science

6
 BUSINESS LAW & ETHICS CORNER  PersonalprivacyandInternetmarketing:An impossibleconictora marriagemadeinheaven? Lin da Chr ist ian sen Schoolof Business,IndianaUniversity Southeast, 4201GrantLi ne Ro ad,New  Albany , IN 47150, U.S.A. 1. Colli si on: T echnol ogy versus per sonal privac y Whoiswatchingyou?Whoiscollectingyourpersonal and pr ivateinformation? Whohaspurchasedyour personal information, andthatof yourchildren,for uses both constructiveandpredatoryinnature?If you havevolunteereddataonawebsit e, do you kn ow what is beingdonewi th your pr ivateinforma- tion? Wha tarethebenetsandproblems associated wit h per sonal datacollection? Rec ently , many U.S.citizensweredisturbedby the implementa tion of anewsecurity-check system installedatseveralairportsnationwide. Travelers pa ssing throu gh thesefacilitiesfaceachoiceof eit her und erg oing anx-rayscanorenduringafull- body patdo wnbeforebeingallowedtoboardights. BusinessHorizons(2011)54, 509—514 www.elsevier.com/locate/bushor KEYWORDS Personal privacy; Marketing; Internetmarketing; Datamining Abstract Withthedeclineof printmediaandnetworktelevision,marketing strategyischanging.Astheseadvertisingvehiclesareslowingdownandmore individualsturntotheInternetfordailyfunctioning,marketersarefollowingin kind.Technologyoffersbusinessesandmarketingspecialiststheabilitytocollect immenseamountsof privatedataaboutindividuals’interestsorcharacteristicsas theysurf theInternetandinputpersonalinformation.Datacollectionfallsintooneof twocategories:auser’svoluntarysharingof suchinformation,orinvoluntary/ uninformedcollectionbyotherparties.Thethreatposedbyinvasionof personal privacyisreal.Atthesametime,Internetuserscanbenetinseveralwaysfromthe sharingandcollectionof personalinformation.Forexample,muchonlinecontentis fundedbyadvertising,andwouldotherwiseonlybeavailabletoconsumersforafee. Additionally,valuableinformationregardingtrendsandhappenings(e.g.,uout- breaks)aredetectedbyaggregatedInternettracking.Finally,manyInternetusers valueandenjoytargetedadvertisinggearedtotheirparticularinterestsorneeds. Lawsregardingthismatterarecurrentlylimited,butaredevelopinginorderto protectindividualsfromunscrupulousdatacollection,especiallyinvolvingchildren. Fortunately,therearewaysmarketerscanlegallyandethicallycollectanduse personalinformation.Ultimately,regulationneedstobedeveloped,andthemarket- ingprofessioncanaiditself byexpandingself-regulationandpolicinginordertostave off additional–—andpotentiallyonerous–—regulation. #2011KelleySchoolof Business,IndianaUniversity.Allrightsreserved. E-mailaddress:[email protected] 0007-6813/$seefrontmatter#2011KelleySchoolof Business,IndianaUniversity.Allrightsreserved. doi:10.1016/j.bushor.2011.06.002

Upload: ashwin-jambhulkar

Post on 10-Jul-2015

43 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Science

5/11/2018 Science - slidepdf.com

http://slidepdf.com/reader/full/science-55a0c79aa3d61 1/6

 

BUSINESS LAW  & ETHICS CORNER 

Personal  privacy and Internet  marketing: Animpossible conflict  or   a marriage made in  heaven?

Linda Christiansen

School   of   Business, Indiana  University Southeast, 4201  Grant  Line Road, New Albany, IN   47150, U.S.A.

1. Collision: Technology versus

personal privacy

Who is  watching  you? Who is  collecting  your  personaland  private  information? Who has  purchased  yourpersonal information, and  that  of your  children, foruses  both  constructive  and  predatory in nature? If 

you have  volunteered  data  on  a  website, do you

know what 

is 

being 

done 

with your 

private 

informa-tion? What  are  the  benefits  and  problems  associatedwith personal  data   collection?

Recently, many U.S. citizens  were  disturbed  bythe implementation  of a  new security-check  systeminstalled  at  several  airports  nationwide. Travelerspassing through  these  facilities  face   a  choice  of either  undergoing  an  x-ray scan  or  enduring  a  full-body patdown  before  being  allowed  to board  flights.

Business  Horizons  (2011) 54, 509—514

www.elsevier.com/locate/bushor

KEYWORDSPersonal   privacy;Marketing;Internet  marketing;Data  mining

Abstract   With  the  decline  of print  media  and  network  television, marketingstrategy is  changing. As  these  advertising  vehicles  are  slowing  down   and  moreindividuals  turn  to the  Internet  for  daily functioning, marketers  are  following  inkind. Technology offers  businesses  and  marketing  specialists  the  ability to collectimmense  amounts  of private  data  about  individuals’ interests  or   characteristics  asthey surf the  Internet  and  input  personal  information. Data  collection  falls  into one  of two categories: a  user’s  voluntary sharing  of such  information, or  involuntary/uninformed  collection  by other  parties. The  threat  posed  by invasion  of personalprivacy  is  real. At  the  same  time, Internet  users  can  benefit  in  several  ways  from thesharing  and  collection  of personal  information. For  example, much  online  content  isfunded  by advertising, and  would  otherwise  only be  available  to consumers  for  a  fee.Additionally,   valuable  information  regarding  trends  and  happenings  (e.g., flu  out-breaks) are  detected  by aggregated  Internet  tracking. Finally, many Internet  users

value  and  enjoy targeted  advertising  geared  to their  particular  interests  or   needs.Laws   regarding  this  matter  are  currently limited, but  are  developing  in  order  toprotect  individuals  from unscrupulous  data  collection, especially involving  children.Fortunately,   there  are  ways  marketers  can  legally and  ethically collect  and  usepersonal  information. Ultimately, regulation  needs  to be  developed, and  the  market-ing  profession  can  aid  itselfby expanding  self-regulation  and  policing  in  order  to staveoff additional–—and  potentially onerous–—regulation.#  2011   Kelley School  of Business, Indiana   University. All  rights  reserved.

E-mail   address: [email protected]

0007-6813/$   — see  front  matter  #  2011  Kelley School  of Business, Indiana  University. All  rights  reserved.doi:10.1016/j.bushor.2011.06.002

Page 2: Science

5/11/2018 Science - slidepdf.com

http://slidepdf.com/reader/full/science-55a0c79aa3d61 2/6

 

While  some  have  expressed  concern  regarding  radi-ation exposure  from the  x-rays, others  are  upsetbecause they feel  they’re  being  forced  to choosebetween two privacy violations: total  body imagingor  extensive  physical  touching. One  has  to wonderabout  the  irony: Why the  great  unease  surroundingpersonal privacy at  the  airport  when  so many people

regularly share 

very important 

and 

valuable 

infor-mation online  without  giving  it  a  second  thought?While privacy may be  invaded  in both  cases, thepotential  risk  for  long-term harm is  far  greater  withonline sharing  of personal  information.

2. Demand for  personal information inmarketing

Marketers   are  hungry for  personal information  suchthat   they may more  effectively use  their  dollars

toward 

targeted 

advertising. The 

online 

ad 

industry,alone, totals  $23  billion  and  continues  to grow(Angwin & Valentino-DeVries, 2010). For  businesseseager  tomarket  their  goods  and  services,informationregarding a  person’s  demographics, income, inter-ests, and  habits  represents  a  gold   mine. Marketersand  business   executives  knowthat  a  customer   is   morelikely to complete  a  purchase   when the  message   isprecisely targeted  toward   him or  her, as  opposed   tobeing more  general  in nature. This  is  called  target

marketing, and  while far  more  expensive per  expo-sure than traditional advertising, it  is  also morelucrative in that  it  provides  less  wasted  coverage.The question  is: How do marketers  collect  and  usethis  information   to effectively deliver  targeted   ad-vertising? The  Internet   has  been   the  best  answer   tothis  question  since  marketing  came into existence.

