Skip to main content

Home/ Hospitality Technology/ Group items tagged privacy

Rss Feed Group items tagged

shineal

Data privacy matters in the hotel industry - Insights - 0 views

  • Data privacy matters in the hotel industryDr Michael Toedt Posted on 3 March 2022
  • Data privacy matters – period. As companies (including hotel chains) collect more and more personal data from consumers for marketing and research purposes, consumers are becoming increasingly concerned with data privacy and data protection. They want control over their data and they want to know exactly how it will be used. With legislative changes giving consumers more rights over their personal information, hoteliers need to both know the law and understand why data privacy is so important to hotel guests.
  • Good data privacy builds trust and loyalty
  • ...9 more annotations...
  • “Commitment to data protection” drives brand loyalty for 31% of consumers, a figure that increases to 40% for “Trustworthiness”[1].This backs up the findings from a 2018 survey by Salesforce, which found that consumers are more likely to stay loyal to a company, spend more money and recommend its services if they felt they could trust the organization with their data
  • Data breaches cause serious financial and reputational losses
  • Every type of organization could suffer a data breach if adequate data protection controls and systems aren’t in place.
  • Hotels concerned about their ability to adequately protect guests’ personal data should take immediate steps to address this. A common problem is the existence of multiple guest profiles across different platforms within the hotel tech stack, such as the PMS, CRM, RMS, POS, website, etc. Where these are not fully integrated, data has to be updated manually, which carries significant risks.
  • Key legislation explained
  • There are strict rules around how data can be obtained, stored, managed, and used.
  • Achieving data privacy compliance
  • large amount of valuable data held by hotel groups makes them a prime target for hackers and cyber thieves.
  • From compliance and reputational viewpoint, these functionalities are truly invaluable to hoteliers. However, IT can only do so much. Other key considerations for hoteliers include creating robust data privacy policies, providing clear guest communications, and training staff on data privacy processes. Taking a 360-degree approach is the best way for hotels to protect themselves and their guests from data breaches and the associated risks.
  •  
    This article by Michael Toedt on "Data privacy matters in the hotel industry" speaks on the approaches that can be taken to protect guests' data and their privacy since these practices increase guests' trust and loyalty to companies. Accordingly, it is vital for hotels to securely store guests' information. Thankfully, CDM systems make it much simpler for hotel staff to manage data-related requests from clients, such as updating personal details. They also enable one-click deletions, preventing data disputes.
ahart054

Apple is turning privacy into a business advantage - 0 views

  • New features include ways to stop email tracking, burner emails, and a VPN competitor that obscures IP addresses.
  • Apple has introduced new iPhone features that restrict app access to personal data and advertised privacy heavily in television ads.
  • Apple’s privacy strategy is now part of its products: Privacy was mentioned as part of nearly every new feature, and got stage time of its own.
  •  
    Apple announced Monday during their WWDC21 conference privacy-focused features and apps that will be coming for devices that have iOS15 or MacOS Monterey operating systems. These features include no tracking pixels which means the mail app will run images through proxy servers to defeat tracking pixels that tell marketers where and when messages were opened. Another feature will be private relay which hides users IP addresses which are used to infer location. Hide my email is another new privacy feature that will allow iCloud subscribers to create temporary anonymous email accounts to use instead of their real email address. Another new privacy feature is app privacy report which will tell you which servers apps are connected to as well as how often the apps use the microphone and camera.
shanegmark

The Right to Privacy in Tourism | Tourism Watch - Information Service Tourism and Devel... - 0 views

  • We have a right to be left alone. The state must not know everything about us. It must not penetrate our private affairs. The right to privacy is a human right. It can be interpreted differently in different countries.
  • no-fly-registers of people who are denied to board an aircraft. The data of air passengers are accumulated and retained, including even their food preferences. When entering a country, fingerprints may be taken or the iris may be scanned. There are data bases for visa information. We have security cameras at airports, railway stations and public places.
  • We are talking about the effects of globalisation here. Travelling has become very cheap. This has changed tourism, and it has changed the situation of the locals. The global village has become a reality not only online, but also offline. Surely this affects the right to privacy. Let’s keep talking about the Berlin staircase: Some tourist might find it so attractive that he takes a video of it, maybe even capturing someone who actually lives in the house and does not like to see strangers there. Afterwards the video goes viral. Offline becomes online. And the side effect: The video might have contributed to data profiles that make it easy to draw conclusions about the people concerned.
  • ...1 more annotation...
  • First of all, each one of us has to respect the laws of the country where we stay. This includes the laws concerning privacy. In Germany, for example, there is the right to control what happens to your image as an aspect of criminal law.
  •  
    This is an interesting article that is written by a Data Privacy Lawyer. He outlines the complexity of data privacy in travel given that there are so many different interpretations of what it means in different countries. He also highlights that when privacy might be violated by another individual, there is almost no recourse.
kbroo026

What hotels need to know about biometric privacy laws - Document - Gale OneFile: Hospit... - 0 views

  • In order to avoid liability, employers should become familiar with biometric privacy acts, consumer privacy acts and data breach notification requirements.
  • Currently, three states have enacted biometric privacy laws: Illinois, Texas and Washington.
  • Illinois Biometric Information Privacy Act.
  • ...6 more annotations...
  • BIPA restricts the ability of a privacy entity to "collect, capture, purchase, receive through trade, or otherwise obtain a person's or a customer's biometric identifier or biometric information."
  • The Illinois legislature stated that heightened protection for biometric information is justified by the fact that once this type of information has been compromised, it obviously can't be changed (without some serious cosmetic surgery, anyway).
  • Employers also need to be aware of local laws and regulations.
  • Portland
  • bans the use of facial recognition technology by private entities in places of public accommodation, which include hotels and restaurants.
  • With the patchwork of laws and enforcement procedures, the enactment of a uniform federal law would be beneficial.
  •  
    Several states have implemented some form of biometric privacy laws, with the gold standard coming from Illinois. Illinois' BIPA allows for private enforcement, stiff fines, and paying of attorney fees. BIPA prohibits collection, capture, purchasing or receiving a customer's biometric identifier/information. Safeguarding this data is perhaps more important than any other because it cannot be easily changed, if at all. Current lack of federal law and a patchwork of local regulations means that businesses and employees must be knowledgeable of rules and rights that affect them.
shuo zhang

Feds Offer Best Practices for Customer Privacy | Top Stories | | Hospitality Magazine (HT) - 0 views

  • Hospitality industry operators often collect information to better serve their customers.  Information may be collected during various touch points, including employee-guest interactions, the company website, and through business partners, and may include personal identifiable information, preferences, groups with which customers are affiliated, etc.  While customers understand that sharing their personal information helps businesses better serve their needs, they also have a right to know how that personal information is being collected, used and shared.
  • Protecting Consumer Privacy in an Era of Rapid Change:  A Proposed Framework for Business and Policymakers
  • This final report calls on Congress to enact general privacy, data security and breach notification, and data broker legislation in order to protect consumer privacy.
  • ...5 more annotations...
  • The privacy framework applies only to commercial entities that collect non-sensitive data from more than 5,000 customers per year
  • This element recommends that entities build in privacy at every stage of product development. Substantive protections include data security efforts such as encryption, reasonable collection limits, sound retention and disposal practices, and data accuracy. Policies and procedures should be designed that:
  • •Protect personal information from unauthorized access; •Keep personal information accurate and up-to-date; •Require that business partners with which information is shared exercise reasonable efforts to maintain the confidentiality of personal information about customers; •Educate employees regarding privacy and best practices for protecting customer information; •Protect personal information transmitted via websites during online transactions or when using other technology.
  • : A customer should be offered a choice at the time, and in the context, that his or her data would be used.
  • A customer should be provided with reasonable access to company-maintained data.
  •  
    The problem of the security in the internet is always risky for companies. Even though the customer trust the companies, but acctually, the companies sell your information without ask you if you want to share your information. For me, the organization for keeping the customers' information secured is useful and make sense, but I don't believe any companies want to pay for such service. They want to get income through selling the customers' information to other for comercial using. However, if the government make policy and establish law for protecting the customers information, it will be different. I think it will become a trend to promote. 
shanegmark

Protecting privacy in tourism - a perspective article | Emerald Insight - 0 views

  •  
    A scholarly review of journal articles related to the international hospitality industry's approach to managing privacy data. (unfortunately unable to add highlights due to it being on the Emerald website). It includes a review of privacy definitions, summarizes existing research on this area, and concludes that for an industry so much targeted by those looking to violate individual's privacy, there is a surprising lack of research on the topic.
amajo017

Hotel Technology Challenges for Every Hospitality Business - 2 views

  • Interoperability Data Management Security & Privacy Responsiveness
  • ue to the lack of standardization and specialized hospitality technology solutions, most hotels tend to develop their own proprietary solutions to manage assets.
  • Non-standardized technology can induce added learning times & on-boarding periods for guests.
  • ...17 more annotations...
  • This issue readily highlights the significance of applied technology management.    
  • Knowing and understanding customers is essential in predicting their behavior, future visits, and demands.
  • As the amount of data grows within hotel databases, the responsibility of back office management is quadrupled.
  • Authorization for data access, network & database security, and centralized database management are major concerns for hotels in the coming age. 
  • everal news outlets and hospitality professionals have already identified that hospitality companies are one of the most susceptible to data breaches. 
  • Hotel technology infrastructures must ensure that all digital interactions with guests are reinforced through robust security tech & privacy rules
  • Most hotels are handicapped by the knowledge and expertise they carry on the subject. A more reasonable idea is to consult with a technology management company that offers better insights, suggestions, and security framework designs for hotels. 
  • Advanced Hospitality has helped various hospitality ventures take root and develop their competency with technologies.
  • Hotels also need to enhance responsiveness for renovations and routine maintenance.
  • A responsive hotel tech infrastructure demands stronger resources, simpler network mapping, and seamless synchronization with hotel back office systems. 
  • Hospitality technology may be the most amazing transition to occur in the hospitality industry but remember it does come with a cost.
  • An efficient & effective hotel technology must be responsive and should acknowledge guest requests instantly.
  • thering gue
  • Gathering guest data is essential to the success of any modern business, hotels are no different.
  • Data management carries great emphasis in European countries, more so than their North American counterparts. While the current US government believes in a more lenient approach towards data retention and privacy,
    • amajo017
       
      Will be useful with regards to the lack of data privacy in US
  • With multiple point-of-sale (POS) touchpoints, an even larger number of smart devices, and that data from both demands a secure hotel network. Denying cybercriminals access to the network and preventing them from spying on guest devices is now essential for every business.
  • Highly optimized & synchronized systems leave almost no gaps when fulfilling guest requests. These technological marvels can even complete guest requests faster than hotel staff at times. This efficiency delivers a seamless guest experience while improving the responsiveness of technology. 
  •  
    This article discusses research that shows four hotel technology challenges in 2019. These challenged include Interoperability, Data Management, Security & Privacy, and Responsiveness. It argues that hotel management should be aware of these technologies because they can either help or hinder your business.
  •  
    This is an excellent article that explores that businesses in the hospitality face in their day to day running. The challenges that the article points out identifies include the interoperability of hotel technology systems, the management of data, the security and privacy of data, especially in the current era of cloud computing, and the responsiveness of hotel technologies. Although hotel technologies improve guest experience and foster efficiency in hospitality companies, such challenges may adversely their efficiency, and thus, adversely affect guest experience.
  •  
    This article discusses what we talked about this week in regards to the different types of technological disruptors in the hospitality industry. It discusses data management issues, privacy issues, and how responsiveness can be improved within hotels. This article will be useful for future research as I look more into artificial intelligence within the hotel industry.
alibaba0512

Online privacy: Difference Engine: Nobbling the internet | The Economist - 1 views

  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail.
  • Cheap storage, wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online.
  • As a consequence, the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls.
  • ...2 more annotations...
  • The main objective of the conference in Dubai is to broaden the definition of “telecommunications” to include the internet—in the name of bridging the digital divide and bringing the full benefits of the web to the poor of the world.
  • In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained.
  •  
    The international regulation for Internet can change whole industry even whole world. Due to the prevalence of internet, the regulation of telecommunication can play an important role for the field.  However, like normal privacy, internet privacy can be treated as the same way. Nowadays, only after getting a warrant from a judge can a police coerce internet service providers (ISPs) to hand over a person's email. 
emilywest5

Big data and analytics in tourism and hospitality: opportunities and risks - ProQuest - 0 views

