An Analysis of Online Privacy Policies of Fortune 100 Companies

Cyber Crime ◽  
2013 ◽  
pp. 1276-1291
Author(s):  
Suhong Li ◽  
Chen Zhang

The purpose of this chapter is to investigate the current status of online privacy policies of Fortune 100 Companies. It was found that 94% of the surveyed companies have posted an online privacy policy and 82% of them collect personal information from consumers. The majority of the companies only partially follow the four principles (notice, choice, access, and security) of fair information practices. For example, most of the organizations give consumers some notice and choice in term of the collection and use of their personal information. However, organizations fall short in security requirements. Only 19% of organizations mention that they have taken steps to provide security for information both during transmission and after their sites have received the information. The results also reveal that a few organizations have obtained third-party privacy seals including TRUSTe, BBBOnline Privacy, and Safe Harbor.

2009 ◽  
pp. 269-283
Author(s):  
Suhong Li

The purpose of this chapter is to investigate the current status of online privacy policies of Fortune 100 Companies. It was found that 94% of the surveyed companies have posted an online privacy policy and 82% of them collect personal information from consumers. The majority of the companies only partially follow the four principles (notice, choice, access, and security) of fair information practices. For example, most of the organizations give consumers some notice and choice in term of the collection and use of their personal information. However, organizations fall short in security requirements. Only 19% of organizations mention that they have taken steps to provide security for information both during transmission and after their sites have received the information. The results also reveal that a few organizations have obtained third-party privacy seals including TRUSTe, BBBOnline Privacy, and Safe Harbor.


Cyber Crime ◽  
2013 ◽  
pp. 814-831
Author(s):  
J. Michael Tarn ◽  
Naoki Hamamoto

This chapter explores the current status and practices of online privacy protection in Japan. Since the concept of privacy in Japan is different from that in western countries, the background of online privacy concepts and control mechanisms are discussed. The chapter then introduces Japan’s Act on the Protection of Personal Information along with the privacy protection system in Japan. Following the discussion of the privacy law, Japan’s privacy protection mechanisms to support and implement the new act are examined. To help companies make smooth adjustments and transitions, a four-stage privacy protection solution model is presented. Further, this chapter discusses two case studies to exemplify the problems and dilemmas encountered by two Japanese enterprises. The cases are analyzed and their implications are discussed. The chapter is concluded with future trends and research directions.


2019 ◽  
Vol 14 (2) ◽  
pp. 116-118 ◽  
Author(s):  
Stephanie Krueger

A Review of: Tummon, N., & McKinnon, D. (2018). Attitudes and practices of Canadian academic librarians regarding library and online privacy: A national study. Library and Information Science Research, 40(2), 86-97. https://doi.org/10.1016/j.lisr.2018.05.002 Abstract Objective – To assess attitudes of Canadian academic librarians regarding online privacy issues and to gauge their knowledge of related procedures and policies at their institutions. Design – Attitudinal online survey in English. Setting – English-language academic libraries in 10 Canadian provinces. Subjects – English-speaking academic librarians across Canada. Methods – Survey, based on Zimmer’s 2014 study of librarians in the United States of America, announced via email to 1,317 potential participants, managed using LimeSurvey, and available from April 7 to May 5, 2017. In 28 optional multiple choice or Likert scale questions, the survey prompted participants to express their attitudes regarding online privacy scenarios and privacy-related library practices, including patron data collection. Results were analyzed in Microsoft Excel and SPSS. Main Results – The survey response rate was 13.9% (183 respondents). Job position, age, or geographic location did not appear to influence attitudes towards privacy, with almost all respondents strongly agreeing or agreeing that individuals should control who sees their personal information (96.2%) and that companies collect too much such information (97.8%). Respondents voiced slightly less concern about government information collection, but nearly all respondents agreed that governments should not share personal information with third parties without authorization and that companies should only use information for the purposes they specify. When asked if privacy issues are more important today than five years ago, 69.9% of respondents said they were more concerned and 78.1% noted they knew more than five years before about privacy-related risks. Regarding online behaviour, 53.3% of respondents felt web behaviour tracking is both beneficial and harmful, with 29.1% considering it harmful, and 13.7% finding it neither beneficial nor harmful. Online shopping and identify theft, social media behaviour tracking, search engine policy display, and personal information sharing were also areas of concern for respondents, with the majority noting they were somewhat or very concerned about these issues.  In terms of library practices, most respondents strongly agreed that libraries should not share personal information, circulation records, or Internet use records with third parties unless authorized, though 33% of respondents noted they could neither agree nor disagree that libraries are doing all they can to prevent unauthorized access to such information. The majority of respondents strongly agreed or agreed that libraries should play a role in educating patrons about privacy issues. Many respondents (68.9%) did not know if their libraries had practices or procedures for dealing with patron information requests from law enforcement or governmental representatives. The majority of respondents did not know if patrons at their libraries had inquired about privacy issues, 42.3% did not know if their libraries communicate privacy policies to patrons, and 45.4% noted their libraries did not inform patrons about library e-resource privacy policies. Many respondents (55.2%) had attended educational sessions about online privacy and surveillance in the past five years, while 52.2% noted their libraries had not hosted or organized such sessions over the same period. Conclusion – Survey participants showed concern about online and patron privacy, though their lack of knowledge about local procedures and policies highlights a potential need for enhanced privacy education.


