Chapter 14: Customer Privacy Concerns and Privacy Protective Responses.

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
CHAPTER 4 E-ENVIRONMENT
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Consumer Privacy and Information Access Professor Matt Thatcher.
BGS Customer Relationship Management Chapter 13 Privacy and Ethics Considerations Chapter 13 Privacy and Ethics Considerations Thomson Publishing 2007.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Handle with care : Digital marketing and online behavioural advertising Global guidance to help improve consumer trust in practice, techniques and messages.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Business Plug-In B7 Ethics.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Privacy as an International Information Issue MD823 October 18, 2004.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Per Anders Eriksson
Transborder dataflows Flow of information across national borders Much of this data involves personal information.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
Name of presenter(s) or subtitle Privacy laws and their impact on research David W. Stark MRIA B.C. Chapter November 2, 2005.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Privacy of Home Energy Usage Data Jim Williams June 26, 2012 Jim Williams June 26, 2012.
E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Unsolicited Commercial Meeting of Oftel Internet Forum 22 July 1999 EU Distance Selling Directive provisions on unsolicited .
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Privacy & How IT Will Help JEFF NORTHROP, CTO
Chapter 45 Consumer Law McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 25 Consumer Law.
Federal Agencies and Laws for Consumer Rights
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Data protection—training materials [Name and details of speaker]
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
Jim Loter Director of Information Technology
Privacy and Public Policy Implications of IoT
Surveillance around the world
Federal Agencies and Laws for Consumer Rights
Privacy principles Individual written policies
E&O Risk Management: Meeting the Challenge of Change
Data Protection The Current Regime
Move this to online module slides 11-56
Current Privacy Issues That May Affect Your Credit Union
Employee Privacy and Privacy of Employee Information
Health Care: Privacy in a Digital Age
The activity of Art. 29. Working Party György Halmos
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Presentation transcript:

Chapter 14: Customer Privacy Concerns and Privacy Protective Responses

2 V. Kumar and W. Reinartz – Customer Relationship Management Overview Topics discussed:  The Concept of Customer Privacy  Drivers of Customer Privacy Concerns  Regulations to Protect Customer Privacy  Customer Privacy Protective Responses  Privacy Paradox  Consequences of Customer Privacy Protective Responses  Implications for Companies

3 V. Kumar and W. Reinartz – Customer Relationship Management The Concept of Customer Privacy Customer privacy can be defined as “the power of the individual to personally control (vis-à-vis other individuals, groups, organizations, etc.) information about one’s self.” The includes control over the collection, storage, usage, and release of personal information. Stone, Gueutal, Gardner, & McClure, 1983

4 V. Kumar and W. Reinartz – Customer Relationship Management The Concept of Customer Privacy For successful CRM, the firm must ensure a constant flow of up-to-date information about customers’ buying habits and individual needs. If customers feel they are losing control over their personal information, they will begin to feel concern about their privacy. CUSTOMER PRIVACY CONCERNS Serious obstacles for the efficiency of a company’s CRM practices.

5 V. Kumar and W. Reinartz – Customer Relationship Management Drivers of Customer Privacy Concerns Two main drivers of customer privacy concerns:  Internal, company-related drivers  External drivers Internal Drivers of Customer Privacy Concerns External Drivers of Customer Privacy Concerns Collection ControlAwareness Errors Improper Access Unauthorized Secondary Use Internet Technology Public Media Governmental Regulations Customer Privacy Concerns Malhotra, Kim, & Agarwal, 2004

6 V. Kumar and W. Reinartz – Customer Relationship Management Internal Drivers of Customer Privacy Concerns  Collection – Amount and way in which personal information is collected  Control – Degree of control over personal information  Awareness – Understanding of established conditions and actual practices  Errors – Protections against errors in personal information  Improper Access – Access of unauthorized parties to personal information  Unauthorized – Usage of personal information for unauthorized purposes Secondary Use Malhotra, Kim, & Agarwal, 2004

7 V. Kumar and W. Reinartz – Customer Relationship Management External Drivers of Customer Privacy Concerns  Internet  Technology  Public Media  Governmental Regulations

8 V. Kumar and W. Reinartz – Customer Relationship Management External Drivers of Customer Privacy Concerns – Internet Ways to collect customer information online:  Customers voluntarily enter personal information, such as their name, address, and credit card number, into databases.  Information on customers’ online behavior is collected using cookies and click-stream technology without customers’ consent. CUSTOMER PRIVACY CONCERNS  68% of U.S. customers “definitely” would not allow companies to track their online behavior to tailor advertisements to their interest, i.e., behavioral advertising. Turow, King, Hoofnagle, Bleakley, & Hennessy, 2009

9 V. Kumar and W. Reinartz – Customer Relationship Management External Drivers of Customer Privacy Concerns – Technology  Mobile and smart phones (esp. location-based services)  Eroding distinction between public and private space  Risk of oversharing (see Pleaserobme-example)  Radio frequency identification technology  Action threat – Track customer behavior without consent (see Broken Arrow Affair)  Association threat – Create comprehensive customer profiles by liking the customer with the tagged item (infer brand or item preferences)  Location threat – Create comprehensive customer profiles by liking the customer with the tagged item (infer brand or item preferences) CUSTOMER PRIVACY CONCERNS

10 V. Kumar and W. Reinartz – Customer Relationship Management External Drivers of Customer Privacy Concerns – Public Media  Increased media coverage of customer privacy issues since 1990  Total no. of articles increased by 70%  Three times more negative than positive articles INCREASED CUSTOMER AWARENESS OF PRIVCAY ISSUES CUSTOMER PRIVACY CONCERNS Roznowski, 2003

11 V. Kumar and W. Reinartz – Customer Relationship Management External Drivers of Customer Privacy Concerns – Governmental Regulations  Perceived lack of business policy or governmental regulation  Extent to which governments (mis)use personal information CUSTOMER PRIVACY CONCERNS  European Constitutional Report 2010  Does a constitution exist and does it protect privacy?  Are there other protections, e.g., rights to data protection and private communication? Wirtz, Lwin, & Williams, 2007, privacyinternational.org, 2010 Large circles represent worse rating Endemic Surveillance No Data Available

12 V. Kumar and W. Reinartz – Customer Relationship Management Regulations to Protect Customer Privacy Customer Privacy Regulations Industry self-regulation Government-imposed regulation Example: USA Example: Germany

13 V. Kumar and W. Reinartz – Customer Relationship Management  U.S. Constitution  Robinson list  Federal Trade Commission (FTC) →Limited constitutional right of privacy (Bill of rights) →Do-Not-Call registry to avoid receiving telemarketing call →Main agency protecting U.S. customers privacy →Fair Information Practice Principles  Notice and Awareness  Choice and Consent  Access  Integrity and Security  Enforcement and Redress →“The industry must do better. For every business, privacy should be a basic consideration – similar to keeping track of costs and revenues, or strategic planning.” (FTC, 2000) →Enforcement through legal settlements (see Google buzz case) Regulations to Protect Customer Privacy

14 V. Kumar and W. Reinartz – Customer Relationship Management  German Constitution  Data Protection Law  The Teleservices Data Privacy Act  Section 7 of the Unfair Competition Act →“Privacy letters, posts, and telecommunication shall be inviolable.” (Article 10 of the Basic Law) →General purpose = protect individual rights to avoid impaired privacy →The act covers the collection, processing, and use of personal data by public federal authorities and state administrations and by private bodies that rely on data processing systems or non- automated filing systems for commercial or professional use. →The act protects customer privacy online and requires explicit user consent before the usage logs of a session may be stored. →It is unfair to annoy customers inappropriately. This rules applies to unwanted advertisements, unsolicited commercials phone calls, marketing methods that use automated calling machines, fax machines or (spam) received without prior consent, and any direct marketing that cannot be linked to the senders’ identity. Regulations to Protect Customer Privacy

15 V. Kumar and W. Reinartz – Customer Relationship Management Regulations to Protect Customer Privacy U.S.Germany Cold calling Contacting prospective clients or customers with unexpected telephone calls Allowed (if not on Robinson List) Forbidden Unsolicited commercial s Commercial electronic messages, typically sent out in bulk without any prior request or consent given by the consumer Forbidden Cross-country data transfer (U.S. to Germany and vice versa) Transfer of customer-related data to a different country than where it has been collected, such as when consumers make online purchases from sellers located in a different country Allowed Only allowed with Safe Harbor compliance Data transfer to third parties (without consent) Provision of personal data to other companies, such as marketing service providers, without notifying the customer Allowed Forbidden Right to opt-out from data collection Upon providing their personal information, customers are able to deny any further use of their data Not given Given

16 V. Kumar and W. Reinartz – Customer Relationship Management Regulations to Protect Customer Privacy Safe Harbor Provisions  Agreement between the U.S. Department of Commerce and the European Commission  Goal = Minimum level of protection for data of European origin.  Key Principals: (1)Notice – Customer notification about purpose and usage of their data (2)Choice – Opportunity to choose whether or not to disclose their data to third parties (3)Onward transfer of data – Data transfer only possible to companies complying with Safe Harbor (4)Access – Opportunity to access data for amendments and deletion (5)Security – Data protection from loss, any unauthorized access, disclosure, alteration, and destruction (6)Data integrity – Affirmation of data relevance, reliability, accuracy, completeness, and currentness for the purpose of usage (7)Enforcement – Mainly by industry self-regulation, supported by governmental enforcement activities (e.g., FTC)

17 V. Kumar and W. Reinartz – Customer Relationship Management Based on Son and Kim, 2008 Customer Privacy Protective Responses Customer Privacy Concerns Privacy Protective Responses Information ProvisionPrivate ActionPublic Action Complaining directly to Third Party Complaining directly to Companies Word of Mouth Removal Misrepre- sentation Refusal

18 V. Kumar and W. Reinartz – Customer Relationship Management Son and Kim, 2008 Customer Privacy Protective Responses  Information Provision  Refusal – Refusal to give out information  Misrepresentation – Disclosure of falsified information  Private Action  Removal – Information boycotts, removal of information  Word-of-Mouth – Voicing negative comments to friends/relatives  Public Action  Complaining directly to Companies – Opportunity for companies to solve the issue  Complaining directly to Third Party – Large audience, organizations include EPIC and FTC

19 V. Kumar and W. Reinartz – Customer Relationship Management Norberg, Horne & Horne, 2007 Privacy Paradox The privacy paradox can be explained as the “relationship between individuals’ intentions to disclose personal information and their actual personal information disclosure behaviors.” Norberg, Horne & Horne, % of Internet users believe that website that tracked their behavior invaded their privacy But 64% of them would offer personal information to access a website.

20 V. Kumar and W. Reinartz – Customer Relationship Management Blattberg, Kim, & Neslin, 2008 Consequences of Privacy Protective Responses Customer Privacy Concerns Customer Privacy Protective Responses Customer Privacy Protective Responses Loss of Trust and Brand Integrity Decreased Sales Decreased in Data Quality Increased costs dues to privacy protection Ethical dilemma

21 V. Kumar and W. Reinartz – Customer Relationship Management Blattberg, Kim, & Neslin, 2008 Consequences of Privacy Protective Responses Customer Privacy Concerns Consequences of Privacy Protective Responses Consequences of Privacy Protective Responses Customer Privacy Protective Responses Customer Privacy Protective Responses

22 V. Kumar and W. Reinartz – Customer Relationship Management Pearson, 2007 Implications for Companies  Align privacy with strategy  Take a lead in customer privacy protection  Especially important for companies with valuable brands  Look beyond rules to values  Incorporate privacy and security values into corporate culture  Establish a set of comprehensive rules  Anticipate issues  Create a position for a privacy officer or the alike  Scan for products and practices that raise legitimate privacy concerns  Collaborate with stakeholders to develop reasonable solutions  Create accountability  Clarify responsibilities  Rely on technology when appropriate  Simple tools can assist in privacy protection compliance

23 V. Kumar and W. Reinartz – Customer Relationship Management Implications for Companies  Do not conflate security and privacy  Comply with societal and regulatory expectations with respect to the type of data, data protection, and the alike.  Be aware of different legal requirements in different countries  Treat privacy as a social responsibility  In globally connected, information-rich societies, privacy and data protection belong on the corporate citizenship agenda  Manage your data supply chain  International business need standards for data management that applies to expectations and regulations in an international context  Plan for disaster recovery  In case of a data loss or breach, a rehearsal response should be in place  Heed both boomers and millennials  Privacy thinking should span generational norms Pearson, 2007

24 V. Kumar and W. Reinartz – Customer Relationship Management Summary  Customer privacy is driven by internal as well as external factors.  Internal drivers advert to company-related operations which evoke customers’ fears about disclosure and handling of their personal information.  The Internet, technological advances, public media coverage, and governmental regulations present the external drivers of customer privacy.  Privacy protection in the U.S. in based on industry self-regulation. One central role is hereby occupied by the FTC.  Germany as a member of the E.U. protects privacy by different governmental laws and regulations. For example, cold calling is not allowed without prior consent.  The Safe Harbor provision provides guidelines for the proper collection and handling of customer data for multinational U.S. companies operating in the E.U.  Customers’ privacy protective responses, namely information provision, private action, and public actions, can have serious ramifications for companies.  Customers’ intention to respond to privacy concerns do not always translate into actual behavior (privacy paradox).