  • The purpose of this paper is to examine and provide insights into one of the most influential technologies impacting the tourism and hospitality industry over the next five years, i.e. big data and analytics. It reflects on both opportunities and risks that such technological advances create for both consumers and tourism organisations, highlighting the importance of data governance and processes for effective and ethical data management in both tourism and hospitality
  • This paper identifies and examines key opportunities and risks posed by the rising technological trend of big data and analytics in tourism and hospitality. While big data is generally regarded as beneficial to tourism and hospitality organisations, there are extensively held ethical, privacy and security concerns about it. Therefore, the paper is making the case for more research on data governance and data ethics in tourism and hospitality and posits that to successfully use data for competitive advantage, tourism and hospitality organisations need to solely expand compliance-based data governance frameworks to frameworks that include more effective privacy and ethics data solutions.
  • Technology (and its rapid development) is one of the key megatrends and driving forces that are seen to shape the future of tourism (Yeoman, 2012, 2018; Yeoman and McMahon-Beattie, 2018) via changes that will impact the way tourism and hospitality providers interact with travellers.
  • ...15 more annotations...
  • A recent business report on key megatrends and market disruptors suggests that technology and new ways of engaging and interacting with customers are fuelling the rate of disruption as currently businesses are able to reach new customers in new ways and can reinvent customer engagement around service and convenience (Boumphrey, 2019).
  • One of the most important uses of data is to improve personalisation, travel companies using the information they gather to make specific adjustments to their offerings.
  • Currently, considerable amount of structured and unstructured data are produced globally (Nunan and Di Domenico, 2013; Verdino, 2013), a so-called “digital exhaust” (Wang, 2013; Barocas and Nissenbaum, 2014) that is passively generated by users of products and services using mobile devices (Shilton, 2009), an abundance of publicly available data shared on social networking platforms (Nov et al., 2010) and customer data and information purposely collected by tourism organisations’ booking systems or customer relations management (CRM) systems
  • This abundance of data and the act of processing data on a large scale has led to the concept of “Big Data,” which Mayer-Schönberger and Cukier (2013) define as “things one can do at a large scale that cannot be done at a smaller one, to extract new insights or create new forms of value, in ways that change markets, organisations, the relationship between citizens and governments, and more” (p. 6
  • ndeed, one of the latest Euromonitor International travel industry reports confirms that big data and analytics is expected to be the most influential technology impacting the industry in the next five years (Bremmer, 2019), followed by artificial intelligence and the Internet of Things.
  • The use of data is viewed as a disruptive innovation in the tourism and hospitality industry, although it allows organisations in the industry to facilitate personalisation, offer convenience, save costs and overall gain competitive advantage (Evans, 2020).
  • Not surprisingly, privacy is now the top data issue and concern for organisations
  • In particular, in the tourism and hospitality sector, the effective use of big data is associated with revenue management (e.g. using and combining internal data, such as occupancy rates and current bookings, with external data such as information about local events, school holidays and flight information to forecast demand and maximise revenues); market research and strategic marketing purposes (e.g. identifying customer trends to best cater marketing opportunities); customer experience and reputation management (e.g. social media conversations and online reviews, service usage data and internal feedback via customer surveys). A good example of an organisation that successfully uses big data to gain competitive advantage is AirBnB (Evans, 2020; Guttentag, 2019).
  • These concerns have been intensified by recent global cyber-attacks and more specifically by significant data breaches in a wide range of industries and sectors, including the tourism and hospitality industry (Armerding, 2018; PwC, 2016, 2017). The hospitality industry is now in the media spotlight because of high profile breaches (PwC, 2016, 2017).
  • One of the biggest data breaches of the 21st century has affected one of the largest hospitality companies, Marriott International. Starting in 2014, the data breach occurred on systems supporting Starwood hotel brands, which were acquired by Marriott in 2016 and affected ∼500 million customers worldwide, with the breach only being discovered in September 2018. Data and information on names, contact information, passport numbers, travel information and other personal information were compromised, and information on credit card numbers and expiration dates of more than 100 million customers was stolen (Armerding, 2018).
  • Indeed, the 2018 Global State of Enterprise Analytics survey found that globally 49 per cent of companies surveyed believed that the primary challenges organisations most commonly face are data privacy and security concerns (MicroStrategy, 2018). Similarly, another recent industry report shows that over 40 per cent of tourism industry professionals claimed that data privacy and cybersecurity are one of the most influential factors impacting digital commerce in this sector (Bremmer, 2019).
  • These technological advances provide significant opportunities for businesses to harness the wealth of data to support their activities and gain competitive advantage. The efficient uses of data and analytics drive process and cost efficiencies and strategy and change (MicroStrategy, 2018).
  • When selecting analytics solutions, tourism and hospitality organisations are required to address the growing concerns around privacy and security of customer data by putting in place well-designed data governance frameworks capable of providing quality data and be able to provide effective frameworks of data security and protection for all stakeholders
  • Potential frameworks for ethical data management and digital privacy specific to tourism and hospitality would need to identify, in addition to the protections afforded under the recent General Data Protection Regulation (GDPR) (ICO, 2018), how data is collected, what it is used for and who has access to it and why
  • Big data and analytics are playing a crucial role in digital transformation efforts of organisations in general and in the tourism and hospitality industry, thus driving greater effectiveness and efficiency and the strategy to define new business models and bring about successful change (Evans, 2020; MicroStrategy, 2018)
  •  
    This was about the risks in the hospitality and tourism industry when it comes to big data and analytics. Big data is so important in the hospitality industry because it's how companies know who to cater to and with what and how. In addition to the importance of big data, there are risks that come with it. A few risks are data leaks, hackers, etc. Companies invest money in their systems so these things are avoided.
Maria Zuniga

