Preview

Internet Privacy Law: a Comparison Between the United States and the European Union

Powerful Essays
Open Document
Open Document
9303 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Privacy Law: a Comparison Between the United States and the European Union
David L. Baumer1, Julia B. Earp2 and J.C. Poindexter3

College of Management, North Carolina State University, Raleigh, NC 27695-7229
1David_Baumer@ncsu.edu 2Julia_Earp@ncsu.edu 3JC_Poindexter@ncsu.edu

Internet Privacy Law: A Comparison between the United States and the European Union

Abstract The increasing use of personal information in web-based applications has created privacy concerns worldwide. This has led to awareness among policy makers in several countries regarding the desirability of harmonizing privacy laws. The challenge with privacy legislation from an international perspective is that the Internet is virtually borderless but legislative approaches differ between countries. This paper presents a functional comparison between current privacy law in the European Union and in the United States, as such laws relate to regulation of websites and online service providers. In addition, we articulate the similarities and differences between the 2002 EU Directive 2002/58/EC, titled the Directive on Privacy and Electronic Communications, which has been adopted by the EU but not implemented, and the proposed U.S. Online Privacy Protection Act. Using a qualitative approach, we use the Fair Information Practices to organize discussion of comparisons and contrasts between U.S. and EU privacy laws. Our investigation of this topic leads us to conclude that the right of privacy is more heavily protected in the EU than in the U.S. The Online Privacy Protection Act, recently introduced as a bill in Congress, has the potential to significantly effect commercial practices in the U.S. and move the U.S. toward current EU privacy protection laws. This analysis benefits managers as well as security professionals since the results can be used to ensure that their organization’s website practices are consistent with countries in which they exchange information.

Keywords: information privacy, e-commerce, legislation, international law.



References: 2] 2-Milberg, S.J., H.J. Smith and S.J. Burke. Information Privacy: Corporate Management and National Regulation. Organization Science, Vol.11, No.1, January-February, pp.35-57, 2000. 5] 5-Westin, A. Privacy and Freedom. Atheneum, New York, 1967. 6] 6-Earp, J.B., A.I. Anton, L.Aiman-Smith and W. Stufflebeam. “Crossed Signals: What Users Really Want from Internet Privacy Policies.” The Academy of Management, August 1-6, 2003. 7] 7-Hofstede, G. Cultures and Organizations. McGraw-Hill, Berkshire, England, 1991. 8] 8-Dresner, S. Data protection roundup. Privacy Laws Bus. (U.K.) (33) January, pp 2-8, 1996. 10] 10-[OECD00] CDT’s Guide to Online Privacy: Privacy Basics: The OECD Guidelines, accessed on August 6, 2002 at http://www.cdt.org/privacy/guide/basic/oecdguidelines.html, 2000. 11] 11- Baumer, D.L., J.B. Earp, and P.S. Evers, Tit for Tat in Cyberspace: Consumer and Web Site Responses to Anarchy in the Market for Personal Information, Journal of Law and Technology, Vol. 4(2), 2003, pp: 217-274. 12] 12-Earp, J. B. and D.L. Baumer, Innovative Web Use to Learn about Consumer Behavior and Online Privacy, Communications of the ACM, Vol. 46 No. 4, 2003, pp: 81-83 13] 13-Volokh, 2000 14] 14-Online Privacy Protection Testimony of FTC Commissioner Sheila F. Anthony Before the U.S. Senate Committee on Commerce, Science, and Transportation, May 25, 2000, located at: http://www.senate.gov/~commerce/hearings/0525ant.pdf. 15] 15-Federal Trade Commission, Privacy Online: Fair Information Practices in the Electronic Marketplace, A Report to Congress, 2000.

