Concept explainers
a)
Explanation of Solution
Acxiom’s privacy policy:
According to Acxiom, the privacy policies are to maintain and safeguard the data that are obtained about the customers. The company is concentrated towards the usage of data thus maintaining privacy of the customer information.
Reassured about the policy:
Yes, the policy of the Acxiom’s are reassured because they establish a standard global privacy policy principles listed below:
- The choices of access are being monitored...
b)
Explanation of Solution
Ten different products that Acxiom provide:
The below are the different products that “Acxiom” provide and they are:
- Marketing services.
- Advertising solutions
- Data solutions
- Infrastructure Management services...
c)
Explanation of Solution
Acxiom’s customer:
The below mentioned are the customer of Acxiom subjected to particular industry:
- Education
- Banking
- Insurance...
d)
Explanation of Solution
Type of Data that are to be collected to deliver the product to the customer:
Based on the data inferred from the question (b) and (c), type of data that are collected by the Acxiom are list...
e)
Explanation of Solution
Function of InfoBase:
The function of InfoBase is to store a large repository customer i...
f)
Explanation of Solution
Function of PersonicX:
The function of “PersonicX” is to perform a house-hold level segmentation operation along with the visualiz...
g)
Explanation of Solution
Limiting the marketing in order to avoid privacy outcry:
It is necessary to limit the marketing of the companies like Acxiom’s because the customer can be traumatized abo...
h)
Explanation of Solution
Necessity of law in governing the company:
There may be a chance of data that are collected being misused at the greater extend; in certain cases the data obtained needs to be taken care by an organization like Acxiom’...
i)
Explanation of Solution
Necessity of law that govern the type of data service that government agencies could buy from the companies:
The data obtained and gathered needs to be preserved and needed to be avoided ...
Want to see the full answer?
Check out a sample textbook solutionChapter 5 Solutions
EBK USING MIS
- How would you characterize filthy data, and what are FIVE (5) distinct sources of dirty data that you may find?arrow_forwardWhat precautions should a corporation take to protect consumer data against unauthorized access?arrow_forwardWhen it comes to protecting consumer data, what are the best practises for businesses?arrow_forward
- What is meant by the phrase "protection of personal information"? What are the best five strategies to keep your personal data safe?arrow_forwardWhat are the best practices for data security breaches in the healthcare industry?arrow_forwardHow can a corporation protect consumer data from hackers?arrow_forward
- What is the concept of data privacy protection and how it came to existence? Why does privacy matter?arrow_forwardWhat are the best practices when it comes to data security breaches in the healthcare industry?arrow_forwardWhat types of information do companies track? Should people be concerned about their own privacy online in this age of big data?arrow_forward
- What rights should individuals have over their data? Over controlling how it is used? Over simply accessing what a company collects on them? Over being able to restrict their data from being sold?arrow_forwardWhen it comes to protecting consumer data from unauthorized access, what measures should businesses take?arrow_forwardThe IRS, BMV, and Equifax may not be the only institutions that have access to your personal information (see chart below). Answers to the following questions may be found on the websites listed below. What is the process through which databases get their data? Are there any databases that allow you to print a copy of your data? Is it possible to make changes to your data? Do you have any privacy concerns about these databases?arrow_forward
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage Learning