Cyber and data security in the hotel industry - PwC Middle East - 0 views

  • In the Digital Era, technology is everywhere; people can connect to your company, your employees, customers, providers and competitors through laptops, smartphones and even wearable devices.
  • With increasing reliance comes increasing risk, many of which are outside the Enterprise’s control.
  • Legal and regulatory problems bring their own special range of issues. Locking horns with regulators, litigants and judges is the last thing that business needs.
  • ...13 more annotations...
  • This is a landmark piece of legislation that will radically change our perceptions on how personal data should be handled in business
  • The simple truth is that cyber security and data privacy problems can be big news and newsworthiness drives awareness levels
  • Cyber and data security emerged to prominence as a massive risk area, due to a series of high profile breaches affecting payment cards
  • There is also the economic interest in gaining commercial advantages from the use of personal data. Gaining better customer insights and providing them with personalised services are now recognised by many in the hotel industry as core business goals.
  • The purpose of the GDPR is to put people back in control of their personal information and to improve how entities look after personal information while it is in their custody.
  • when things go wrong and they are fully aware of the fact that some of the world’s biggest, richest and more powerful entities have been humbled by poor approaches to security and privacy.
  • This case has established a need for the development of comprehensive information security programmes, annual security audit cycles and post-incident investigations in the hotel sector.
  • Businesses need to think about trust, confidence and brand health and reputation.
  • they have to do much more to tackle the security and cyber risks they face and to live up to the expectations that society places in them
  • People responsible for security and privacy in hotels ought to ask themselves whether their entities have appropriate Visions for desired end states. If not, they should bring together the stakeholders to discuss ways to take things forward.
  • regulation is seen as the antidote to market imperfection.
  • Trust, confidence and brand health may operate in a different timeframe to share prices.
  • In other words, suffering security and privacy failure might be like a cancer, where the harm is hidden from view until it is too late. This returns the focus to legal risk.
  •  
    This article is extremely important. I feel like everyone should read it because it goes hand in hand with what we have learned this week in class. The topic of cyber security is something that people need to shift paradigms. This article brings us great points about the digital era we live in. since everything we do in business now a days has to do with technology, it is important to have security and trust in this. With the increase reliance on this technology comes a higher risk. The article brings up that awareness levels of cyber security and data privacy issues are growing at a steady pace. It is extremely important that in the hospitality industry, Businesses think about trust, confidence and brand health and reputation. This highlights the fact that it doesn't matter if security systems are costly, in the long run if something goes wrong that will end up being the most costly. The article mentions that there will be a regulation established by the EU called General Data Protection Regulation (GDPR). The purpose of the GDPR is to put people back in control of their personal information and to improve how entities look after personal information while it is in their custody. In conclusion, this gives companies a competitive advantage.
jackyreis

The Cybersecurity 202: Facebook disclosed a major hack very quickly. But the alert was ... - 0 views