You May Also Find These Documents Helpful

  • Powerful Essays

    This paper will examine legitimate and promoting ramifications of certain Internet mechanical improvements affecting rivalry and customer security in the internet. The paper will investigate to what degree antitrust and customer assurance laws are satisfactory to manage the difficulties to a focused commercial center and purchaser security postured by the advancement of the internet advancements and markets, for instance, Internet web crawlers, informal communities and wearable gadgets (King & Raja, 2012, p. 309). The paper reasons that lawful apparatuses for ensuring a focused the internet commercial center are genuinely vigorous, while the legitimate instruments to shield buyers from being followed and profiled by advertisers and from the potential interruptions of individual protection made conceivable by considerably more propelled Internet joined sensor and related…

    • 2641 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    IFSM Paper B1

    • 476 Words
    • 2 Pages

    Clark D. Asay,Consumer Information Privacy and the Problem(s) of Third-Party Disclosures, 11 Nw. J. Tech. & Intell. Prop.321 (2013).…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CpEddDocumentView

    • 6008 Words
    • 18 Pages

    presented as part of your Internet transactions, our decisions about those transactions, and the USAA Privacy Promise. This…

    • 6008 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Bailey, Melissa W. "Seduction by Technology: Why Consumers Opt Out of Privacy by Buying into The Internet of Things." Texas Law Review 94.5 (2016): 1023-1054. Academic Search Premier. Web. 5 Feb. 2017…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Sheehan, K.B. and Hoy, M.G. (2000), “Dimensions of privacy concern among online consumers”. Journal of Public Policy & Marketing. Vol. 19 No.1. pp 62-73.…

    • 962 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    the law of online privacy in the past twelve months [2002] have involved the government 's response to the reality…

    • 3371 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Evil Operator

    • 1578 Words
    • 7 Pages

    Standler, R. B. (1998, May 24). Privacy Law in the USA. Retrieved December 7, 2010, from RBS: http://www.rbs2.com/privacy.htm…

    • 1578 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    _______ (1997). "Towards a Theory of Privacy in the Information Age," Computers and Society, Vol. 27, No. 3, September, 27–32.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Good Essays

    Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    In other words best-practice security isn 't just good business sense; in some cases, it 's also the law. Legal requirements are vary between specific industries and different jurisdictions. For example, the Health Insurance Portability and Accountability…

    • 2543 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Social Media

    • 2155 Words
    • 9 Pages

    Selis; Ramasastry; Kim; Smith (n/d). Protecting Personal Information Through Commercial Best Practices. Consumer Privacy and Data Protection. Retrieved from www.atg.wa.gov…

    • 2155 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Privacy issues are a growing concern of Americans, especially the Internet. The American people are expressing fear about defending their privacy online, but they continue to share more personal data than ever. Personal identifying information is often collected by businesses and stored in different formats, both digital and traditional paper. Meanwhile, data mining and other aggressive information-capturing techniques have become ordinary for businesses large and small. Companies like Facebook, Itunes, Snapchat, Instagram, Twitter, Amazon, Yahoo, banks, hotels and grocery stores store your information and resale it to other companies. States have used the U.S. Constitution as…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    "you are so ugly. I don't understand why you bother coming to school everyday when no one wants to look a your greasy,fat A*s. You are such a loser. You should do us all a favor and kill yourself. EVERYBODY HATES YOU!" Really? tell me how you honestly feel. Oh,wait you just told the whole world because its on Facebook. Cyber Bullying uses technogy to harass,threate,embarrass, or target a person. This can be email,text,status,photos, or fake pages. Cyber bulling is anything you dont want put online.…

    • 574 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    It Security

    • 4378 Words
    • 18 Pages

    References: [1] [2] [3] Anthony D. Miyazaki and Ana Fernandez, “Consumer Perceptions of Privacy and Security Risks for Online Shopping”, 2006. ACM Code of Ethics and Professional Conduct (1992). Communications of the ACM, 35(5), 94-99.Computer Security Institute ~ US FBI, "Computer Beynon-Davies P., Business Information Systems. Palgrave, Basingstoke, 2009.…

    • 4378 Words
    • 18 Pages
    Powerful Essays