such regulation for web disclosure. Thus, the recommendation of the study highlighted that there must be such a regulated framework for the web disclosure so that stakeholders ensure the transparency and reliability of the information.


2020 ◽  
Vol 7 (1) ◽  
pp. 29-48 ◽  
Author(s):  
Leonhard Menges

AbstractA standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s revelation of how the NSA and GCHQ collected Internet and mobile phone data presents us with a gigantic, real-life threatened loss case. In this paper, I will defend the control account of privacy against the argument that is based on threatened loss cases. I will do so by developing a new version of the control account that implies that the agents’ privacy is not diminished in threatened loss cases.


2001 ◽  
Vol 101 (1) ◽  
pp. 19-31 ◽  
Author(s):  
Gerard Goggin ◽  
Catherine Griff

Much of the present debate about content on the internet revolves around how to control the distribution of different sorts of harmful or undesirable material. Yet there are considerable issues about whether sufficient sorts of desired cultural content will be available, such as ‘national’, ‘Australian’ content. In traditional broadcasting, regulation has been devised to encourage or mandate different types of content, where it is believed that the market will not do so by itself. At present, such regulatory arrangements are under threat in television, as the Productivity Commission Broadcasting Inquiry final report has noted. But what of the future for certain types of content on the internet? Do we need specific regulation and policy to promote the availability of content on the internet? Or is such a project simply irrelevant in the context of gradual but inexorable media convergence? Is regulating for content just as quixotic and fraught with peril as regulating of content from a censorship perspective often appears to be? In this article, we consider the case of Australian content for broadband technologies, especially in relation to film and video, and make some preliminary observations on the promotion and regulation of internet content.


Author(s):  
Bailing Liu ◽  
Paul A. Pavlou ◽  
Xiufeng Cheng

Companies face a trade-off between creating stronger privacy protection policies for consumers and employing more sophisticated data collection methods. Justice-driven privacy protection outlines a method to manage this trade-off. We built on the theoretical lens of justice theory to integrate justice provision with two key privacy protection features, negotiation and active-recommendation, and proposed an information technology (IT) solution to balance the trade-off between privacy protection and consumer data collection. In the context of mobile banking applications, we prototyped a theory-driven IT solution, referred to as negotiation, active-recommendation privacy policy application, which enables customer service agents to interact with and actively recommend personalized privacy policies to consumers. We benchmarked our solution through a field experiment relative to two conventional applications: an online privacy statement and a privacy policy with only a simple negotiation feature. The results showed that the proposed IT solution improved consumers’ perceived procedural justice, interactive justice, and distributive justice and increased their psychological comfort in using our application design and in turn reduced their privacy concerns, enhanced their privacy awareness, and increased their information disclosure intentions and actual disclosure behavior in practice. Our proposed design can provide consumers better privacy protection while ensuring that consumers voluntarily disclose personal information desirable for companies.


2021 ◽  
Author(s):  
Miguel Godinho de Matos ◽  
Idris Adjerid

The general data protection regulation (GDPR) represents a dramatic shift in global privacy regulation. We focus on GDPR’s enhanced consumer consent requirements that aim to provide transparent and active elicitation of data allowances. We evaluate the effect of enhanced consent on consumer opt-in behavior and on firm behavior and outcomes after consent is solicited. Utilizing an experiment at a large telecommunications provider with operations in Europe, we find that opt-in for different data types and uses increased once GDPR-compliant consent was elicited. However, consumers did not uniformly increase data allowances and continued to generally restrict permissions for more sensitive or tangential uses of their personal information. We also find that sales, the efficacy of marketing communications, and contractual lock-in increased after consumers provided new data allowances. Additional analysis suggests that these gains to the firm emerged because new data allowances enabled them to increase their use of targeted marketing for households that were amenable to these marketing efforts. These results have significant implications for firms and policymakers and suggest that enhanced consent provided via GDPR may be effective for increasing consumer privacy protection while also allowing firms reliant on consumers’ personal information to improve outcomes. This paper was accepted by Chris Forman, information systems.


Sign in / Sign up

Export Citation Format

Share Document