  • The Cybersecurity 202: Facebook disclosed a major hack very quickly. But the alert was short on details.
  • It took just three days for Facebook to notify authorities and the public that  hackers had compromised as many as 50 million user accounts on the social media platform.
  • Facebook leaders did not have enough information to paint a clear picture of the hack and the risk to its users during the announcement.
  • ...12 more annotations...
  • Europe’s new privacy law, the General Data Protection Regulation, imposes massive fines on companies if they don’t notify privacy regulators about a data breach within 72 hours. The rule took effect in May and applies to any company with E.U. customers. U.S. lawmakers have proposed similar a 72-hour rule to replace the patchwork of state data breach laws that exist here
  • The company said Friday it had notified European data privacy regulators of the breach, in accordance with GDPR. Shortly after doing so, Ireland’s Data Protection Commission, the watchdog that monitors Facebook’s GDPR compliance, said Facebook’s disclosure “lacks detail” and criticized the company for being “unable to clarify the nature of the breach and the risk for users at this point.”
  •  Equifax waited six weeks to reveal that the Social Security numbers and other sensitive information on 143 million Americans had been exposed in a data breach. Uber waited a year to reveal a hack affecting tens of millions of drivers — and just last week paid a $148 million settlement in connection with the incident. Yahoo also paid a fine earlier this year for waiting two years to tell investors that Russian hackers stole information on 500 million users. 
  • Wray stressed that cyberattacks and theft of intellectual property can inflict long-term damage on American companies,
  • No country poses a broader, more severe intelligence collection threat than China.
  • The Energy Department on Monday announced awards of up to $28 million to help fund 11 cybersecurity research projects to strengthen the defenses of America's critical energy infrastructure,
  • Karen Evans, the assistant secretary for the department's Office of Cybersecurity, Energy Security, and Emergency Response, said “energy cybersecurity and resilience” is one of the “most important security challenges” that the United States faces.
  • “The frequency, scale, and sophistication of cyber threats have increased and attacks can be much easier to launch,”
  • “Cyber incidents have the potential to interrupt energy services, damage highly specialized equipment and threaten human health and safety.”
  • The Senate Commerce Committee should hear from consumer privacy experts as lawmakers consider whether to develop data privacy legislation, a coalition of consumer and privacy groups said Monday
  • And while civilian agencies generally face the most lopsided age disparities, the importance departments place on building a long-term talent pipeline varies greatly
  • That means federal technologists at or approaching retirement age outnumbered their 20-something counterparts roughly 4.6 to 1.”
  •  
    This article highlights the importance of announcing a security breach quickly, and explains the argument on whether it needs to be carefully analyzed before releasing the breach. It explains the importance of releasing the understanding of a hack as quickly as possible to maintain people's information (i.e. bank information) safe.
isabelladlp

Confidentiality in the Hospitality Industry - 0 views

  • No specific laws govern confidentiality in the hospitality industry, but your contracts and policies should clearly dictate what degree of privacy customers can expect.
  • Hospitality businesses routinely swipe customer credit cards and may gain other sensitive financial data, such as a customer's bank account information.
  • If you inadvertently leak this data, you could be legally liable for your negligence, resulting in costly lawsuits.
  • ...18 more annotations...
  • If your connection isn't password protected, anyone can access the system.
  • And even with a password, computer-savvy network users can gain access to another user's data.
  • Hospitality workers don't have any special legal authority, so they can't physically restrain a customer. Instead, they should call the police if they suspect criminal activity.
  • Your company's confidentiality policy can educate customers about the amount of privacy they can expect.
  • If you promise a customer a specific amount of confidentiality and then break that agreement, you've broken your contract and can be sued.
  • No one can contract to engage in illegal behavior, and if someone is in immediate danger, it's your duty to take steps to protect him.
  • It also establishes guidelines for employees to follow, and a clear policy can even protect you against lawsuits.
  • The U.S. Supreme Court has established that hotel customers have a "reasonable expectation of privacy" in hotel rooms.
  • You can't enter or search a guest's room without her explicit consent, but guests are not entitled to any special privacy
  • As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality
  • confidentiality in employment is implicit, regardless of whether employees have signed an agreement.
  • If a member of your staff violates this explicit or implicit agreement, the penalty for breach of confidentiality can be severe and long-lasting.
  • an employee who signs this type of agreement agrees that a violation of confidentiality is also a violation of the employment contract. The penalty for breach of confidentiality isn’t restricted to employees who have signed confidentiality agreements,
  • if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of confidentiality.
  • Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims.
  • Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment.
  • As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.
  • Employers will not look favorably on any prospective employees who were terminated due to a confidentiality breach, or convicted of a crime related to that type of violation.
mmdmd99999

