How do e-commerce companies protect their privacy?
A web bug is the first example. They are invisible fragments of code which tracks consumers activities on a given website, for example, cookies. Cookies have become very popular over the years, although a high number of internet users are still unaware of what their purpose actually is. Cookies is a data file built by a server and places on the dark disk of the consumer’s computer; it contains URL of the server that stores it, which supplies the server which information activity on the site, which is why it causes a huge convert about web users privacy.
Another example is a virus. A computer virus is a vicious program which makes his way through computers files on disks or through computer networks. In 1998 the internet was used to spread a virus for the first time, which slowed down affected computers and filled their disks with useless data, more recent cases include the Melissa virus on 1998 and the love bug in 2000, which were spread through e-mail causing millions of dollars loss. Other viruses are sadly downloaded by the victims such as Trojan horse, which contains destructive codes which automatically erupt once downloaded.
Even Though consumers have the right to control their personal data. ‘’Everyone has the right to respect for his private and family life, his home and his correspondence, e-commerce carries the risk of losing that control as a result of new technology. According to surveys carried out, the reason as to why consumers are scared to shop online relates to privacy issues.
US privacy policies have no regulations on them; therefore when the consumer reveals their private information on the website, there is no set limit as to what can be done with this information as long as it does not involve dishonest activities. However the EU has a different outlook on this situation. In the European directive on data protection, we can find the main principles for privacy regulation. The rules stated all personal data must be processed lawfully and possessed only for the appropriate purpose. Otherwise the user is banned. Data may only be used if an individual is allowing to do say, and it is prohibited to be kept longer than needed.”