Online Privacy Protection
Consumers are drawn to electronic commerce not only because of the products and services available, but also because of the convenience and savings possible with online transactions.
However, there are strong indications that the growth of e-commerce is being impeded by consumers’ fears about their privacy online. Old surveys revealed that eight out of ten consumers were concerned about protecting their privacy when participating in online activities, and that 40% did not believe that online companies honoured their posted privacy policies.
Consumers’ fears about privacy are not without foundation, and are reinforced by frequent media stories about poor online practices and unauthorized access to online data.
Clearly, the need to establish and maintain the trust of customers or potential customers is a significant challenge for online businesses, and a key to lasting commercial success. Protecting privacy is an essential component of building that trust.
In addition to consumer pressures, businesses are facing an evolving legislative framework for privacy protection in the private sector. To respond to the dual incentives of developing consumer trust and compliance with legislation, companies that wish to succeed in the online world are working to make privacy protection an integral part of their business initiatives.
Online businesses need to move quickly to understand their responsibilities to respect their customers’ privacy. They need to recognize that:
- if they collect, use or disclose personal information, they must do so responsibly;
- they must maximize customer control over their own personal information online; and
- they must ensure that their information practices are open and transparent to the consumer.
Beyond compliance with the law, privacy protection is critical to competitiveness online. Effective privacy protection is now a necessary part of doing business. There are significant risks and consequences (both commercial and legislative) to businesses that do not adequately address privacy.
Consent
Consent is to give one’s permission or to agree to something. Express consent is when it is given explicitly and unambiguously (e.g., “Yes, I agree to you selling my mailing address to third parties”). Implied consent is when it can be reasonably inferred or understood from activity or inactivity on the part of the individual (e.g., if you purchase a book online, it is reasonable that you consent to the book vendor giving your mailing address to its delivery company).
Related Entries of the International Encyclopedia:
- List of Banking Law e-Journals ContentsList of Banking Law e-JournalsConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Banking Law ... Read more...
- List of Immigration and Domicile Laws e-Journals ContentsList of Immigration and Domicile Laws e-JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of ... Read more...
- The American Journal of International Law ContentsThe American Journal of International LawConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries The American Journal ... Read more...
- Consumer law concepts Federal Trade Commission (FTC): is the main agency enforcing consumer protection statutes through the use of “industry guides”and enforcement of ... Read more...
- Case Law Individual Online Privacy ContentsCase Law Individual Online PrivacyCase Law by Tribunals and the Individual Privacy on InternetInformation at RiskLoss of privacy/access to justicePublic ... Read more...
- Internet Advertising Internet Advertising in Electronic Commerce Internet Advertising in the Online Business Law Spamming in Cyberlaw Spamming, Email Marketing and the Law of Unsolicited Commercial Email in Cyberlaw Commercial Email Online Gambling in Cyberlaw Online Gambling Consumer Protection in Cyberlaw [...]...
- Domain Name Protection Domain Name Protection in E-Commerce and the Electronic Commerce Resources See Also Click Fraud Copyright Cybercrime Cybersquatting E-Commerce Law Internet Advertising Internet Contracts Internet Defamation ...
- Federal environmental and wildlife protection acts ContentsUS Federal environmental and wildlife protection actsSome environmental protection acts:ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these ... Read more...
- Online privacy in the Constitution ContentsOnline privacy in the ConstitutionConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries Online privacy in the ... Read more...
- Trademarks Trademarks on the Internet and the Electronic Commerce Trademarks on the Internet in the Online Business Law Resources See Also Online Tax Internet Law Internet Marketing Internet Privacy Internet Sales Internet Tax Crossborder Commerce Keyword Advertising ...
- Florida: Abbreviations for law journals ContentsAbbreviations for Law Journals published by law schools located in FloridaConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the ... Read more...
- Idea Protection Intellectual Property in the Context of Internet Law Read, in this legal Encyclopedia, about the topic of this section, and, specially, about Idea Protection and Misappropriation...
- Data Privacy Protection Hexa-dimension Code of Practice for Data Privacy Protection, the Law and other Social Sciences Cyberspace inhabitants live under threat of a complex data privacy protection problem in a technology-dependent information-intensive phenomenon grown out of a vicious circle. The front-line [...]...
- Electronic Commerce Law Concepts ContentsIntroduction to Electronic Commerce LawTaxes in InternetInternet AgreementsOnline Privacy and Security Intellectual Property in Internet Online Promotion legal issuesRegulation of ... Read more...