First Monday ◽  
2016 ◽  
Author(s):  
Margaret Jackson ◽  
Jonathan O'Donnell ◽  
Joann Cattlin

Simple Privacy provides a system for Australian organisations to create privacy policies for the personal information they collect online. The privacy policies it creates are legally compliant and easy to understand. We developed this system because small Australian organisations seemed to find privacy policies too complicated to manage with the resources they have available.This paper describes the framework behind Simple Privacy and discusses the choices that we made during development. These choices balance the requirements of the privacy legislation and the needs of both organisations and customers.


2020 ◽  
Vol 1 (3) ◽  
pp. 41-45 ◽  
Author(s):  
Aloysius Bernanda Gunawan

This article aims to identify common practices in Indonesian e-commerce regarding terms of use and privacy policies. Website visit rankings from Alexa and Similarweb were used to identify the 10 most commonly visited e-commerce sites in Indonesia. Then, placement, length, and content structure of the terms of service and privacy policies of these websites were compared. Findings suggest that the information provided by these documents is sufficient and legally compliant, although some of the websites appear to disregard their importance. The actual contents of these documents were not analyzed and are thus open for further study. The information provided in this article may give merchants intending to open e-commerce stores in Indonesia some insight into how the protection of consumers’ personal data leads to better service. This paper also proposes a simple framework for assessing the extent to which an e-commerce website successfully ensures that consumers agree and consent to its terms of use without burdening them with lengthy and obscure legal documents. Keywords: online privacy e-commerce term of use


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

With a growing number of health and wellness applications (apps), there is a need to explore exactly what third parties can legally do with personal data. Following a review of the online privacy policies of a select set of mobile health and fitness apps, this chapter assessed the privacy policies of four popular health and fitness apps, using a checklist that comprised five privacy risk categories. Privacy risks, were based on two questions: a) is important information missing to make informed decisions about the use of personal data? and b) is information being shared that might compromise the end-user's right to privacy of that information? The online privacy policies of each selected app was further examined to identify important privacy risks. From this, a separate checklist was completed and compared to reach an agreement of the presence or absence of each privacy risk category. This chapter concludes with a set of recommendations when designing privacy policies for the sharing of personal information collected from health and fitness apps.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

With a growing number of health and wellness applications (apps), there is a need to explore exactly what third parties can legally do with personal data. Following a review of the online privacy policies of a select set of mobile health and fitness apps, this chapter assessed the privacy policies of four popular health and fitness apps, using a checklist that comprised five privacy risk categories. Privacy risks, were based on two questions: a) is important information missing to make informed decisions about the use of personal data? and b) is information being shared that might compromise the end-user's right to privacy of that information? The online privacy policies of each selected app was further examined to identify important privacy risks. From this, a separate checklist was completed and compared to reach an agreement of the presence or absence of each privacy risk category. This chapter concludes with a set of recommendations when designing privacy policies for the sharing of personal information collected from health and fitness apps.


2013 ◽  
Vol 19 ◽  
pp. 52-65
Author(s):  
Yohko Orito ◽  
Kiyoshi Murata ◽  
Yasunori Fukuta

In this study, we attempt to examine the effectiveness of online privacy policies and privacy seals/security icons on corporate trustworthiness and reputation management, and to clarify how young Japanese people evaluate the trustworthiness of B to C e-business sites in terms of personal information handling. The survey results indicate that posting online privacy policies and/or privacy seals/security icons by B to C e-businesses does not work for creating trust in business organisations by consumers actively. Instead, existing good name recognition and/or general reputation can engender trust and, increasingly, better their reputation in terms of personal information use and protection.


