University Privacy Policy Report: Data Collection and Security

Verified

Added on  2022/09/12

|4
|837
|28
Report
AI Summary
This report analyzes a privacy policy, discussing the types of data collected (name, email, contact, location, education, and birth date) primarily during online platform signup and account completion. The policy outlines data sharing practices, emphasizing anonymous sharing within the company and its subsidiaries for customer-oriented services, with restrictions on third-party sharing and real-time location tracking. The report details data usage, specifying a one-year retention period followed by deletion and user notification, including an account deletion procedure. Security measures include restricted database access to the Information Security Officer, encrypted data transfers with user consent, and breach notifications. The report contrasts these practices with Facebook's policies, highlighting the potential positive customer response due to limited data collection, restricted sharing, and better data erasure policies, while acknowledging a possible negative aspect of the account deletion process.
Document Page
Running Head: POLICY
Privacy Policy
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1POLICY
Privacy policy: Data Privacy
This policy describes the access of the user’s information by the company.
Topic 1: Type of data collection- The type of data that is collected from the user are the name,
email ID, contact number, location, education qualification and date of birth. The company
collect the data of the user primarily at the time of signing up to the online platform (Carrascal et
al., 2013). Then the account of the user needs to be completed filling the basic information of the
user.
Topic 2: Sharing of data- From the collection of data of the user the company will only share
the user’s data anonymously such as a woman in the age group of 19 to 28 has accessed this page
or preferred a particular restaurant in a particular location. This information will only be shared
within the company and its children companies for developing customer oriented services and
products (Zhu, 2013). The will also be available to the known people that the user have
interacted within a year. The data will not be shared with any third party company, hence,
protecting the privacy of the users better. No real-time location sharing of the user will be
allowed.
Topic 3: Use of the data- The collected data from the user exists in the company database not
more than a year. Then the data is deleted and then update for the information is requested to the
user. Therefore, if user choose to no longer use the product or service of the company can easy
be inactive in his or her account after a year without the fear of misuse of his data (Van Noorden,
2014). Also, if the user chooses to erase his account from the company then, easy procedure is
available with complete removal of the details of the user with confirmation mail sent to the
user’s email ID.
Document Page
2POLICY
Topic 4: Security of the data- The security of user’s data is the prime concerned of the
Company, therefore, strict rules will be allocated to the data of the user. The database of the
Company that contains the information of the user are only accessible to the Information
Security Officer of the company. NO other employee of the company can access the data. If any
information is needed to be shared then the company takes permission from the user and the
transfer of data takes place with proper encryption (Acquisti et al., 2017). If any data breach
occurs then the user will be notified through mail and message on the contact number.
Response of the customers-
The response of the customer towards the privacy policy is estimated to be positive as the
clauses of the policies are in favor of the customers. Starting from the sharing of the type of data,
if we compare with Facebook’s policy the amount of data collection is huge whereas, our
company uses limited types of data of the user. The sharing of data is also restricted which will
eventually save the data from misuses, the uses of the collected data is also limited and better
erase policy from Facebook. The customers will like the security techniques and the procedure
for sharing of data. The customer may dislike the removal process of the data as customer may
have the wish of using the product of the company after a year and creating another account is a
hectic process.
Document Page
3POLICY
Reference
Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., & Wang,
Y. (2017). Nudges for privacy and security: Understanding and assisting users’ choices
online. ACM Computing Surveys (CSUR), 50(3), 44.
Carrascal, J. P., Riederer, C., Erramilli, V., Cherubini, M., & de Oliveira, R. (2013, May). Your
browsing behavior for a big mac: Economics of personal information online.
In Proceedings of the 22nd international conference on World Wide Web (pp. 189-200).
ACM
Van Noorden, R. (2014). Online collaboration: Scientists and the social network. Nature
news, 512(7513), 126.
Zhu, Z. (2013). Discovering the influential users oriented to viral marketing based on online
social networks. Physica A: Statistical Mechanics and its Applications, 392(16), 3459-
3469.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]