Question

In: Accounting

Could you please research, identify and explain controls designed to protect the privacy of customers' personal...

Could you please research, identify and explain controls designed to protect the privacy of customers' personal information? What other controls would you like the government to mandate? Be specific in providing your explanation with examples.

Solutions

Expert Solution

Solution:-

Encrypting information before sending it over the Internet creates what is called a Virtual Private Network (VPN)It is especially important to encrypt any sensitive information stored in laptops, personal digital assistants (PDAs), cell phones and other portable devices.

It is also important to control access to system outputs.

Useful control procedures for doing to include the following:

  • Do not allow visitors to roam through buildings without supervision, to prevent them from seeing sensitive information on workstation displays or picking up and reading printed reports.
  • Require employees to log out of any applications prior to leaving their workstation unattended.
  • Restrict access to rooms housing printers and fax machines
  • Code reports to reflect the importance of the information contained therein, and train employees to not leave reports containing sensitive information in plain view on their desktops when they are not physically present

Ten internationally recognized best practices for protecting the privacy of customers’ personal information:

  1. Management.:- The organization establishes a set of procedures and policies forprotecting the privacy of personal information it collects and assigns responsibility and accountability for those policies to a specific person orgroup of employees.
  2. Notice:- The organization provides notice about its privacy policies and practices at or before the time it collects personal information from customers, or as soon as practicable thereafter.
  3. Choice and Consent:- The organization describes the choices available to individuals and obtains their consent to the collection and use of their personal information.
  4. Collection:- The organization collects only that information needed to fulfillthe purposes stated in its privacy policies.
  5. Use and Retention:- The organization uses its customers’ personal information only in the manner described in its stated privacy policies and retains thatinformation only as long as it is needed.
  6. Access:- The organization provides individuals with the ability to access, review, correct, and delete the personal information stored about them.
  7. Disclosure to Third Parties:- The organization discloses customers’ personal privacy policies and only to third parties who provide equivalent protectionof that information.
  8. Security:- The organization takes reasonable steps to protect customers’ personal information from loss or unauthorized disclosure.
  9. Quality:- The organization maintains the integrity of its customers’ personal information.
  10. Monitoring and Enforcement:- The organization assigns one or more employees to be responsible for assuring compliance with its stated privacy policies and periodically verifies compliance with those policies.


Related Solutions

Explain the responsibilities of marketers to protect customer privacy and data security.
Explain the responsibilities of marketers to protect customer privacy and data security. 
What types of receivables are there? What internal controls could be in place to protect receivables...
What types of receivables are there? What internal controls could be in place to protect receivables management? Please no handwritten answers. I need to be able to read the answer.
Research with animals is required to follow several guidelines designed to protect the animal. Similarly, research...
Research with animals is required to follow several guidelines designed to protect the animal. Similarly, research with humans has guidelines designed to protect humans. Consider how these guidelines would apply to studying a new drug. Describe the guidelines for conducting research with animal and with humans. How do they think these guidelines are for ensuring that research is ethical
What are the major issues concerning privacy in the information age? Could you identify at least...
What are the major issues concerning privacy in the information age? Could you identify at least two situations where we notice privacy invasion? Is there any remedy to the privacy invasion in the modern information age?
How would you design your system to protect the girl's privacy?
How would you design your system to protect the girl's privacy?
could you explain in details the research oinion?
could you explain in details the research oinion?
Please answer the following questions: a) What is confidentiality and privacy controls in accounting information system?...
Please answer the following questions: a) What is confidentiality and privacy controls in accounting information system? b) How to identify and classify information that to be protected and how to protect confidentiality using encryption? c) What is privacy regulations and generally accepted privacy principles?
please explain in detail.....Identify several products you think could be marketed in a variety of foreign...
please explain in detail.....Identify several products you think could be marketed in a variety of foreign markets with little customization (say 5 of them). Then identify 5 more products that clearly would require customization. What would need to be customized for each market? Be specific and cite your sources.
In this module, you learned about the following acts that protect consumers’ privacy and identity: Fair...
In this module, you learned about the following acts that protect consumers’ privacy and identity: Fair Credit Reporting Act Fair and Accurate Credit Transactions Act Gramm-Leach-Bliley Act USA PATRIOT Act In addition to protecting a consumer’s privacy/identity, these acts can also impact the consumer’s ability to obtain a mortgage loan. In this discussion assignment, share your response to the following questions: Which Act best protects a consumer’s privacy or identity? Why? How does that same Act positively or negatively impact...
A professor at a local university designed an experiment to see if someone could identify the...
A professor at a local university designed an experiment to see if someone could identify the color of a candy based on taste alone. Students were blindfolded and then given a​ red-colored or​ yellow-colored candy to chew.​ (Half the students were assigned to receive the red candy and half to receive the yellow candy. The students could not see what color candy they were​ given.) After​ chewing, the students were asked to guess the color of the candy based on the flavor. Of the 122122...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT