Research Paper on "Privacy Laws Are a Big"

Research Paper 6 pages (1816 words) Sources: 2

[EXCERPT] . . . .

Privacy laws are a big part of Business Administration in ensuring the business is in compliance with law and ensuring the privacy of sensitive information, both for customers and employees. Businesses have a legal obligation to protect sensitive information of their customers and employees[footnoteRef:1]. It is important to be aware of all areas of privacy law that pertain to the business operations as well as privacy laws that pertains to employees. The Fair and Accurate Credit Transaction Act, the Red Flags Rule, the California Public Utilities Commission General Order 107-B, case law, Safe Harbor, Identity Theft Penalty Enhancement Act, data breach laws, and for some businesses HIPAA and the Gramm-Leach Bailey Act are some privacy laws that affect businesses. [1: http://business.ftc.gov/privacy-and-security]

The Fair and Accurate Credit Transaction Act (FACTA) "incorporates several provisions that require financial institutions, creditors, and other businesses that rely on consumer reports to detect and resolve fraud by identity theft."[footnoteRef:2] Under FACTA, the Red Flags Rule applies to any financial institution or any business who provides services or products for later payment. This means that businesses who sale goods or services on credit plans must adopt privacy practices for consumers paying balances on credit accounts. Businesses must adopt a plan to detect, prevent, and mitigate identity theft. The rules must identify certain signals of actual or attempted identity theft based on established plans of the results of a risk assessment of operations. The rules must also include adopted procedures for proper document disposal, such as shredding services that are bonded to protect inf
Continue scrolling to

download full paper
ormation contained in paperwork no longer needed. The Identity Theft Penalty Enhancement Act was also established for aggravated identity theft that produces higher penalties for crimes of identity theft.[footnoteRef:3] if it is deemed that a business did not comply with privacy law in an identity theft case, the business could also face penalties for noncompliance. [2: https://www.privacyrights.org/fs/fs6a-facts.htm] [3: Holtfreter, R.E. & Holtfreter, K., (2006), "Gauging the effectiveness of U.S. identity theft legislation," Journal of Financial Crime, 13(1), 56-64. Retrieved from http://search.proquest.com/docview/235987750?accountid=27965]

Consumer payment mechanisms is another area of privacy concern. FACTA also requires businesses to truncate, or shorten, account information on electronic credit and debit receipts.[footnoteRef:4] Account information showing on receipts given to the customer at the point of sale generated from an electronic payment system may not include more than the last five digits of the card number and must delete the expiration date. Information received in websites through payment software for goods also are required to truncate, or shorten account information. Noncompliance can bring Federal Trade Commission law enforcement action, including civil penalties and injunctive relief. Consumers also can sue businesses and collect damages and attorney fees if it is deemed the business was out of compliance with FACTA. [4: http://www.niada.com/www.activengage.com/PDFs/Information/Compliance/CreditCardTruncate0708.pdf]

Corporations have increasing liability for security of employee and customer information, and personal data.[footnoteRef:5] There is increased statutory, regulatory, and legal pressures on corporations to protect personal data and to protect their businesses from financial and productivity losses. The largest security breaches can come from inside the organization where employees have access to personal information. States have been implementing laws requiring notification of all affected parties resulting from security breaches. California legislature enacted the first data security breach notification law in July 2003 that forces state agencies and organizations doing business in California to notify California residents when a security breach results in the release of personal information.[footnoteRef:6] Arizona law requires a business that becomes aware of an incident of unauthorized acquisition of data that includes personal information to investigate and determine if there has been a breach of information.[footnoteRef:7] if there has been a breach, the business is required to notify the Arizona consumer. Willful and knowing violations can result in a $10,000 fine per breach. Other states are adopting laws as well that force businesses to a higher accountability in dealing with personal information. [5: Deybach, G. (2007), "Identity theft and employer liability," Risk Management, 54(1), 14-17. Retrieved from http://search.proquest.com/docview/226993528?accountid=27965] [6: http://www.princeton.edu/ogc/legal-guidance/privacy/Vol.-4-2.pdf] [7: http://www.mintz.com/newsletter/2007/PrivSec-DataBreachLaws-02-07/index.htm]