- Terms of Use Terms of Use in Electronic Commerce Terms of Use in the Online Business Law Resources See Also Online Tax Internet Law Internet Marketing Internet Privacy Internet Sales Internet Tax Crossborder Commerce Keyword Advertising ...
- List of Commercial and International Trade Law e-Journals ContentsList of Commercial and International trade law e-JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List ... Read more...
- Consumer Protection The Legal History of Consumer Protection This section provides an overview of Consumer Protection Privacy, Security and Internet Advertising in the Context of Internet Law Read, in this legal Encyclopedia, about the topic of this section, and, specially, about Introduction to Consumer [...]...
- How to search legal journal indexes? ContentsHow to search legal journal indexes?ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries How to search ... Read more...
- List of Investment Law e-Journals ContentsList of Investment Law e-JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Investment Law ... Read more...
- References Citation ContentsU.S. Law Reviews & JournalsEuropean UnionConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries U.S. Law Reviews ... Read more...
- List of Intelectual Property e-Journals ContentsList of Intelectual Property e-JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Intelectual Property ... Read more...
- Surveillance Policy Privacy and Surveillance Law and Policy Contents of Privacy and Surveillance Law and Policy Contents of this subject matter include: Privacy and surveillance: definition, different contexts and perspectives, competing interests. Overview of the privacy (legal) landscape A common law tort of [...]...
- Law Journals Some of the most well-known law journals are: American Indian Law Review The American Journal of Comparative Law The American ... Read more...
- Copyright Protection Intellectual Property in the Context of Internet Law Read, in this legal Encyclopedia, about the topic of this section, and, specially, about Copyright Protection in Cyberspace...
- Antitrust Law Journal ContentsAntitrust Law JournalConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries Antitrust Law Journal Published by: American ... Read more...
- Weblogs Weblogs and the Electronic Commerce Weblogs in the Online Business Law Resources See Also Online Tax Internet Law Internet Marketing Internet Privacy Internet Sales Internet Tax Crossborder Commerce Keyword Advertising ...
- Web of Knowledge Citation Indexing Service ContentsWeb of Knowledge Citation Indexing ServiceLegal Resource ReviewSee AlsoFurther ReadingConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries ... Read more...
- Electronic Transactions The Uniform Electronic Transactions Act and the Electronic Commerce The Uniform Electronic Transactions Act in the Online Business Law Resources See Also Online Tax Internet Law Internet Marketing Internet Privacy Internet Sales Internet Tax Crossborder Commerce Keyword Advertising ...
- Consumer Protection Agency Introduction This entry provides an overview of the legal framework of consumer protection agency, with a description of the most significant features of consumer protection agency at international level. Related Work and Conclusions Resources See Also References (Papers) Misconstruing [...]...
- California Law Review ContentsCalifornia Law ReviewConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries California Law Review Published by: California ... Read more...
- List of Comparative Law Publications in english ContentsList of comparative law publications in english languajeIntroductionLegal publication – JurisdictionConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in ... Read more...
- Electronic Signature Electronic Signatures in Global and National Commerce Act and the Electronic Commerce Electronic Signatures in Global and National Commerce Act in the Online Business Law Resources See Also Online Tax Internet Law Internet Marketing Internet Privacy Internet Sales Internet Tax [...]...
- Shrink-Wrap License The Enforceability of Shrink-Wrap and Click-Wrap Licenses and the Electronic Commerce The Enforceability of Shrink-Wrap and Click-Wrap Licenses in the Online Business Law Resources See Also Online Tax Internet Law Internet Marketing Internet Privacy Internet Sales Internet Tax [...]...
- List of international law publications in english ContentsList of international law legal publications in english languageEnglish language legal publications JurisdictionConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and ... Read more...
- Legal Resources Index ContentsLegal Resources IndexConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries Legal Resources Index The Legal Resources ... Read more...
- List of top 10 most-cited legal articles in labor and employment law ContentsList of top 10 most-cited legal articles in labor and employment law, according to SaphiroConclusionNotesSee AlsoReferences and Further ReadingAbout the ... Read more...
- Legal Information Institute resources ContentsLegal Information Institute resourcesConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries Legal ... Read more...
- Google Buzz Privacy Concerns Google Buzz Privacy Concerns Google, like all multinational corporations, must abide by non-U.S. jurisdictions privacy laws when they launch products ... Read more...
