Preview

pandora

Satisfactory Essays
Open Document
Open Document
339 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
pandora
1. Do you view your music selection as private or public information?
My music selection is public because I don't see the need to make my music selection private. My music selection can be open to others because it doesn't hold any vital information or private information on my account. I use the free version of pandora so it doesn't have any of my credit card numbers, therefore I don't mind having my station open for others to use or view.

2. How could someone use this information unethically?
Someone could use this information unethically by stealing someone's account and making it their own. For example if someone were to pay for their pandora account, and another person were to hack into their account without permission that's unethical for hacking into their account and also if they were to pay for their pandora that hacker is using their account and not willing to pay then that's stealing.

3. Do you see this as a threat for Pandora?
I don't see this as a threat to Pandora because of the fact that it's only music. Pandora doesn't hold any vital information unless the person subscribes to pandora, then they will need to make their account private.

4. Do you think customers will stop using the service?
No. I do not think that Pandora will stop using the service because they are still able to listen to their music free. To me there isn't a lot of hackers in this type of business because they can set up their own account to their email. Pandora is open to anyone that has an email address.

5. What can Pandora do to ensure customer privacy?
To ensure customer privacy Pandora can ensue a harder privacy policy that makes all of their subscribers become private. Also, they can have more security questions as well as usernames instead of email addresses. Many usernames go unhacked because they are hard to make and go into. Pandora needs to re do their privacy policy and make all of their customers become

You May Also Find These Documents Helpful

  • Good Essays

    Unit 29

    • 561 Words
    • 2 Pages

    Pandora is a multinational company using a multiple store which is usually located in out of town areas. Because of the area where they are placed they have a long travel time making the easiest travel option the car however you can travel to them on public transport but many involve changes and larger fares. However due to the travel costs the areas slightly reduce store costs and also allow free parking. This means that although travel time and cost is high it holds more appeal due to the lower prices and free parking.…

    • 561 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    ▪ Mail will be sent out, customers will receive special offers and deals by Wednesday of every week.…

    • 1855 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    I think that this information should not be available for the public. I believe there are privacy issues involved because our privacy rights are violated when sites like this ones rummage around and expose our private information to the public for just $4.95 dollars. On the page it says, “Search requests on public officials, juveniles, and/or celebrities are strictly prohibited.” And I found interesting that if those persons are prohibited from being searched, why not everyone, why only protect the privacy of such persons? I am not concerned with good people having that type of information regarding me, but there a lot of bad people in the…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Nt1310 Unit 1 Assignment

    • 4486 Words
    • 18 Pages

    Music Vault [1]. Music Vault operates on the P2P network Facebook, enabling users who create music to openly and…

    • 4486 Words
    • 18 Pages
    Best Essays
  • Powerful Essays

    On-line social community is a medium that allow people to connect with their friends and share information, it is a way of networking but it is a social based relationship among its users. People join the social community by creating personal profile which can be set to private or made public, this network is primarily to connect with friends and share information ranging from photos, videos, comments, contact details, etc. However, many users have made their details public without carefully considering the consequence, hence; the on-line social communities have become a danger zone where people fear to tread on due to privacy policies being breached.…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    All personal data is processed in accordance with the subject’s rights. They have the rights to have data about themselves removed.…

    • 1256 Words
    • 6 Pages
    Good Essays
  • Good Essays

    NSA paper

    • 739 Words
    • 3 Pages

    These statements don’t clarify whether the “access” reserved to these 22 people is a physical or just a legal matter. Is it possible for others to access the data? That raises the next question:…

    • 739 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Identity theft can also be a significant risk of social networking. Personal details like your full name, names of your family members, your phone number, birthday, address,…

    • 1732 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The risks that may occur on the internet is that if a child or young people own an account on social networking site like Facebook, twitter they can be stalked or they can be forced into sending inappropriate messages to others. To own a Facebook account the person has to be older 13 years old but some children make an account by giving false details.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Music

    • 1176 Words
    • 5 Pages

    For this database project, you will use MS Access to create a database of vendors, and the related items they sell to your hardware store. For example, if you are Lowe’s® or Home Depot®, you purchase items to sell from various vendors, such as Black and Decker®. Some of those items may be power tools or hand tools. You may purchase items for sale from other vendors, such as garden tools. Your database is made up of two tables:…

    • 1176 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Risky Situation

    • 1497 Words
    • 6 Pages

    Can allow undesired persons to gain knowledge about someone that does not want their information seen by anyone but people they…

    • 1497 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Particularly the data that could be collected and possibly be shared with third parties. Ted Koppel gives some examples of what different services can do; tracking the location of people or cars. And the habits people make like the products we buy. I think this article is good and makes strong validations toward people’s privacy.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Feed

    • 1346 Words
    • 6 Pages

    Although it may seem that corporations are protecting our information when we purchase items, but in reality they have privacy policies that limits our ability to restrict this sharing. The world we live in is so corrupt. Many businesses try to use us to make money at any cost. It is unbelievable that we live in a world full of selfishness. We may think that our information is safe, but during the signing of the contract, once it signed, we agree to the fact that our information can be shared. Our information can be shared for many purposes for example, marketing purposes. According to BciFinancial, “We share your information for our marketing purposes, for our everyday purpose, you cannot limit this sharing” (BCI). They are allowed to share our private and personal information and we have no right to restrict this. Just as in the Feed many corporations took their information of their feed for easy…

    • 1346 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    The risks of downloading music from the Internet include spyware, viruses, hackers, and possible invasion of personal information, such as your birth date and social security number. Although these risks may be present, a good percentage of people buy and download music from the internet. When these people download music, they can infringe on the copyright laws of works by composers or artists. The previously stated people infringe upon the copyright laws of the artist by downloading the work without compensating or crediting the artist. Without compensation, the artist will feel like he or she is producing music for nothing, and nobody likes to work for nothing. Everybody wants to make a profit for the time and effort they put into their work. Downloading music from the Internet is a great way for people to acquire the selected songs they want without paying for the songs they do not want. One example of this is a 12 year old boy is paid a weekly allowance of $5 and has a list of his favorite songs. He goes to a music store and sees a CD of the band that is at the top of his list. The CD costs $15 and has only 2 songs he likes. He spots another band’s CD, and it is also $15, but it has 3 of the songs on his list. The advantage downloading the same songs from the Internet is that this boy has the ability to pay for all 5 songs on his list without paying for songs that he does not like. By selecting the songs he wants, the boy has more space to buy more songs and because he is able to buy more songs, he is exposed to…

    • 822 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The weaknesses of Facebook’s privacy policies are the launch of Facebook’s Beacon advertising service. Beacon was shared automatically users' information of purchase with their friends. Users were angry that even user opted out of the service Beacon continued to communicate private information. Moreover it was almost impossible to delete an account even a user does not wanted to use. Under significant public backlash and the threat of a class-action lawsuit, Facebook shut down Beacon in September 2009. Facebook has also drawn criticism for preserving the personal information of people who attempted to remove their profiles from the site. It adjusted its terms of service to assign it ownership rights over the information contained in deleted profiles. Facebook’s privacy policy took the form of an open collaboration with some of the most vocal critics of the old policies. In February,…

    • 679 Words
    • 3 Pages
    Satisfactory Essays

Related Topics