The Safe Harbor Rules govern international business with the businesses located in the European Union.[footnoteRef:8] Safe Harbor mandates that individuals be notified about the purposes of collecting and using personal information. Businesses must provide contact information for individuals to inquire and complain. Third parties that information is shared with must be identified where individuals know who they are. Choices must be offered to individuals to opt out of the sharing and disclosure of their personal information. Individuals must have access to information the company holds about them and be able to correct, amend, or delete inaccurate information. Organizations must take reasonable precautions and protect personal information. Information that has been collected must be relevant to the purposes it was used for. Organizations must have a complaint system available, procedures for verifying company commitments, and must meet obligations to remedy problems. Sanctions issued to members for noncompliance must be rigorously sufficient to ensure compliance is met. [8: http://www.ita.doc.gov/ecom/SafeHarborOverviewAug00.htm]

There are laws and regulations concerning workplace privacy and employee monitoring. For the most part, as long as rules for telephone and internet usage is stipulated in the organization's policy, the policy dictates what employees are allowed to do and not allowed to do on company premises. There would be not regulations that covered workplace privacy, except if personal telephone calls are not stipulated in the policy. Federal case laws, such as Watkins v L.M. Berry & Co., 704 F.2d 577,583 (11th Cir.1983), prohibited the monitoring of personal phone calls of employees.[footnoteRef:9] Some case law has upheld attorney client privilege, even if made from an employer's phone, while other cases have not. The biggest issue with employee privacy is the organizational policies that dictate what employees are allowed to do and what they are prohibited from doing on the job. [9: https://www.privacyrights.org/fs/fs7-work.htm]

For calls with customers, there may be some state regulations that require the customer to be told about any monitoring of the phone calls, such as monitoring to provide better services in the future. Calls in California are required into inform parties of call monitoring by a beep tone or a recorded message under California Public Utilities Commission General Order 107-B. [footnoteRef:10] Depending on the state the business operates in, there may be privacy laws or regulations that cover calls to customers or other consumers. [10: Ibid.]

If the business is in the health care industry, it is also governed by the Health Information Portability and Accountability Act (HIPPA).[footnoteRef:11] Medical identity theft occurs when computers get stolen or sold without expunging data, hacking, inadvertent disclosure of confidential data, or deliberate misuse of information by those that have access to it. Medical identity theft occurs to obtain medical services with billing under another's information, such as insurance. The HIPAA Security Rule is enforced by the Centers for Medicaid and Medicare Services (CMS). CMS defines protected health information as "individually identifiable health information that is electronically or otherwise transmitted or maintained."[footnoteRef:12] the rule covers entities with health plans, healthcare clearing houses, and healthcare providers that transmit health information electronically, such as provider to insurance company for payment or provider to provider for referring a patient for additional services. [11: Journal of Internet Law, 10(8), 1-16] [12: Ibid.]

The general requirements of HIPAA include the assurance of confidentiality, integrity, and availability of electronically protected health information they process. Safeguards must be taken against reasonably anticipated security threats. The organization is responsible for protecting against reasonably anticipated impermissible uses and disclosures. Policies must be in place and enforced to ensure workforces comply with the rule.

Health care organizations are obligated to protect against identity theft as well as medical identity theft, whether it is an inside security breach or an outside source. This means that the information system has higher requirements in who has access to the information as well as organizational policies that govern the security of personal information. HIPAA operates on a need to do the job basis in knowing what is in a medical record. For example, staff that are not assigned to a patient on a particular shift are not allowed to view the patient's medical record. They are only allowed to know information on patients they are assigned to and only enough information to do their respective jobs. Nursing staff are not allowed to view payment information on any patient because they do not need to know the information to perform their respective positions.

The Gramm-Leach Bliley Act requires financial institutions to explain their information sharing practices to their customers and to safeguard sensitive data.[footnoteRef:13] Financial institutions are defined as companies that offer financial products or services like loans, financial or investment advice, or insurance. Personal information that is usually collected is names, addresses, phone numbers, bank and credit card account numbers, income and credit histories, and social security numbers. [13: http://business.ftc.gov/privacy-and-security/gramm-leach-bliley-act]

Under the Gramm-Leach Bliley Act, companies in the Federal Trade Commission jurisdiction are required to follow the Safeguards Rule and take measures to maintain security of customer information. The companies are required to have… READ MORE

Quoted Instructions for "Privacy Laws Are a Big" Assignment:

This is a Business Law class. The instructor wants us to write a research paper about 5-7 pages on a business law topic that interests you. You can use either the APA or MLA formats. Be certain to completely cite you authorities. Footnotes or endnotes are acceptable!

A "business law topic" is purposefully broad to allow you to write on a topic related to your particular major. Ideally, the paper will serve as a foundation for other endeavors undertaken in your area of emphasis.

I expect you to conduct legal research using the library, academic journals and reviews, publications e.g., Wall Street Journal, Barons, Bloomberg Business Week, Harvard Business Review, on-line resources and interviews. No WIKIPEDIA, Cheeseman, or Griffis lecture references or citations, I want original verifiable research and cited authorities. WIKIPEDIA and Cheeseman are good places to find source material, but do not constitute source material, Be creative.

There are scores more topics. If you find yourself having difficulty finding a topic, pick up several copies of the Wall Street Journal -- its divided into discrete sections covering: general business news (A section); marketing (B); finance/investment (C); and personal finance (D). On Mondays there are rotating sections on technology, health and other specific topics.

My major is Business Administration so can you write something related to my major. I ordered 6 pages so you can decide how you want to put the footnotes. I put 2 as the resources that you have to use but it is totally up to you. But i suggest at least 2. It can be more depending on the topic. Thank you!!

How to Reference "Privacy Laws Are a Big" Research Paper in a Bibliography

Privacy Laws Are a Big.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/privacy-laws-big/2434698. Accessed 3 Jul 2024.

Privacy Laws Are a Big (2013). Retrieved from https://www.a1-termpaper.com/topics/essay/privacy-laws-big/2434698
A1-TermPaper.com. (2013). Privacy Laws Are a Big. [online] Available at: https://www.a1-termpaper.com/topics/essay/privacy-laws-big/2434698 [Accessed 3 Jul, 2024].
”Privacy Laws Are a Big” 2013. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/privacy-laws-big/2434698.
”Privacy Laws Are a Big” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/privacy-laws-big/2434698.
[1] ”Privacy Laws Are a Big”, A1-TermPaper.com, 2013. [Online]. Available: https://www.a1-termpaper.com/topics/essay/privacy-laws-big/2434698. [Accessed: 3-Jul-2024].
1. Privacy Laws Are a Big [Internet]. A1-TermPaper.com. 2013 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/privacy-laws-big/2434698
1. Privacy Laws Are a Big. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/privacy-laws-big/2434698. Published 2013. Accessed July 3, 2024.

Related Research Papers:

Privacy Rights Term Paper

Paper Icon

Privacy Rights

In the case of Wilson vs. Layne that was argued in March 24, 1999, and was decided in May 24, 1999, the privacy rights of the citizen, Charles… read more

Term Paper 15 pages (6316 words) Sources: 1+ Topic: Crime / Police / Criminal Justice


Technology and Privacy Duties and Laws Term Paper

Paper Icon

Technology and Privacy

Advancements in technology generally raise ethical concerns, simply because technology has the capacity to usher in social change. Often, the evolution of material culture - such as… read more

Term Paper 5 pages (1454 words) Sources: 0 Topic: Advertising / Marketing / Sales


Creative Powers it Is a Fact Term Paper

Paper Icon

Creative Powers

It is a fact that the society in which we live will never be truly free in all areas of life. Indeed, it has been suggested by some… read more

Term Paper 9 pages (2842 words) Sources: 0 Topic: Sociology / Society


When Media Treads on Thin Ice Term Paper

Paper Icon

That this is part of his attraction to the public was demonstrated by the increased television ratings for this TV show, Celebrity Apprentice, in which he shows off just those… read more

Term Paper 12 pages (5220 words) Sources: 0 Topic: Law / Legal / Jurisprudence


Philosophy Surrounding the Topic of Ethics Term Paper

Paper Icon

philosophy surrounding the topic of Ethics. Your beliefs, values, attitudes and expectations should be among the key points.

I believe that ethical obligations arise solely as a function of the… read more

Term Paper 8 pages (2548 words) Sources: 0 Topic: Business / Corporations / E-commerce


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!