- Privacy in Conducting Survey Research ContentsPrivacy in Conducting Survey ResearchBest PracticesStage 1: Issue DefinitionStage 2: Research Design and Questionnaire DevelopmentStage 3: Pretesting (fine-tuning) the SurveyStage ... Read more...
- Privacy law: privacy in peril ContentsPrivacy law: privacy in perilConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/s Privacy law: privacy in peril James B. ... Read more...
- Google Privacy Policy ContentsGoogle Privacy PolicyGoogle Privacy Policy Changes in 2012Data retention informationLinking of services and personal informationAndroid users Google Privacy Policy Google ... Read more...
- Online Sales Tax Online Sales Tax Online Sales Tax in the United States In the case “South Dakota v. Wayfair,” No. 17-494, Justice ... Read more...
- List of international online resources ContentsList of international legal online resourcesConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these ... Read more...
- List of International Law Online Journals ContentsList of International Law Online JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of International ... Read more...
- The Right to Privacy 5 Contents The Right to Privacy ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/s The Right to Privacy Although ... Read more...
- The Right to Privacy 10 Contents The Right to Privacy ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries The Right to ... Read more...
- The Right to Privacy 2 Contents The Right to Privacy ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries The Right to ... Read more...
- The Right to Privacy 3 Contents The Right to Privacy ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries The Right to ... Read more...
- Privacy Privacy is a highly subjective notion; its interpretation changes over time and space. It has been said that privacy is "part philosophy, some semantics and much pure passion."( Alan Westin, Privacy and Freedom (New York: Atheneum, 1967), p. x, as quoted in Bennett, Regulating [...]...
- Right to Privacy In relation to the right to privacy and constitutional law, Anna Jonsson Cornell[1] made the following observation: Since there is no theoretical or legal universally applicable umbrella concept of the right to privacy it is important how we structure our thinking around this particular [...]...
- Privacy Law Introduction This entry provides an overview of the legal framework of privacy law, with a description of the most significant features of privacy law at international level. Related Work and Conclusions Resources See Also References (Papers) Blethen Maine Newspapers, Inc. V. State: Balancing [...]...
- Invasion of Privacy Introduction to Invasion of PrivacyInvasion of Privacy, unlawful surveillance or intrusion into a person's private dwelling with intent to expose or encroach upon that person's private affairs." (1)ResourcesNotes and ReferencesInformation about ...
- Privacy in Argentina ContentsPrivacy in ArgentinaConstitutional Privacy FrameworkReport Privacy in Argentina Argentina country report of the Epic (Electronic Privacy Infomation Center) survey “Privacy ... Read more...
- Privacy Laws Spanish Translation of privacy laws This is the legal translation of English to Spanish in relation to privacy laws and / or a definition of this topic: Protección de Datos (in Spanish, without translation of the dictionary entry). Introduction This entry provides an overview of the [...]...
- International Privacy International Privacy Issues and the Electronic Commerce International Privacy Issues in the Online Business Law Resources See Also PPC Advertising Social Networking Online Business Law Internet Law Spam Startups Internet Tax Crossborder Commerce Technology Law Terms of Use ...
- Privacy Rights Methods for protecting intellectual property and privacy rights and the Electronic Commerce Methods for protecting intellectual property and privacy rights in the Online Business Law Resources See Also PPC Advertising Social Networking Online Business Law Internet Law Spam Startups [...]...
- Communication Privacy Management Communication Privacy Management and Mediated Communication, the Law and other Social Sciences Communication privacy management theory (CPM) (Petronio, 1991) was originally developed to explain how individuals control and reveal private information in traditional social interactions. It has [...]...
- Privacy Policies Ethical Ambiguities in the Privacy Policies of Mobile Health and Fitness Applications, the Law and other Social Sciences Personal Applications (apps) collect all sorts of personal information like name, email address, age, height, weight and in some cases detailed health information. When [...]...
- Workers Privacy Resources See Also Civil Liberty Civil Right Legal Right Citizen Freedom Political Liberty Constitutional Right Political Right Freedom of Speech...
- General Data Protection Regulation The General Data Protection Regulation (GDPR) will fundamentally reform the data protection law in Europe. In Germany, the GDPR is going to replace the current Federal Data Protection Act (Bundesdatenschutzgesetz) and will be directly applied by the authorities and courts. The GDPR has been negotiated since 2012 by the European Commission, Council and Parliament. It will enter into force in May 2018. The different levels of data protection within the...
- United International Bureaux for the Protection of Industrial, Literary, and Artistic Property and for the Protection of Intellectual Property Embracing mainstream international law, this section on united international bureaux for the protection of industrial, literary, and artistic property and for the protection of intellectual property explores the context, history and effect of the area of the law covered here. Resources Further [...]...
- Clothes Online Clothes Online Clothes on line In recent years the online clothes shopping has increased steadily, every day more people are ... Read more...
- TOP US Online Law Journals ranking ContentsTOP 12 US Online Law Journals rankingThe list of the US online Law Journals list continue as following:ConclusionNotesSee AlsoReferences and ... Read more...
- Hein Online Hello ContentsAbout Hein OnlineSearching and Browsinga) Quick Searchb) Field Searchc) Advanced SearchBrowsingi+Search resultsScholar CheckPrinting/DownloadingHein Online and citationsHeinOnline databasesConclusionNotesSee AlsoReferences and ... Read more...
- Online Citation Problems with the online citation See Legal citation and the Encyclopedia and How to Cite the Encyclopedia ContentsMLA GuidelinesConclusionNotesSee AlsoAbout ... Read more...
- Print Vs. Online Encyclopedias ContentsPrint Vs. Online Encyclopedias for Legal Research NotesSee AlsoConclusionReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries Print ... Read more...
- Online Legal Research Online Legal Research Tools Online tools include: westlaw loislaw Free Online Legal Research Sources Search engines There are several general search engines on the Internet that you can use to locate sites of interest. Google is the favourite of most general searchers because Size [...]...
- Online Dispute Resolution Introduction Ayelet Sela published an article entitled “Streamlining Justice: How Online Courts Can Resolve the Challenges of Pro Se Litigation” in the Cornell Journal of Law and Public Policy, Vol. 26, No. 2, 2016. This is an Abstract: “The tide of pro se litigation in the American justice [...]...
- Online Legal Services ContentsOnline Legal ServicesInternet Legal ServicesVirtual Law Services Review Online Legal Services Internet Legal Services By Tom McNichol. He is a ... Read more...
- Online Catalog Online catalog in Law LibrariesThe follow definition of Online catalog is of use in law library research: A catalog in electronic (machine-readable) format and accessible online. Also known as an Online Public Access Catalog (OPAC)....
- Online Advertising Privacy, Security and Internet Advertising in the Context of Internet Law Read, in this legal Encyclopedia, about the topic of this section, and, specially, about Advertising in Cyberspace...
- Online Business Regulations Online Business Regulations and the Electronic Commerce Online Business Regulations in the Online Business Law Resources See Also Online Tax Internet Law Internet Marketing Internet Privacy Internet Sales Internet Tax Crossborder Commerce Keyword Advertising ...
- Online Defamation Responding to claims of online slander or defamation and the Electronic Commerce Responding to claims of online slander or defamation in the Online Business Law Resources See Also PPC Advertising Social Networking Online Business Law Internet Law Spam Startups Internet Tax Crossborder [...]...
- Online Financial Transactions The Conduct and Regulation of Internet commerce in the Context of Internet Law Read, in this legal Encyclopedia, about the topic of this section, and, specially, about Online Financial Transactions and Payment Mechanisms...
- Online Gambling Privacy, Security and Internet Advertising in the Context of Internet Law Read, in this legal Encyclopedia, about the topic of this section, and, specially, about Online Gambling...
- Online Liability Website Audits in Cyberlaw Assessing and Limiting Liability Through Policies, Procedures and Website Audits User Generated Content in Cyberlaw Website Owner and Service Provider Liability for User Generated Content and User Misconduct Liability Risks in Cyberlaw Strategies for Managing [...]...
- Banking Online Overview of Banking Online in relation to cyber crime: [1]Other concerns have to do with online financial services not being readily available or experiencing technical difficulties that impinge of the ability of consumers tomake fund transfers when desired or needed. Ideally, online [...]...
- Children Online Legislation Overview of Children Online Legislation in relation to cyber crime: [1]Legal issues pertaining to the need to protect children and youth online are now being considered in the context of a world in which young people are so familiar with the use of information technologies that they may [...]...
- Falling in Love Online Meeting and Falling in Love Onlinebe Careful! Overview of Meeting and Falling in Love Onlinebe Careful! in relation to cyber crime: [1]Unfortunately, many people who engage socially online are deceived by the person or persons with whom they interact. Many people lie about [...]...