In recent  years, marketers  have   observed   thedecline  of the  traditional   stalwarts   of marketing:print  media  and  network   television. The  Internethas  displaced  many of the  traditional   forms   of adver-tising media  and, as  a  result, marketers  have   fol-lowed  consumers  to this  medium. At  the  same   time,the Internet  and  evolving  technologies   provideuniqueopportunities  to collect  and  organize   personal

information   about  individual  users  into specific pro-files. Consequently, target  marketing  utilizing per-sonal information  from these types  of profiledatabases   has  become   the  Holy Grail  of the  industry.

3. Approaches  to  collection and usageof personal information

Target  marketing  requires  the  collection, retention,and  analysis  of information  about  users. Because  it  is

based  on valuable  consumer  information, websitesare able  to charge  a  premium to place  ads  based  onthe parameters  selected  by the  advertisers. Web-sites  and  ad  networks  can  take  several  approachesto the  collection  and  use  of personal  information. Itis  important  to understand  the  distinctions  in orderto analyze the  issue  at  hand.

Personal information 

from the 

Internet 

can 

becollected  by a  variety of parties. For  some  compa-nies, data  collection   is  merely a  side business; othersintentionally track  Internet  users, organize  that   da-ta, and  sell the  profileof informationtheydevelop. Inmany cases, individual  websites  themselves   are  col-lecting information. For  example, Facebook  utilizesinformation   from users  to post  targeted   ads  on  indi-viduals’ pages. If a  user   falls  into a  certain  age  group,has  discussed  travel,or  posted   about   having  children,he or   she  should   see  ads  related  to these topics.Another  example is  Amazon.com, which  makesproduct   suggestions  to customers  based   on  theirpast  purchases   and/or   searches. In both cases, thewebsites–—Facebook and  Amazon–—are  using  infor-mation they have  collected  to market  to consumers.

An online  advertising  network, or  ad   network, is  acompany in the  business   of collecting  and  utilizinginformation   from website  users. This  third-partybusiness  acts   as  a  broker, connecting  advertisers  withmultiple websites  that  have   collected   user  informa-tion and  also have  ad  space to sell. An  ad  networkhelps  websites  sell ad  space, while  aiding  advertisersinfinding   targeted   placement  ofadvertisements.Theremaining data-collection  businesses  purchase   infor-

mation from a  variety of sources  with the  expresspurpose of building  and  selling  profiles   bearing  iden-tifiable   information   connected  to specific people.Websites  can  employ several  approaches   to datacollection, including  the  following   three  methods:

1. Collect   personal  data, then  anonymize and   ag-

 gregate it to sell  to third    parties   and/or to use

internally . In some  cases, a  website  or  ad  net-work will collect  information  from Web  users  andorganize it  in a  database  but–—instead  of sellingidentifiable information–—will  use  or  sell  aggre-

gated 

information 

to third 

parties. This 

informa-tion is  valuable  for  advertisers  to determine  theoverall characteristics  of the  website’s   users.The website  itself could  also use  this  informationto strategize  regarding  content  decisions  and  tosell advertisements. This  type  of informationcollection  and  dissemination  is  not  as  invasiveas  the  other  methods  if limited  to this  purpose.

2. Collect   personal  data, keeping   personal  data

within the company but providing  the opportu-

nity for advertisers   to specify a   certain  range of 

510  BUSINESS LAW  & ETHICS CORNER 

Page 3: Science

5/11/2018 Science - slidepdf.com

http://slidepdf.com/reader/full/science-55a0c79aa3d61 3/6

 

traits    for target  marketing. Advertisers  pay apremium for  ad  placement  directed  to thoseusers  who meet  the  advertisers’specific criteria.Although the existence  of data  collection  andretention might  be  considered  questionable  bysome, if information  kept  within  the  website  isbeing accessed  and  used  only by the  party with

which the 

user 

shared 

the 

information, usersshould  not  be  alarmed.

3. Collect personal  data  with  the intention  of   sell-

ing the information, sometimes   including  specif-

ic profiles   or names, to third    parties . Websitesand  Internet  service   providers  (ISPs) have  theability to accumulate  users’ personal  informa-tion in a  database, to offer  for  sale  to outsidepartners. The  third-partyfirms  then  compile  thatinformation into a  comprehensive  database  forextensive and  long-term data  mining. Profiles  of individuals  are  available  for  sale  to anyone  withan interest  and  money to pay the  fee. While  thisis  a  growing  industry, many websites  and  adnetworks  are  reluctant  to sell  customers’ infor-mation because  doing  so could  limit  their  abilityto sell  targeted  advertising. This  is  the  type  of data  collection, retention, and  sales  that  is  mostintrusive from a  personal  privacy perspective.

4. Types  of sharing of personalinformation and related privacyconcerns

Privacy concerns  vary by the  circumstance  of onlinedisclosures. Disclosures  may fall  into the  followingthree categories.

4.1. Voluntary sharing or  disclosure byadults

One  relatively benign  example  of this  is  the  sharingof preferences  or  product  reviews  with  websitessuch as  Amazon   or  Netflix. In many other  cases,though, people do not  exercise  sufficient  caution

in sharing 

personal 

information 

under 

certain 

cir-cumstances. Subjecting  themselves  to this  potentialdanger  could  stem from a  lack  of awareness, fromnot  taking  the  time  to read  privacy policies, or  froma  generalized  lack  of concern–—even  if these  factorsare known. Too often, individuals  click  throughwarnings, permission  requests, and  privacy policieswithout  thinking  about   how it  may impact  theirprivacy. Even  adults  can  exercise  poor  judgmentby revealing  personal  information  via  Facebook  orblog posts, not  taking  into consideration  possibleinformation collection  and  use by other  parties.

4.2. Taking of information from adults(involuntary disclosure)

This  malicious  method   involves  the use  of tech-nology to collect  data and  track movements  byInternet  users  without  their  knowledge  and/orpermission.  For  instance, the placement  of Web

browser 

text files–—known 

as 

cookies –—is 

used 

bywebsites  to track files  and   Internet  viewing histo-ries.  Cookies  are   used  in  online target  marketing,as  well  as  to aid  collection of information andbuilding  of personal profiles.  Some ‘flash  cookies’are so invasive that  they are stored  in   two areasof the  computer   and   can reinstate  themselveseven  if a  computer   user  has   deleted  the cookiefile (Vega, 2010).

Even more invasive, deep packet  inspection   in-volves  the   reading and  analyzing of ‘packets’  of information   traveling across  the Internet.  The pur-pose is  to monitor  all   online activity of an  Internetuser,  not   just Web  browsing, resulting  in   extremelydetailed  profiles  of that  user  (Stecklow   & Sonne,2010). History sniffing  allows the  third  party to runcode ina   user’s  Web  browser  to detect certain  sitesvisited  (Vascellaro, 2010). Scraping, a  particularlyworrisome  method   of data collection, involvesgathering  personal details  shared on forum  discus-sions  and   social  media  sites  in   order to expand andflesh-out   personal  profiles  of specific people, evenwhen  sites  are for  members only or  are intendedto be confidential (Angwin & Stecklow,  2010). An-other  invasive  method   is  digital-device finger-

 printing, which  tracks  online  activities  to buildprofiles  using  the   digital fingerprint–—or  identifi-able traits–—of   every electronic  device in  use. Eachindividual  device  is   distinguished  by the  variousways it  is   unique, such as  the clock setting,  soft-ware, and  hardware identification  number (Angwin& Valentino-DeVries, 2010). And  most recently, thepress  is   reporting that  smartphones  can help  trackusers’ movements, relationships, moods, health,calling habits, and  spending patterns, as  well  asmovements   in   the Dow Jones  Industrial  Averageand   the   spread of political  ideas  in   the aggregate

(Hotz, 2011).These  escalating, egregious, and  invasive  exam-ples  of private-information  collection  are  becomingmore common. When  these  methods  of data  collec-tion are  employed, the computer  user  is  typicallyunaware and  has  no idea  how to protect  his  or  herpersonal information.

4.3. Sharing by children

While  disclosure  by adults  can  be  separated  into thecategories  of voluntary and  involuntary, any sharing

BUSINESS LAW  & ETHICS CORNER 511

Page 4: Science

5/11/2018 Science - slidepdf.com

http://slidepdf.com/reader/full/science-55a0c79aa3d61 4/6

 

of personal  information  by children  is  problematic.Children obviously have  limited  capacity, both  prac-tically and  legally, to discern  when  disclosure  of personal information  is  proper  and  safe. Studiesshow that, in general, children’s  websites  depositmore cookies  than  mainstream websites  visited  byadults; one  study found  that  50  popular  children’s

websites 

deposited 

4,123 

cookies 

on 

computer–—30%  more   than  deposited  by the  50  most   popularU.S.-based  websites  (Stecklow, 2010).

5. Ways  individuals   can be harmed bydata collection/retention of personalinformation

People  may be  harmed  by data  collection  and  yetnot  realize  it, or   even  anticipate  the  level  of dam-age. Indeed, the  results  can  prove  to be  costly andpotentially embarrassing, and  certainly extend  be-yond  what  one  might  imagine. Personal  informationgleaned  from the  Internet  has  been  used  in thefollowing circumstances:

Running  of background  checks  by employers  forhiring decisions;

Pricing  and  assessing  risk  of injury or  death  byinsurance  companies  (based  on  Internet  searches,blogs, and  confidential  online  support  groups, forexample);

Termination  decisions  by employers  (for   example,if a  user  is  criticizing   the  workplace  or  found  tobelying to the  employer);

Recruiting  and  scholarship  decisions  by athleticcoaches;

Searching  for  relevant  evidence  by attorneys  inthe course of case  preparation;

Detecting  political  leanings  for  fundraising  pur-

poses 

and 

to target 

individuals 

who are 

undecidedon an  issue or  a  candidate; and

Facilitating  criminal  attacks.

6. Protection of personal privacy

Increases  in threats  to personal  privacy and  corre-sponding outcries  of concern have  prompted  move-ment  in the  protection  of private information

collected  by online  methods. Four   specific arenasof development  are  analyzed  next.

6.1. The legal system

Use  of the  legal  system through  litigation  and  legis-lation to protect  online  privacy rights  is  gaining

momentum. Consider 

the 

following 

three fields 

of action: litigation, existing  legislation, and  proposedlegislation.

6.1.1. LitigationIn 2001, the use of cookies  to collect  information   wasruled   a  legitimate, lawfulactivity;that   precedent   hasnot  been  overturned   in the years  since  (DoubleClick,2001).Topical   lawsuits   have dealt  with   cookies  placedon mobile  phones, and  the aforementioned  regener-ating flash   cookies   (Vega, 2010). Most  recently, someiPhone and  iPad  owners   are  suing   Apple   for  invasionof privacy and  computer   fraud  as  a  result   of thedevices’ collection  and  retention of up  to one-year’slocation data. Following  on  the heels  of these liti-gation trends, government  regulators   worldwide   arelaunching investigations  regarding these allegations(Gullo, 2011).

6.1.2. Existing  legislationThe Children’s  Online  Privacy Protection  Act  of 1998(15  U.S.C. 6501-6506  (supp. V2000)), or  COPPA,prevents  organizations  from collecting–—without  pa-rental permission–—personal  information  from chil-dren up  to their  13th birthday. Although  this  statute

is  limited, it  at  least  provides  some   protection  forchildren under  age  13; however, children  aged   13years  and  older  are  not  protected  by a  similarstatute. For  Internet  users  of all  ages, other  existingstatutes  provide  a  variety of restrictions  governingactivity, but  only offer  a  patchwork  of protection  forsome of these  issues.