JOSHUA BERGEN - ProQuest - 0 views

  • From PCI DSS compliance to privacy, the company's president stresses the importance of education in ensuring data security
  • "It's very ironic now being that what we do, data security and privacy and protection in the credit card environment because what led me to the accounting world was finding credit-card fraud in my reservation department and reporting it," Bergen said.
  • Bergen divided Venza's business into three areas: privacy regulation compliance, data protection and Payment Card Industry Data Security Standard compliance. Between the three groups, Venza's services include antivirus, backup recovery, data-breach notification, firewall management, information risk assessment, penetration and segmentation checks, privacy management and remote monitoring. Outside of these central services, the company also provides an educational human-resources suite consisting of modules in sexual-harassment prevention, diversity and guest relations, antibribery and acceptable use of a company's network, website and equipment.
  • ...2 more annotations...
  • Called Project Basecamp, the program will reach out to 500 students at 10 universities with hospitality programs and educate them about technological and financial security. "I've jokingly said if I do agood enoughjob, they should actually need less service from us," he said.
  • Companies may have incredibly advanced equipment, firewalls and encryption, he said, but all it takes is one accidental mistake from someone within the system and all of that technology becomes moot. "So that's why we focus on what we call the human firewall," he said. "They are the most valuable asset in all of this." Sidebar
  •  
    PCI DSS compliance to privacy to data security
Mingxue Jia

Airport Security Solution: Should the TSA Profile Travelers to Prevent Terrorist Attack... - 1 views

shared by Mingxue Jia on 23 Mar 13 - No Cached
  •  
    The best way to protect airplanes isn't through improved technology such as full-body scanners but through profiling and questioning of passengers, some aviation security experts say. But such a move is an extremely controversial one that opponents say would violate travelers' privacy and could unfairly target some passengers for more-intense screenings.
  •  
    This artical piont out the best way for airport security is profiling travelers. Considering privacy concerns, in my opinion, not all consumers will accept this non-technical. Maybe for frequent fliers, they like this non-technical approach. Because that this approach provides conveniences to them and helps them save time. Frequent fliers do not need to line in a long queue, and then take off clothes, and shoes, as well as opening their luggage for check. However, as for normal fliers, considering privacy concerns, they may mind providing background information to airlines, since they don't know if it is safe.
Danelkis Serra

Proximity marketing: When worlds collide - Direct Marketing News - 0 views

  • rise of mobile technology
  • met with some trepidation
  • Proximity marketing merges the physical and digital domains by using mobile devices to reach consumers at the greatest point of influence, providing bargains for shoppers and increased sales and consumer insights for retailers
  • ...17 more annotations...
  • send messages to user smartphones when they come within range of a store
  • consumer provides permission, a wireless message is transmitted, at no cost
  • as simple as a discount coupon or as elaborate as an interactive gam
  • Consumer privacy is completely protected
  • customized
  • reaching consumers in that venue
  • quickly change messaging
  • precious data on consumer buying habits
  • generate much higher returns than traditional ads
  • more affordable
  • consumers
  • receive offers
  • they've shown interest
  • cut through the clutte
  • targeted
  • point of sale
  • agile ad strategy
  •  
    Earlier his week I learned about Proximity Marketing and I am not certain if I like the idea.  According to this article written by Romanov, Proximity Marketing "combines the digital and physical worlds in a new way, offers many advantages to both consumers and retailers. It's an agile ad strategy that allows merchants to make changes on the fly to improve message effectiveness and reach sales targets on specific items. It provides amazing consumer insights." Sounds like a great concept; it uses mobile devices, which most people have, to send an alert once shoppers are within range advising that bargains are available.  The consumer then has the choice to accept (or not) the message, which could be a simple discount or even an interactive game.  The consumer's privacy is protected as it is at no cost to them.  This can potentially increase retailer sales, at a lower costs, and produces data on consumer buying habits.  Win-Win. The issue I have with this is the overall multitude of alerts received from various retails.  I am not concerned about privacy issues; it is more of an annoyance issue. 
  •  
    I actually like this idea because I shop aimlessly. When I'm in the radius of a sale I get excited!!. It makes it easy to choose which store I will go into. It will be great if you can turn the alert on and off. On days I'm not shopping I don't want the alerts to go off. That can be distracting and annoying.
hannahamorton