- Gaming Online Overview of Gaming Online in relation to cyber crime: [1]At about the same time, in 1975, the prototypical role-playing fantasy and miniatures game Dungeons and Dragons, created by Gary Gygax and Dave Arneson, was released initially as a tabletop fantasy role-playing game. Fantasy gaming [...]...
- Online Addiction Overview of Online Addiction in relation to cyber crime: [1]Arousal patterns are another indicator of addiction. People can become aroused by numerous activities, and each individual has his own unique method of gaining satisfaction. Therefore, some people will use alcohol, drugs, sex, [...]...
- Theft Online Fraudulent Schemes and Theft Online Overview of Fraudulent Schemes and Theft Online in relation to cyber crime: [1]Credit card fraud typically occurs online after cybercriminals establish or otherwise gain access to a financial account. Then, while using false identification or pretending [...]...
- Online Court ContentsOnline CourtDutch Online CourtUK Online Court Online Court Dutch Online Court Michael Cross wrote a new piece on the Law ... Read more...
- Online Courses Comprehensive E-learning Appraisal System. Method for Assessing Online Courses for Health., the Law and other Social Sciences The healthcare sector in the XXI century presents a big technological development that covers a broad knowledge. All fields of medicine are deepening their knowledge, [...]...
- Online Forums Discussion Processes in Online Forums, the Law and other Social Sciences Online discussions' information transparency, communication flexibility and opportunities for reflection, can enhance information processing, higher order thinking and learning. Many group processes influence online [...]...
- Online Learning Factors Contributing to the Effectiveness of Online Students and Instructors, the Law and other Social Sciences Identifying the positive attributes of students and instructors in the online environment will contribute to the understanding of how we can enhance the learning experience for the [...]...
- List of Justice organizations online resources ContentsList of Justice organizations online resourcesConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these ... Read more...
- List of justice international online resources ContentsList of justice international online resourcesConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these ... Read more...
- List of African online resources ContentsList of African online legal resourcesConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these ... Read more...
- List of Canada online resources ContentsList of Canada online legal resourcesConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these ... Read more...
- List of Banking legal online resources ContentsList of Banking legal online resourcesConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these ... Read more...
- List of Cloning online legal resources ContentsList of Cloning online legal resourcesConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these ... Read more...
- List of Genetics online legal resources List of Genetics online legal resources See also Biotechnology law and Genetics 1. Centre for Law & Genetics Description The ... Read more...
- List of Labor and Employment Law Online Journals ContentsList of Labor, Industrial Relations and Employment Law Online JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these ... Read more...
- List of Family Law Online Journals ContentsList of Family Law Online JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Family ... Read more...
- List of Internet Law Online Journals ContentsList of Internet Law Online JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Internet ... Read more...
- List of Estate Law Online Journals ContentsList of Estate Law Online JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Estate ... Read more...
- List of Administrative Law Online Journals ContentsList of Administrative law Online JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Administrative ... Read more...
- List of Consumer Law Online Journals ContentsList of Consumer Law Online JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Consumer ... Read more...
- List of Criminal Law Online Journals ContentsList of Criminal Law Online JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Criminal ... Read more...
- List of Maritime Law Online Journals ContentsList of Maritime Law Online JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Maritime ... Read more...
- List of Law Practice Online Journals ContentsList of Law Practice Online JournalsConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of Law ... Read more...
- List of European and UK Online Journals ContentsList of UK and European Legal e-JournalsSee AlsoConclusionNotesReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries List of ... Read more...
- Crowdsourced Online Dispute Resolution Crowdsourced Online Dispute Resolution (CODR) Daniel Dimov has released his dissertation on CODR, or Crowdsourced Dispute Resolution: “Although crowdsourced online ... Read more...
- Counter-terrorism Online Handbook Embracing mainstream international law, this section on counter-terrorism online handbook explores the context, history and effect of the area of the law covered here. Resources Further Reading The entry "counter-terrorism online handbook" in the Parry and Grant Encyclopaedic [...]...
- List of Workers compensation online legal resources ContentsList of Workers compensation online legal resourcesConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in ... Read more...
- List of Genetic engineering online legal resources ContentsList of Genetic engineering online legal resourcesConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in ... Read more...
- List of legal blogs and online extensions by law journals ContentsList of legal blogs and online extensions by Law Journals ConclusionNotesSee AlsoAbout the Author/s and Rewiever/sReferences and Further ReadingAbout the ... Read more...
- Cultural Protection conventions ContentsCultural Protection Treaties and related International AgreementsCultural Protection Treaties ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these ... Read more...
