IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Customer Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Sensitive Personal Data, Online Customer Privacy, Data Privacy, Personal Data Privacy, Customer Data Privacy, Consumer Data Privacy, Privacy, Consumer Privacy
DEFINITION: Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions. This involves the exchange or use of data electronically or by any other means, including telephone, fax, written correspondence, and even direct word of mouth.With the advent and evolution of the World Wide Web and  … 
Definition continues below.
Customer PrivacyMultimedia (View All Report Types)
2 Matches

There are currently no reports cataloged under the topic:
Customer Privacy

Please conduct a new search.

2 Matches
 
CUSTOMER PRIVACY DEFINITION (continued): …  other electronic methods of mass communications, consumer privacy has become a major issue. Personal information, when misused or inadequately protected, can result in identity theft, financial fraud, and other problems that collectively cost people, businesses, and governments millions of U.S. dollars per year. In addition, Internet crimes and civil disputes consume court resources, confound legislators and police departments, and produce untold personal aggravation.The World Wide Web Consortium (W3C) sponsors the Platform for Privacy Preferences Project (P3P), which provides an automated method … 
Customer Privacy definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement