Concept explainers
a)
Explanation of Solution
Acxiom’s privacy policy:
According to Acxiom, the privacy policies are to maintain and safeguard the data that are obtained about the customers. The company is concentrated towards the usage of data thus maintaining privacy of the customer information.
Reassured about the policy:
Yes, the policy of the Acxiom’s are reassured because they establish a standard global privacy policy principles listed below:
- The choices of access are being monitored...
b)
Explanation of Solution
Ten different products that Acxiom provide:
The below are the different products that “Acxiom” provide and they are:
- Marketing services.
- Advertising solutions
- Data solutions
- Infrastructure Management services...
c)
Explanation of Solution
Acxiom’s customer:
The below mentioned are the customer of Acxiom subjected to particular industry:
- Education
- Banking
- Insurance...
d)
Explanation of Solution
Type of Data that are to be collected to deliver the product to the customer:
Based on the data inferred from the question (b) and (c), type of data that are collected by the Acxiom are list...
e)
Explanation of Solution
Function of InfoBase:
The function of InfoBase is to store a large repository customer i...
f)
Explanation of Solution
Function of PersonicX:
The function of “PersonicX” is to perform a house-hold level segmentation operation along with the visualiz...
g)
Explanation of Solution
Limiting the marketing in order to avoid privacy outcry:
It is necessary to limit the marketing of the companies like Acxiom’s because the customer can be traumatized abo...
h)
Explanation of Solution
Necessity of law in governing the company:
There may be a chance of data that are collected being misused at the greater extend; in certain cases the data obtained needs to be taken care by an organization like Acxiom’...
i)
Explanation of Solution
Necessity of law that govern the type of data service that government agencies could buy from the companies:
The data obtained and gathered needs to be preserved and needed to be avoided ...
Want to see the full answer?
Check out a sample textbook solutionChapter 5 Solutions
Using MIS (10th Edition)
- What precautions should a corporation take to protect consumer data against unauthorized access?arrow_forwardWhat are the best practices for data security breaches in the healthcare industry?arrow_forwardHow would you characterize filthy data, and what are FIVE (5) distinct sources of dirty data that you may find?arrow_forward
- When it comes to protecting consumer data, what are the best practises for businesses?arrow_forwardWhat is meant by the phrase "protection of personal information"? What are the best five strategies to keep your personal data safe?arrow_forwardWhat is the concept of data privacy protection and how it came to existence? Why does privacy matter?arrow_forward
- How can a corporation protect consumer data from hackers?arrow_forwardWhat types of information do companies track? Should people be concerned about their own privacy online in this age of big data?arrow_forwardWhat are the best practices when it comes to data security breaches in the healthcare industry?arrow_forward
- When it comes to protecting consumer data from unauthorized access, what measures should businesses take?arrow_forwardWhat rights should individuals have over their data? Over controlling how it is used? Over simply accessing what a company collects on them? Over being able to restrict their data from being sold?arrow_forwardIdentity theft occurs when someone acquires your personal information and uses it to hijack your finances. A common scenario is a thief using your Social Security number to open a credit card account in your name. When the thief does not pay, it is your credit history that is tarnished. 1. List three steps an individual should take to avoid identity theft. 2. List three steps a corporation that maintains your personal data in its information system should take to safeguard your data. 3. How can Internet activities contribute to the likelihood of identity theft? How can you prevent it from happening to you?arrow_forward
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage Learning