- International law: Culture protection ContentsInternational law: Culture protectionArticles and booksConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries International law: Culture ... Read more...
- The Right to Privacy ContentsThe Right to PrivacyConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries The Right to Privacy ... Read more...
- The Right to Privacy 4 Contents The Right to Privacy ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries The Right to ... Read more...
- The Right to Privacy 6 Contents The Right to Privacy ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/s The Right to Privacy Thus, ... Read more...
- The Right to Privacy 7 Contents The Right to Privacy ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/s The Right to Privacy The ... Read more...
- The Right to Privacy 8 Contents The Right to Privacy ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries The Right to ... Read more...
- The Right to Privacy 9 Contents The Right to Privacy ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries The Right to ... Read more...
- The Right to Privacy 11 Contents The Right to Privacy ConclusionNotesSee AlsoReferences and Further ReadingAbout the Author/s and Reviewer/sMentioned in these Entries The Right to ... Read more...
- International Plant Protection Convention ContentsInternational Plant Protection ConventionTitle of Convention About the Revised Text of the International Plant Protection ConventionConclusionNotesSee AlsoReferences and Further ReadingAbout ... Read more...
- ESA Agreement on the Protection and Exchange of Classified Information ContentsESA Agreement on the Protection and Exchange of Classified InformationTitle of TreatyAbout the Agreement about the Exchange of Classified InformationConclusionNotesSee ... Read more...
- Hague Convention on the International Protection of Adults Hello Hello ContentsHague Convention on the International Protection of AdultsTitle of the ConventionAbout the Convention on the International Protection of ... Read more...
Respect for Privacy:
Conduct business in the least privacy-intrusive manner possible.
Understand and comply with applicable privacy legislation, agreements, and standards.
Understand that personal information includes all information about, or linked to, a personally identifiable individual. This includes such information as name, address, credit card number, income, purchase preferences, and transactional data. E-mail addresses, as well as data collected from automatic tracking methods may constitute personal information if linked to an identifiable individual.
Recognize that personal information is about individuals who have the right to exercise reasonable control over that data.
Assess the impact on privacy of any proposed online practice, service, product, or technology, prior to implementation.
Take special care when dealing with children. If there is a reasonable likelihood of collecting, using or disclosing personal information from or about children, follow appropriate privacy practices
Openness:
Develop privacy policies and practices requiring personal information to be handled in an open and accountable manner.
Be open and informative about your organization’s policies and practices involving personal information.
Ensure your stated policies and practices are factual, accurate and complete. Do not misrepresent your company’s identity or information practices.
Inform individuals, upon request, of any records your organization maintains containing their personal information, how you use it, and what data you disclose.
Provide individuals with sufficient information for them to understand their privacy rights, and give them the opportunity to exercise those rights quickly, effectively, and without prohibitive cost. Information should include the name or title and contact information of the person/area responsible for your privacy policies and practices, as well as details about how individuals can access their personal information in your control.
Prepare and post a privacy policy on your Web site. Your policy should clearly explain all your responsibilities and information practices. Specifically, your policy should be designed so it is:
– easy to find, easy to read, easy to print, and easy to understand (e.g., use examples to explain and demonstrate your practices);
– accessible from every Web page, not just the home page; and
– written in the same language as the Web site to which it is attached.
Do not change your stated privacy policies and practices without providing enough time and information for affected individuals to make informed decisions and take appropriate action.
Inform individuals of:
– all applicable privacy legislation and agreements, and provide links to the Web sites of the authorities responsible for the administration and enforcement of these instruments;
– all professional codes of practice, seals, or other programs you must be in compliance with, and provide links to the full text of these agreements, and to the Web sites of the organizations responsible for their proper implementation and enforcement;
– the consequences to your organization for non-compliance with your privacy policies and practices, and with all other relevant programs and legislation (e.g., audit, penalties or sanctions, revocation of seal, loss of professional membership, complaint forwarded to an oversight body for investigation, or publication of name for non-compliance); and
– their recourse if they believe you are not complying with your policies and practices, or with any other relevant programs or legislation.
Explain your use of any type of Web-based tools to collect personal information that may not be readily apparent to a user. This should include use of automatic tracking software, clickstream data, cookies, and clear GIF files (i.e., Web bugs).
Explain your solicitation practices (e-mail and other means), as well as what personal information you rent, sell, or exchange to third parties for marketing or other purposes.