6.1.3. Proposed legislation: The CommercialPrivacy Bill  of RightsProposed   in Congress  last  April  by Senators  JohnKerry and  John  McCain, the  Commercial  Privacy Bill

of Rights 

Act 

(2011) would 

create 

consumer 

privacyrights, including  notice, consent, access, and  cor-rection of information  accumulated  by collectorsand  parties  employed  by them. These  entities  wouldbe required  to implement  security measures  toprotect  the  information  they collect  and  maintain.Additionally, collectors  would  be  allowed  to gatheronly the  information  necessary for  the  transactionor  service, and  other  limited  circumstances. Finally,they would  be  required  to use  reasonable  proce-dures  to ensure  accuracy.

512  BUSINESS LAW  & ETHICS CORNER 

Page 5: Science

5/11/2018 Science - slidepdf.com

http://slidepdf.com/reader/full/science-55a0c79aa3d61 5/6

 

6.2. National ‘Do  Not  Track’ lists

These  lists, similar  to the  national  Do Not  Call  lists,have been  proposed  as  a  possible  solution  for  grow-ing privacy concerns.

6.3. Web browser   ‘Do  Not  Track’ feature

These  options  are  being  added  to most  mainstreamWeb  browsers. However, this  protection  is  depen-dent  on  ad  networks  voluntarily honoring  the  desiresof the  users, as  there  is  no force  of law behind  suchdesires  at  this  point.

6.4. Educating the public

An  increased  emphasis  on  public and  parental  edu-cation would  be  an  effective  complement  to theseother  methods, to increase  privacy protection  with

user 

awareness.

7. Recommendations  for  themarketing industry and governmentregulators

Internet  marketing  is  clearly here  to stay, and  itshould  be  legal  and  ethical, as  well  as  beneficial.Achieving  a  balance  of appropriate  online  data   col-lection and  effective  marketing  depends  on  theidentification  and  implementation  of standards

and  practices  by which benefits  outweigh  harms,and  some  degree  of control  is  afforded  to the  indi-vidual user.

Online  marketing  is   vital  to the Internet  as   weknow   it. Somuch  online content  is  either  free  or  lessexpensive  because  it   is   supported  by advertisers.And   some  consumers  truly want  to be tracked fortargeted  advertisements;  they regularly registerfor  email notifications  of sales and  product  offer-ings. Many Internet  users  prefer  that  ads   and   sug-gested  merchandise  be geared  toward theirinterests  and  demographics.  And   because websites

are able to charge a 

premium for 

the targetedadvertising,  all parties  benefit–—the   website own-ers,  Internet  users,  and   advertisers–—when targetmarketing is  utilized.

7.1. Government  regulation

To encourage  effective  Internet  marketing  whilealso protecting  Internet  users’ personal  privacy,improper  uses  of data  must  be  restricted  and

punished  while  beneficial uses  are  concurrentlymanaged. Online  data   collection  of personal  infor-mation may be addressed  by government  regulationin the  following  ways:

1. Prohibit  egregious  activities, such  as  the  buildingand  selling  of names/profiles  without  user  per-

mission, and 

fraudulent 

practices. Governmentintervention offers  the  best  chance  to prohibitand  punish  this  behavior.

2. Manage  neutral  activities, including  anonymizedaggregated  data  for  trends  or  macro-feedback,such that  the  information  is  used  positively andnot  as  an invasion  of privacy.

3. Encourage  beneficial  activities–—including   usersign up/opt-in  for  targeted  ads  and  free  or  inex-pensive  Web  content–—as   long  as  the   correlateddata   collection  and  retention  is  protected, andperformed  in compliance  with existing  laws.