2016 ◽  
Vol 12 (1) ◽  
Author(s):  
Patricia Zeni Marchiori ◽  
Jaqueline Lopes

RESUMO A presente investigação objetiva apresentar os princípios de informação equitativa nas políticas de privacidade dos sites das principais empresas brasileiras (segundo lista da revista americana Forbes do ano de 2014). A verificação e análise apoiaram-se em um checklist elaborado a partir de documentos emanados pela Federal Trade Commission e pela Organization for Economic Co-operation and Development. O levantamento envolveu 14 empresas selecionadas de um universo de 25, considerando-se o critério de imediatez de acesso à política de privacidade nos respectivos sites. O princípio de segurança é o fundamento mais difundido nas políticas de privacidade das empresas selecionadas (existente em 8 das 14 políticas analisadas), e o princípio de responsabilidade é o de menor aderência, pois não está contemplado em quaisquer das políticas de privacidade online examinadas. A Sabesp apresenta a política de privacidade da web mais completa diante dos princípios de informação equitativa, se comparada às outras políticas analisadas, enquanto que a WEG não apresenta qualquer um dos princípios identificados no levantamento documental. Quanto ao comércio eletrônico, o número de empresas que assume algum princípio é ainda mais reduzido. Conclui-se que, para o universo selecionado, a adesão aos princípios de informação equitativa é incipiente ainda que se ressalte a sua não obrigatoriedade. A discussão aberta do projeto de lei de proteção de dados pessoais no Brasil deverá ter um papel importante na criação de orientações mais completas na temática. Propõem-se estudos adicionais envolvendo a percepção de usuários de tais sites, assim como um recorte de empresas voltadas diretamente ao comércio eletrônico, considerando-se que este contexto pode exigir o alinhamento efetivo aos princípios e outras orientações voltadas à proteção da privacidade e dos dados pessoais no ambiente web.Palavras-chave: Princípios de Informação Equitativa; Política de Privacidade Online; Proteção de Dados Pessoais.ABSTRACT This article aims to present the Fair Information Principles in the privacy policies of the websites of major Brazilian companies (according to the 2014 Forbes Magazine list). The research and analysis were supported by a checklist compiled from documents issued by the Federal Trade Commission and the Organization for Economic Co-operation and Development. The study selected fourteen companies from a universe of twenty-five, considering the immediacy criterion of access to the privacy policy on their websites. The security (safeguards) principle is the most widespread foundation in the privacy policies of the companies selected (existing in eight of the fourteen analyzed policies); and the principle of responsibility receives less adhesion since it is not covered in any of the examined online privacy policies. The Sabesp Company presents the most complete privacy policy, considering the compliance with the Fair Information Principles when compared to the others perused, while WEG does not present any of the principles identified in the documental survey. As for e-commerce, the number of companies that assume some of the Principles is even smaller. For the selected universe, adherence to the Fair information Principles is still incipient, and its use is not mandatory. An open discussion of the proposed Brazilian law about personal data protection should play an important role in creating further guidance on the subject. Additional studies in this subject should involve the perception of users, as well as a cutout of companies which target e-commerce, considering that an effective alignment with these principles and other guidelines are required in order to protect the user’s privacy and personal data in the web environment.Keywords: Fair Information Principles; Privacy Policies; Personal Data Protection.


Author(s):  
David Lie ◽  
Lisa M. Austin ◽  
Peter Yi Ping Sun ◽  
Wenjun Qiu

We have a data transparency problem. Currently, one of the main mechanisms we have to understand data flows is through the self-reporting that organizations provide through privacy policies. These suffer from many well-known problems, problems that are becoming more acute with the increasing complexity of the data ecosystem and the role of third parties – the affiliates, partners, processors, ad agencies, analytic services, and data brokers involved in the contemporary data practices of organizations. In this article, we argue that automating privacy policy analysis can improve the usability of privacy policies as a transparency mechanism. Our argument has five parts. First, we claim that we need to shift from thinking about privacy policies as a transparency mechanism that enhances consumer choice and see them as a transparency mechanism that enhances meaningful accountability. Second, we discuss a research tool that we prototyped, called AppTrans (for Application Transparency), which can detect inconsistencies between the declarations in a privacy policy and the actions the mobile application can potentially take if it is used. We used AppTrans to test seven hundred applications and found that 59.5 per cent were collecting data in ways that were not declared in their policies. The vast majority of the discrepancies were due to third party data collection such as adversiting and analytics. Third, we outline the follow-on research we did to extend AppTrans to analyse the information sharing of mobile applications with third parties, with mixed results. Fourth, we situate our findings in relation to the third party issues that came to light in the recent Cambridge Analytica scandal and the calls from regulators for enhanced technical safeguards in managing these third party relationships. Fifth, we discuss some of the limitations of privacy policy automation as a strategy for enhanced data transparency and the policy implications of these limitations.


Sign in / Sign up

Export Citation Format

Share Document