Inform individuals:
– if data you collect, use and disclose online is handled differently offline and why. If it is, specify how, and inform them how they can interact with your organization through other means (e.g., mail, in person, fax, or telephone); and
– of any security or privacy violations involving their personal information as soon as possible, as well as what action they can take to remedy the problem or minimize the risks.
Accountability:
Ensure privacy protection is a priority for all levels of your organization. Top level commitment to privacy policies and practices is critical for success.
Understand that if you collect personal information, you accept the responsibility to handle that data in accordance with your stated privacy policies and practices, and to make that information available to the individual to whom it relates.
Train your staff and make them accountable for adherence to your privacy policies and practices.
Designate a specific individual or position responsible for protecting privacy and complying with your privacy policies. While in larger organizations it may be necessary to have a team or group involved in developing and implementing your policies, with varying levels of responsibility, there always should be someone with final accountability. Provide sufficient resources and authority to discharge this responsibility in an effective and timely manner.
Publicize the identity of the responsible individual on your Web site, along with information about how they can be reached online and offline, and your days and hours of operation, if applicable.
Establish procedures for reviewing your privacy policies and practices to ensure they remain accurate, timely and complete.
Develop a process to verify your compliance with your stated privacy policies and practices, and to publicly demonstrate that compliance.
Define your obligation to undertake all necessary action to correct any problems that arise out of your non-compliance with your own policies and practices, or with any legislative requirement.
Include privacy protection requirements, comparable to your own policies and practices, in your contracts with business partners or third parties who will have access to personal information collected or controlled by you. This is particularly important if you will be sending personal information to jurisdictions without comparable privacy protection regulation. Take all reasonable steps to ensure the contracted party follows the privacy protection measures stipulated in your contracts (e.g., site visits, audits).
Understand that if you collect personal information, you accept the responsibility to handle that data in accordance with your stated privacy policies and practices, and to make that information available to the individual to whom it relates.
Purpose Specification.
Define the purposes or reasons why you need each piece or type of personal information (e.g.,�name, address, e-mail address, clickstream data, age, gender, income, etc.) in order to complete a specific, legitimate business transaction. When identifying potential purposes, consider the following:
– if non-identifiable information (i.e., coded, anonymous, pseudonymous, or aggregated) could fulfil the purpose;
– how the personal information needs to be collected (e.g., directly from the individual through a subscription, automatic collection of clickstream data, or from a third party) and why;
– who will need to use the information (within and outside the organization), and why; and
– to whom it will need to be disclosed, and why.
Identify any additional reasons to collect, use or disclose personal information not strictly related to the specific business transaction (e.g., incentive programs, target e-mail marketing services, data mining, etc.).
Understand that your defined purposes should be reasonable in the context of your business.
Do not define your purposes so broadly as to make them meaningless to the individual from whom you want to collect personal information.
Document your purposes so that your staff and the individuals to whom the personal information relates can know what they are.
Identify any new purpose for using previously collected personal information prior to its use.
Collection Limitation:
Do not collect personally identifiable information, whenever possible (e.g., permit the individual to visit your Web site without capturing clickstream data, or let the individual deal with you anonymously or pseudonymously).
Collect only the amount and type of personal information necessary and relevant for the identified purpose(s), or as required by law.
Collect personal information by lawful and fair means, and from reliable sources.
Do not collect personal information in a covert or coercive manner, or through misleading or deceptive practices.
Inform individuals, at or before the time of collection, of the type of personal information you intend to collect, including data you collect by automated means.
Inform individuals, at or before the time of collection, if the personal information to be collected is required by law and, if so, fully explain the specific requirement.
Collect personal information directly from the individual to whom it relates, except in limited and defined circumstances.
Inform individuals of the types and sources of personal information you collect indirectly for the purpose of providing services or products (e.g., data collected from third parties). Also indicate why direct collection is not possible or appropriate.
Do not allow third parties to collect personal information or cookies through your Web site unless they are contractually bound to a comparable privacy standard.
Avoid collecting unique identifiers (e.g., SIN or driver’s license number) unless their use is required by law, or express consent is obtained from the individual. If required to collect unique identifiers (e.g., for tax requirements), explain reasons to the individual at or before the time of collection.
Comply with relevant legislative restrictions on the collection of personal information (e.g., human rights legislation may limit what may be collected on employment applications).
Use and Disclosure Limitations.
Do not use personal information except in the manner, and for the purpose(s), identified to the individual at the time of collection, unless the individual to whom the personal information relates consents, or by authority of law.
