Preview

Paycom Marketing Plan

Powerful Essays
Open Document
Open Document
3233 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Paycom Marketing Plan
The Obama administration’s proposal for a Consumer Privacy Bill of Rights, which was released as part of its “Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy,” is intended to give users more control over how their personal information is used in commercial transactions (Klosek, 2012). This type of framework is geared toward technologies such as mobile apps. Mobile app technology is capable of cloning personal information from a mobile device such as ID numbers, email address, current location, texts messages, calendars and personal photos.
Companies such as Google, Yahoo, Microsoft, and AOL have agreed to not track consumer browser use. These companies have been critized in the past for not doing what is required to protect the privacy of its consumers. They have been tracking their information without any consent or providing information to the consumer regarding how the data will be used. Now with the CPBR, consumers will now have the right to control what information is used, how it will be used and monitor the accuracy of the data collected. In order to use the Consumer Privacy Bill of Rights for future litigation, seven general principles have been developed to use as a guide.
“Individual Control: Consumers have a right to exercise control over what personal companies collect from them and how they use it (Kloesk, 2012).” Going forward, companies will have to present consent as well as choices to the consumer about the data that is being collected, whereas before, consumers have been unaware of what type of data was being collected and how it was being used.
“Transparency: Consumers have a right to easily understandable and accessible information about privacy and security practices (Klosek, 2012).” There are many privacy risks in regards to mobile devices. With the CPBR, consumers with be informed about the most recent and relevant information regarding

You May Also Find These Documents Helpful

  • Good Essays

    With the rise of technological advancements, the need for privacy increases as online records are hacked, cameras seem to be everywhere, and records that should be confidential are public. Some would say that privacy is a barrier that could become potentially dangerous due to the denial of access to important documents such as medical records, while others would argue that privacy is an inalienable right no matter the circumstance. However, this debate is simply not black and white, and the solution is to enact laws that grant companies the access to information only after they have been given permission from the owner of said information.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cloud Flare Case

    • 2639 Words
    • 11 Pages

    NSA accused for spying on US citizens through third party technological companies (Menn & Weber, 2013)…

    • 2639 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    “Technology-neutral data-protection laws afford rights to individuals with respect to all data about them, regardless of the data source” (Wilson…

    • 1537 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Has there ever been a time when dinner is just about to start and in the middle of saying prayer the phone rings? Dad gets up to answer the phone and on the other end is a telemarketer. The telemarketer is trying to sell something and dad isn’t interested; its dinner time he says, or maybe it is some voice recording selling something. It has happened to just about everyone. Because there have been advances in information technology; the result has been the creation of Acts of Congress to address the ethical issues which could violate our right to privacy. In this essay two Acts will be discussed: The Telephone Consumer Protection Act of 1991 and The Do Not Call Implementation Act of 2003. Both acts have to deal with our rights to privacy.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Privacy is a fundamental moral right in a democratic society. It is the right bestowed upon individuals that strengthen the freedoms of speech, press, association, and assembly which are crucial for a free, democratic society. However, advancement in technology threatens privacy and autonomy which reduces the control over private data and exposes individuals to undesirable consequences. Thus, a loss of privacy leads to a loss of an individual’s freedom in society.…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Coppa Bis/220

    • 664 Words
    • 3 Pages

    With technology advancing and more children are having access to the web and different social networking sites, many provisions had to be put in place to help children be protected from the lures of different online websites. The websites on the internet require the constant collection of data for marketing purposes and for third party disclosure as well. However, with the creation of COPPA this would no longer be allowed, and it would make it so that websites had to more safely secure children user information such as their names, ages, and addresses.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Now businesses can buy a web user’s personal information (medical, financial, credit card info) if the website they are browsing isn’t encrypted. Consumer’s personal information can be sold off to advertisers and big businesses from the ISPs without the ISPs having to ask that consumer for permission to do so [2]. Now that the regulation has been eliminated, ISPs can sell whatever sensitive info they want freely and advertisers can use that to better market towards consumers. While one can argue that they can avoid this problem by choosing a different ISP that claims they wouldn’t sell they consumers’ info off, it’s not the same for everyone. Some people don’t have much of an option to choose from regarding their ISPs because of their locations…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    The new technology and apps make things simpler for the consumer but also make personal information less secure and more accessible to identity thieves. This is a concerning and a more common problem that we face wich impacts individuals in a very negative way.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    “Terms and Conditions May Apply” offers an illuminating look at privacy in the digital age, and the potential dangers of it as our online information (data) is shared with the government, and sold to the highest bidder. In the documentary, Cullen Hoback shows how those “terms and conditions” and agreed policies allows corporations to do things with our personal information that we could never imagine. What are we really agreeing to when we click “I agree”? Through Interviews with tech enthusiasts and futurists such as Facebook’s Mark Zuckerberg, Google’s Chief Engineer Ray Kurzweil, Eric Schmidt, Christopher Soghoian and more, the documentary brilliantly examines and documents the erosion of online privacy and how the government and private…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Best Essays

    The influence of social networks with society today is changing the way of life by creating a lack in society 's interaction skills that were once possessed, along with making themselves and their lives public knowledge. As computer crimes continue to rise, the internet continues to evolve by being accessible in the palm of a hand and everywhere you go and people are consuming more and more of their time staying in contact with others through various internet sites throughout the internet. By partaking in tasks such as uploading pictures, checking in at different establishments, status updates, and using chat applications, people all around are beginning to forget the way life once was before now and unforeseen issues are resulting from it.…

    • 2198 Words
    • 9 Pages
    Best Essays
  • Good Essays

    Internet Privacy.

    • 1148 Words
    • 5 Pages

    In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance models of smart phones, or new more sophisticated window systems, or new and more reliable internet security program in hope that this time advancements in technologies not only help to improve our life, but help to protect our privacy while using the internet. It seems the more advance computer and internet technologies get, the more our privacy gets violated. There is a parallel connection between internet privacy and advancements in computer technologies. Future of computer and digital technology is unlimited, and it is impossible to predict. However we should recognize the consequences of using the internet for different aspects of our lives, this will in turn help us to understand internet privacy and how to protect our privacy. Until then violation of the internet privacy will increase, and it is okay because we all learn in a process.…

    • 1148 Words
    • 5 Pages
    Good Essays

Related Topics