...Is using social media for marketing a form of infringement of personal privacy? We are now in the 21st century and social media has become a very big hit. So the topic here is, is it an invasion of personal privacy when marketers use social media in marketing? First let me explain what personal privacy is. It is personal freedom from unwanted disturbance in someone’s private life meaning that we have the freedom to be not constantly disturbed. However, the internet is a public library, when you add something on the internet it is already public even if it wasn’t meant to be, and to be honest there are many people out there who just like to cause disturbance, but you have the choice to post it privately or publicly. It is not eavesdropping if you posted something publicly and a stranger saw it. There are also possibilities that the marketers collect personal data like workplace or home address so that he can personally meet face to face with the customer or consumer to conduct his survey. If the marketer constantly visits your workplace or home it is an invasion of privacy, but I find this very rare because it doesn’t benefit him, in fact it is a waste of time for him if he keeps getting rejected, in anyways so it is not practical. The reasons why marketers have started using social media for marketing is because the users are massive, like Facebook it has more than 1 billion users. Because of this massive amount of users’ marketers will use this advantage to gain knowledge...
Words: 883 - Pages: 4
...e-Learning, Vol. 4, No. 3, June 2014 Legal Risks in Social Media Marketing Jawahitha Sarabdeen Abstract Social media is an important communication channel for marketers. The research conducted earlier shows that more than 81% of the businesses are using social media or planning to use social media for marketing purposes. The social media is used for engagement marketing, buzz marketing, building customer relationships and to revitalise brand image. As social media marketing facilitates two way communications between the marketers and the users, the content generated in social media is considered trustworthy and reliable by the customers. The marketers while using the social media should be aware of the legal risks involved in social media marketing. This research paper by using content analysis looks at social media marketing and legal risks involved in social media marketing. Index Terms—Social media, marketing, legal risks, regulations. I. INTRODUCTION Social media marketing is a phenomenon where businesses are seeking new ways to create value. The introduction of social media considerably changes the marketing activities and consumers‘ behaviours. With the introduction of various technologies associated with social media the businesses and consumers participate in marketing activities easily without cost. Though social media is relatively a new media, its popularity is increasing rapidly across the world. Social media is used to engage with consumers, promote the business...
Words: 6386 - Pages: 26
...Smyth, stated he was wrongfully terminated by The Pillsbury Company due to public policy and the right to privacy. Smyth utilized the company’s email system and sent emails to his supervisor from home. These emails contained “inappropriate and unprofessional” comments concerning the defendant. (Michael A. Smyth v. The Pillsbury Company, 1996). The courts found that the termination was not violating any privacy laws. The courts applied the case of Borse v. Piece Goods Shop, Inc. 1992 to the Smyth case. In the Borse case, the courts found that someone who intentionally intrudes on another either physically or by some other manner, which concerns their private affairs, to be held liable if this intrusion is considered highly offensive to any reasonable person. (Sarah Borse vs. Piece Goods Shop, Inc., 1992). The email communication between Smyth and his supervisor was done voluntarily by Smyth, he had done so on his own free will. The second assumption by the courts is that there is no assurance that emails sent over the company system would not be interrupted by others. The third notion is the email system is used companywide so the expectation of these staying private is lost. (Samson, 2013). The courts stated that the interested of the company preventing illegal activity, inappropriate and unprofessional comments over the email system outweighs the privacy interest of any employee. (Michael A. Smyth v. The Pillsbury Company, 1996). Bibliography Sarah Borse v. Piece Goods Shop...
Words: 1798 - Pages: 8
...The Right to Privacy Ramon Rubalcava Redlands University Abstract [The abstract should be one paragraph of between 150 and 250 words. It is not indented. Section titles, such as the word Abstract above, are not considered headings so they don’t use bold heading format. Instead, use the Section Title style. This style automatically starts your section on a new page, so you don’t have to add page breaks. Note that all of the styles for this template are available on the Home tab of the ribbon, in the Styles gallery.] Keywords: [Click here to add keywords.] The Right to Privacy In this new generation the right to privacy is getting lower by the minute due to all of the social media and new electronic devices being invented daily. The right to privacy should not even be a question everyone should have the right to privacy to a certain extent. The right to privacy is a recent creation of little consequence other than cultural custom. The right to privacy is a big part if not the biggest part of everyone’s freedom because if anyone can come into anyone’s house at any given time or listen to all their calls and read all their text people will feel unsafe and without any freedom; It will feel like a prions where everything is being monitor. Everyone likes their privacy even if they do not have anything to hide just knowing that whatever they do or where ever they go will be only known to them and those they chose to share it with making them feel in control of their life...
Words: 1256 - Pages: 6
...2013/14 Survey Social Media in the Workplace Around the World 3.0 Proskauer Rose LLP | Prior results do not guarantee a similar outcome | Attorney Advertising About Our Survey We are proud to present Proskauer’s third annual global survey about social media use in the workplace. As in previous years, in addition to our survey results, in collaboration with select law firms across the world, we have included a brief summary of the law from around the world, including significant recent developments. Please note that the information provided in this survey is not intended to be, and shall not be construed to be, the provision of legal advice or an offer to provide legal services, nor does it necessarily reflect the opinions of the firm, our lawyers or our clients. No client-lawyer relationship between you and the firm is or may be created by your access to or use of this survey or any information contained in it. Proskauer Rose LLP (Proskauer) is not obligated to provide updates on the information presented herein. © Proskauer Rose LLP. All Rights Reserved. Social Media in the Workplace Around the World 3.0 When we published our first survey in 2011, there was a sense of novelty and even mystery about social media usage in the workplace. There was a strong perception that social media and business did not mix. The art of harnessing social media for business lacked the sophistication and prominence that it now has. Today, business use of social media is mainstream. This shift from...
Words: 8815 - Pages: 36
...Use of Social Media in the Workplace Executive Summary With the growing number of social media-related lawsuits happened in Canada, many employers have to find how to create efficient and effective social media policies for their companies. I am a student in a course called Advanced Written Communication, which is one of my third year courses in Bachelor of Business Administration program. As a business student, I am also interested in this problem. From the research, I find some social media-related cases and some privacy legislations in Canada. They warn both employers and employees that it is necessary to have enough legal and security knowledge. Employers should create media policies based on Canada’s laws, and employees also should carefully use social media in the workplace according to company’s policies. In addition, I find a fact that numerous companies in Canada and United States ban social media at work. However, this will alienate new employees who like social media, and make old employees feel unhappy. Thus, to create efficient and effective social media policies, a list of useful points are provided at the end. 1.0 Introduction 1.1 Purpose We will analyze cases of using social media in the workplace, consider the effect of Canada’s related laws, and finally find out how to create efficient and effective social media policies for the company. 1.2 Problems When Creating Social Media Policies In recent years, social media has become an important...
Words: 2331 - Pages: 10
...Administrative Ethics HCS335 April 29, 2012 Administrative Ethics In the modern age of society, social networking has a strong influence on everyday life for many individuals. When social networking interferes with the health care industry, multiple problems may arise. Violating personal health information may occur with the slip of a key. Medical advice may be given with consequences. Social networks can be helpful, but may also be damaging. Having a policy within a facility will assist in reducing the risk of a privacy violation. A social network site is an online community for individuals to meet and share information along with discussing common interests. The issue arises from a health care professional violating patient privacy and other HIPAA laws within the social networking sites. Leaking patient information through these sites can be damaging to the patient and the physician at the same time. Social media sites tend to be relaxed and not always handled in a professional manor. This can lead to personal health information leaking through the sites. Although the leaks may not be intentional, they are still a violation of privacy laws protecting the patient. As a society, personal information that could possibly be damaging to a person is both personal and potential gossip. Not all leaks of personal health information are gossip, and damaging, but it could be for any person. The damage will reflect the person being spoken about and the medical facility that has...
Words: 1086 - Pages: 5
...the Risk? Social Media and Healthcare Robert Shaw NR360: Info Systems Chamberlain College of Nursing Fall 2015 Is It Worth the Risk? Social Media and Healthcare Social media has taken over the way that we interact with one another. It is leading the way in which we communicate with family, friends, coworkers and strangers. It is also the way we keep up with our favorite celebrities and gossip. Social media and the use of smartphones are becoming more prevalent in business and the healthcare field as well. According to Pew Research Center, “62% of smartphone owners have used their phone in the past year to look up information about a health condition” (April, 2015). Technology, just like all things come with flaws and setbacks. However, with the new technology being created every day, along with the increasing use of both smartphones and social media, using these outlets for patient-provider relationships can enhance overall patient trust and care. That being said, ensuring that patient privacy is not violated has to be the number one priority. Advances in technology and media can pose great triumphs for healthcare further down the road, as long as the appropriate measures are taken to ensure that HIPAA standards are being met at all times while using these outlets. Understanding HIPAA’s Guidelines for Securing Patient Information HIPAA’s Privacy Rule sets the guidelines for the use and disclosure of protected health information (HHS, n.d). This Privacy Rule protects...
Words: 2222 - Pages: 9
...Meanwhile, the article “Americans complicated feelings about social media in an era of privacy concerns” by Lee Rainie from Pew Research Center discusses sentiments towards social media and the protection of people’s privacy. Whether telling a story of technological deception, or simply stating facts, both texts raise the question: can humans and computers efficiently coexist with each other, and not cause...
Words: 1298 - Pages: 6
...Introduction Social media has promoted communication. It has gathered people from all over the world to interact electronically without any movement. Social media tools such as LinkedIn, Facebook, Blogs and Twitter have enabled people to exchange information irrespective of where the person is located. Despite its advantages, social media may negatively affect healthcare because the healthcare providers are supposed to maintain confidentiality on patient’s personal information and medical history. The healthcare providers are supposed to comply with HIPAA privacy and security rule while using social media in order to evade lawsuits as a result of disclosing patient’s information on social media platforms. Based on Rienton (2013) examples, it...
Words: 2367 - Pages: 10
...The Curses of Social Networking For the past couple of years, we all know that technology has become a big part of our lives and has also changed the way people communicate with each other. With technology being more advanced now, we have been brought about many social networking sites like Facebook, Twitter, Instagram, and the list can go on. These social networking sites have allowed online users to post personal information on a profile and to bond with friends from anywhere around the world. Although this sounds like a great idea for all, it's actually becoming a huge issue for all online users who participate in the social networking sites and negatively affecting our society because of three big reasons: Cyber bullying, health related problems and privacy issues caused by the unnecessary use of social networks. So what cost may come with this advanced era of technology and the use of social networking sites? Let's find out! These famous online social networking sites are becoming extremely popular for the roles they play with cyber bullying and has no longer been limited to only the real world. Cyber bullying goes far beyond just the physical and verbal fights, but instead adds intimidation, being frightened, harassment, and embarrassment. Ciara Harris, a famous singing artist, pours out her feelings about cyber bullying on her online blog. Harris argues that cyber bullying does not make you or anyone else any cooler, so why do so many people still do it? She quarrels...