Do not disclose, distribute, or make personal information available in any way, except for the purpose(s), and to the sources identified to the individual at the time of collection, unless the individual to whom the personal information relates consents, or by authority of law.
Take all reasonable steps to ensure that the personal information you use and disclose is relevant and necessary to fulfil the identified purpose(s), or the requirements of law.
Use both policy and technical restrictions to control unauthorized and unrelated uses and disclosures.
Limit use of persistent cookies to where they are needed for a continuing purpose. The expiry date of a cookie should be consistent with the purpose.
Inform individuals of any legal requirements you have to disclose personal information, and to whom. Include these requirements in your privacy policies.
Inform individuals of the circumstances when disclosure may take place without their prior knowledge or consent (e.g., serious and imminent threat to public health or safety). Include these reasons in your privacy policies.
Do not knowingly disclose or transfer personal information to third parties without adequate privacy safeguards.
Establish appropriate and effective controls and schedules for information retention and destruction. Ensure that all practices are fully documented.
Retain personal information in identifiable form only as long as it is relevant and necessary to fulfil the purpose(s) for which it was collected, as required by law, or as needed to give the individual to whom the information relates an opportunity to access and/or correct the data.
Destroy, erase, or permanently de-identify any personal information no longer needed for its identified purpose(s) or to meet legal requirements.
Maintain a record of disclosure so you can update third parties who have previously received personal information from you, as required (e.g., in cases when disclosed data are corrected due to inaccuracy).
Accuracy:
Do not knowingly collect, use or disclose inaccurate personal information.
Take all reasonable measures to ensure personal information is accurate, complete, and up-to-date, having regard for the nature of the data, the purpose(s) for which it is collected, used and disclosed, and the interests of the individual to whom the data relates.
Take all reasonable steps to minimize the chances of inaccurate data being used to make a decision about an individual. In determining what measures you should adopt, consider the extent of potential harm to the individual should you use or disclose inaccurate information.
Security:
Protect all personal information in your control from loss or theft, and from unauthorized access (within and outside your organization), use, alteration, copying, disclosure, and destruction.
Establish security safeguards appropriate and proportional to the sensitivity of the personal information, and the nature of the possible risks. In gauging sensitivity, consider the potential harm (e.g., financial loss, loss of benefits or opportunities, discrimination or stigmatization, public embarrassment) to the individual should the information be misused or disclosed in an unauthorized manner.
Implement effective physical, technical, and procedural measures to secure personal information on your Web site and linked computer systems.
Develop policies and practices restricting employee access (including information technology staff) to personal information for unrelated and non-business reasons. Include appropriate disciplinary measures for violation.
Inform individuals of the security measures you will undertake to protect their personal information. Include an outline of these measures in your privacy policies.
Inform individuals of the steps they should take to conduct online transactions safely and securely.
Establish appropriate access and verification procedures, audit trails and record integrity controls.
Take all reasonable steps to ensure communications or transactions through your Web site do not result in unauthorized access to individuals’ computers or personal information, or unauthorized modification or destruction of their data.
Establish secure disposal procedures to ensure personal information cannot be recreated or reconstructed after destruction, and the individual cannot be identified or linked to that data in any way.
Maintain a record of destruction documenting how and when personal information is destroyed, and the necessary authorization to do so.
Take all reasonable steps to ensure third parties involved in a transaction (e.g., those renting or leasing the data, as well as any party contracted to your organization to conduct such activities as data processing or data mining) have adequate security.
Complaints/Dispute Resolution:
Develop procedures to receive, investigate and respond to complaints and questions about all aspects of compliance with your posted privacy policy and practices. Permit as much secure online interaction as possible.
Ensure your complaint and dispute resolution processes are effective, fair, impartial, confidential, understandable, easy to use, and timely. They also should be cost effective for all parties involved, to the extent reasonably possible.
Respond to complaints, and take corrective action, as appropriate, in a timely manner.
Ensure your process for receiving and responding to inquiries and complaints, along with the individual’s recourse, is fully described and easily found on your Web site.
Do not charge individuals for the opportunity to exercise their right to challenge your denial of access decisions.
Inform individuals of any third party investigative and dispute resolution procedures available to them.
Direct individuals to the relevant authorities (e.g., a Privacy or Data Protection Commissioner, industry association, or seal program), if you cannot resolve the complaint to the individual’s satisfaction. Alternatively, make available third party dispute resolution mechanisms on an optional basis. Such processes should be accessible, affordable, fair and impartial for all parties.