7.2. Marketing industry self-regulation

No one  knows  better  than  marketers  the  value  of online advertising. The  marketing  profession, as  awhole, should  realize  that  it  is  better  to proactivelyself-regulate than  to wait  for  government  interven-tion. When government  becomes  involved, condi-tions  have  typically reached  a  fevered  pitch, andCongress’ reaction  can  be  extreme. Voluntarily pro-

viding full  disclosure  to consumers, as  well  as  vari-ous  privacy options, is  far  preferable  to onerousregulation by the  government  and/or  consumerbacklash.

Websites  and  ad  networks  should  post  clear, con-cise, and  fair  privacy policies  and  settings, and  thenadhere strictly to user  preferences. Industry mem-bers  should  also consider  making  their  websitesdefault  to opt-out  of data  collection  and  targetmarketing, allowing  interested  users  to make  theopt-in decision  if they so choose.

Online data  collection  and  profile building  has

mushroomed 

in 

recent 

years, 

and 

its 

threat 

topersonal   privacy is  growing exponentially.  Publicawareness  regarding some  of these  invasive meth-ods  is   beginning to emerge. Unfortunately,  how-ever, most people are  unaware of the  informationtrail  they  leave when  surfing the  Internet,  and  arealso unaware of the myriad  commercial uses fortheir  private  information. Employing the stepsoutlined  here, Internet  marketing  can benefitand   flourish, while personal privacy remainsprotected.

BUSINESS LAW  & ETHICS CORNER 513

Page 6: Science

5/11/2018 Science - slidepdf.com

http://slidepdf.com/reader/full/science-55a0c79aa3d61 6/6

 

References

Angwin, J.,& Stecklow, S. (2010, October  12).‘Scrapers’ dig  deepfor  data   on  Web. TheWall  Street   Journal. Retrieved  April   24,2011, from http://online.wsj.com/article/SB10001424052748703358504575544381288117888.html

Angwin,J., & Valentino-DeVries,J. (2010, November  30).Race  is  onto ‘fingerprint’phones,PCs.TheWall  Street  Journal. Retrieved

April  24, 2011, from http://online.wsj.com/article/SB10001424052748704679204575646704100959546.html

Commercial  Privacy Bill  of Rights  Act. (2011). 112th Congress, 1st

Session, BAG11284DoubleClick,  (2001). Privacy Litigation, 154  F. Supp, 2d   497.

(S.D.N.Y.  2001)Gullo, K. (2011, April  25). Apple  accused   in  suit  of tracking  iPad,

iPhone  user   location. Bloomberg. Retrieved  April  28, 2011,from http://www.bloomberg.com/news/2011-04-25/apple-accused-in-suit-of-tracking-ipad-iphone-user-location-1-.html

Hotz, R.L. (2011, April   23). The  really smart  phone. The Wall

Street   Journal. Retrieved   April   24, 2011, from http://online.wsj.com/article/SB10001424052748704547604576263261679848814.html

Stecklow, S. (2010, September  17). On  the  Web, children  faceintensive  tracking. The Wall  Street    Journal. Retrieved  April24, 2011, from http://online.wsj.com/article/SB10001424052748703904304575497903523187146.html

Stecklow, S., & Sonne, P. (2010, November  24). Shunned  profiling

technology on  the  verge   of comeback. TheWall  Street  Journal.Retrieved   April  24,2011, from http://online.wsj.com/article/SB10001424052748704243904575630751094784516.html

Vascellaro,  J. (2010, December  5). Lawsuit  targets  an  online  datacollection  technique.TheWall  Street   Journal. Retrieved   April24, 2011, from http://online.wsj.com/article/SB10001424052748704767804575654910216593180.html

Vega, T. (2010, September  20). Code  that   tracks   users’ browsingprompts  lawsuits.TheNewYorkTimes .Retrieved  April  24,2011,from http://www.nytimes.com/2010/09/21/technology/21cookie.html

514  BUSINESS LAW  & ETHICS CORNER