Words: 2173 - Pages: 9
...Carpenter 4/24/15 Media Ethics- Final Paper Prof. Ceravolo Ethical Issues within Social Media Sites: The Past, The Present, and The Future Social media came onto the scene in a huge manner with hype that hasn’t been matched since but with that huge hype that it brought, it brought along some problems as well, problems that social media users are still anxiously waiting to be fixed. Social media has grown so rapidly that network executives and engineers have had a hard time keeping media websites up to par with the expectations of the public and keeping people interested as well as making sure they are updating security features too. The lack of care for other people’s personal information it feels like in a sense, have created a few current and potentially fatal future problems for these social networking sites. Unfair and/or undefined privacy laws, the hacking of user profiles, and the lack of technological advancement used within sites by website personnel all pose threats for some social media sites now and as time progresses. The actions they choose to put in play now and over the next few weeks, months, and years will determine how successful some certain sites are and how long we can expect their media presence to play on. Privacy is a state where in an individual can have his/her information in seclusion, resulting in a selective revelation of one’s identity and information and which they choose to reveal it. Privacy can also mean “anonymity” in case any person wants...
Words: 2850 - Pages: 12
...are requested to follow. This includes the professional conduct required of health professionals in the use of social media in the workplace. According to Brent (2011), "Social networking is the main source of communicating in today's society" (para. 1). Mobile communications, E-mail, Texting, and the use of Facebook and Twitter has set record breaking rates above any other form of communications in recent years (Badzek, 1998). Social networking empowers both the consumer and the health care provider. The use of the Internet plays an important role in finding health information, which allow the patient to become better informed concerning personal health, and more educated in decision-making. Health care providers also benefit by conducting real-time meetings online to discuss the most challenging cases, and to devise solutions to improve therapeutic regimens of patients. Health care providers are driven by professional connections and timely communications with patients, families, and other health care providers. Social networking is the media by which health care providers use for a range of professional purposes, primarily to educate patients or to foster provider-patient relationships, which is impressive. Although social networking has tremendous benefits to the consumer and provider, it comes with strong concerns, and confidentiality, and patient privacy issues top the list (Modahl, 2011). In recent...
Words: 1322 - Pages: 6
...International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 ISSN 2250-3153 1 Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks WorawitBinden*, MaheedeenJormae**, ZakariaZain***, Jamaludin Ibrahim**** worawit.inter@gmail.com*, maheedeen@gmail.com**, zakariazain13@gmail.com***, jamal55@gmail.com**** Department of Information Systems, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia ABSTRACT-Use of Online Social Networking Sites (OSNs) has become ubiquitous nowadays. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper we analyze the influence of social media interactivity features on the exposure of personal data of average Internet user and present techniques to implement information security awareness to minimize overexposure on OSNs. Index Terms-Online Social Networking, Information Security Awareness, Social Network Interactivity Features I. INTRODUCTION nformation is vital to communication and a critical resource for performing work in organizations. It is also important to individuals, and therefore the need to proper manage it well, is growing rapidly. Protecting data is as important as protecting cash as it is asset – and requires just as much care and planning. Now more than ever, people need...
Words: 4473 - Pages: 18
...WARSAW SCHOOL OF ECONOMICS Internet privacy policy: violations and regulations. Social media context Natalia Wójcik Index number: 51149 1 TABLE OF CONTENT 1. Introduction………………………………………………………………………….3 2. Theoretical background…………………………………………………………...4 3. E-commerce and e-marketing influence on privacy violations…………….5 4. Social networking, Web 2.0……………………………………………………….7 5. Social media privacy policy………………………………………………………8 6. Privacy policy concerns based on a particular social media example….13 7. Process of implementation of social networking regulations…………….17 8. Conclusions and final remarks…………………………………………………22 9. Bibliography………………………………………………………………………..24 2 1.INTRODUCTION Throughout the last 20 years the role of the Internet has grown enormously is every individual’s life. The Internet has its roots in 1960, when the US government attempted to build robust, fault-tolerant and distributed computer networks. However, the beginning of the worldwide process of Internet expansion may be dated to 1980 and was triggered by the development of new networking technologies and mergers of many less significant networks with the financial support of the National Science Foundation and other private commercial funding. This led to further advancement in technological improvements and their incorporations as well as wider participation of ordinary users all over the world. The Web rapid expansion reaches back to the 90’. According to the Internet World Stats:...
Words: 6024 - Pages: 25