Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Whenever you use a credit or debit card to buy something online, in a store, by mail, or over the phoneyour purchase is recorded and

image text in transcribedimage text in transcribed
Whenever you use a credit or debit card to buy something online, in a store, by mail, or over the phoneyour purchase is recorded and stored in the retailer's database (as well as in the bank's database). Analyzing your purchasing patterns helps the companies develop more appropriate offers and more targeted communications. A growing number of consumers worry, however, that the names and numbers in these databases might be stolen electronically or through the theft of laptops or data. That is exactly what happened when hackers broke into the computer network of the parent company of retailer TJ Maxx and stole more than 45 million credit and debit card numbers. Because of that theft, millions of consumers had their banks cancel those cards and issue new cards. Each year, millions of US. consumers fall victim to identity theft, having credit card numbers or other details stolen and used to make fraudulent purchases. The government estimates that $50 billion worth of goods, services, and funds is stolen annually through identity theft. With so much data being gathered and stored by so many companies and government agencies, security is an important concern. Sometimes consumers are hoodwinked into revealing information in response to e-mails, letters, or phone calls that appear to be legitimate but are not. Even when you are just clicking around the Internet, some sites are collecting personal information about you, and you may not even know it. Many websites place cookies~small data lesuon your computer's hard drive to track your movement around each site and to determine which pages and items you looked at, how long you lingered, and which links you clicked on. The benet gained from this tracking is that sites can customize your online experience by knowing what items you have searched for or looked at. At the same time, your online behavior may be tracked by software that can determine which ads you will see based on the sites you have visited. This situation worries privacy advocates, who want rms to clearly disclose exactly what they are tracking and why and to get the consumer's permission before tracking. The Center for Digital Democracy and other groups have been pushing for a federal \"do not track" listusimilar to the \"do not call" listHso that consumers can opt out of online tracking. Although many sites post privacy policies to explain their data collection practices, consumers may not always notice these policies or understand what the data is being used for. M13 |hgpzr'fbigalegroup.comr'essentialslcompanyl927326?u=tlearn trl], for example,has addressed such concerns by changing its policy to hold information about searches conducted by consumers for 18 months and then to delete those searches. Consumers can also view their stored Google search data, edit out personal details, and have all search data erased, if they choose. However, sometimes companies take actions that seem inconsistent with their privacy policies. For instance, the pharmaceutical firm My h :Ubi. ale u .comr'essentialslcom an l305219?u=tlearn trl] violated its privacy policy by inadvertently revealing the names of people who had signed up to receive information from its Prozac .com website. In response, the Federal Trade Commission ordered Eli Lilly to set up a system to protect customer data for the next 20 years and to report every year on its security processes. The social networking site Facebook Ihgpzbigalegroupcomlessentialsfcompanyz' 1360265?u=t1earn trl], has also had problems with privacy. Not long ago, it launched an advertising feature in which a user's actions (such as scoring high on an online game or buying a movie ticket) popped up on the user's page and on the merchant's site. After an outcry from users and privacy advocates, Facebook changed the feature so that such actions would only be visible when users specically allowed them to be posted.j

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Contemporary Marketing

Authors: Louis E Boone, David L Kurtz

14th Edition

032458203X, 978-0324582031

More Books

Students also viewed these Marketing questions