Marriott Breach Exposes Far More Than Just Data - 0 views

  • for about 327 million victims, compromised data may include names, addresses and passport numbers
  • "they should have been able to isolate hackers back in 2015."
  • Currently many companies opt for inadequate data security because it's cheaper than the consequences of a data breach,"
  • ...5 more annotations...
  •  "The Consumer Privacy Act fixes that and would hold companies accountable."
  • The CCPA — which gives Californians the right to know what personal information is collected about them, whether and to whom it is sold or disclosed, as well as the power to prevent such sales — takes effect in 2020 and, while it may sound like reasonable legislation, has already faced a grueling uphill battle.
  • Fancy Bear, which has been tied to Moscow's military intelligence service GRU, was found to be using the leaked NSA hacking tool Eternal Blue to hack victims via their hotel WiFi connections.
  • This is much more than a consumer data breach. When you think of this from an intelligence gathering standpoint, it is illuminating the patterns of life of global political and business leaders, including who they traveled with, when and where. That is incredibly efficient reconnaissance gathering and elevates this breach to a national security problem.”
  • Hotels are easy targets, constituting 92% of all point-of-sale intrusions in 2017, and hotel mergers are only expected to accelerate.
  •  
    Marriott's data breach in 2018 exposed the information of over 500,000 guests including names, addresses, and passport numbers - leading to a class-action lawsuit and falling share values. The California Consumer Privacy Act, taking effect in 2020, gives Californians the right to know what information is collected about them and where this information goes. Amazon, Facebook, Google, Microsoft, Twitter, Uber, AT&T and Verizon are lobbying against the CCPA, but data-security regulations are being enacted regardless to protect customers against these breaches.
vickychapas2021

Proximity Marketing: Often Creepy, but It Doesn't Have to Be: Center for Digital Ethics... - 0 views

  • That night at home, you get an email from the department store. “Still thinking about those shoes?” it asks. “Buy them now!”
  • proximity marketing is delivered via beacons placed strategically throughout a store that use Bluetooth to communicate with smartphones in their range
  • stores can catch up by providing some of the perks of online shopping in person,
  • ...16 more annotations...
  • Beacons can also help shoppers navigate a big store
  • beacon communication
  • often connected to an app
  • , which may gather even richer data, such as a customer’s product preferences, demographic information and purchase history, particularly if the app is hooked up to mobile pay.
  • customers now have access to a map that shows their location within a Target store
  • the state of Illinois proposed a bill that will make it illegal for companies to “collect, use, store, or disclose geolocation information
  • from a location-based application
  • Those who do want the discounts and the conveniences that come with location-based marketing should be able to participate knowing that their data and privacy are safe and respected.
  • displaying in-store signage notifying shoppers that their location data is being collected,
  • And there will always be companies that ignore guidelines
  • , and even break laws.
  • an Uber update surreptitiously removed an option that allowed users to opt out of location tracking when they were not using the app.
  • Instead, users had to sign on for tracking “always” or “never.”
  • they were also forced to sign on to tracking for up to five minutes after they had completed their ride and left the vehicle.
  • It took nine months for Uber to listen to their users. This August, the company finally announced it would stop tracking the location of its users when they were not using the app.
  • Target’s privacy notice is currently 4,359 words and the top of the page reads, “We may change or add to this privacy policy, so we encourage you to review it periodically.”
  •  
    This article mentions the many benefits and consequences of proximity marketing. For instance, there are policies regarding allowing access to one's location that many users are unaware of. Uber for many months allowed the drivers to still have the user's location even after a couple of minutes of dropping them off. They changed this months later, but these kinds of things coming to light makes customers want to leave their location off. Proximity marketing is great for learning more about who shops at our businesses and even to entice the consumer to shop more frequently, but many people would prefer to avoid it.
irinadolgopolova

Event App Security: Access & Data Privacy Best Practices - EventMobi - 1 views

  • Due to heightened sensitivity around data breaches and privacy, event planners are having to pay special attention to how their technology vendors—like event app providers such as EventMobi—are using and storing their event data.
  • Provide passcodes for private events. Requiring participants have a passcode to log into an event app allows planners to limit access to only those people they share the passcode with, such as a list of registrants.
  • Restricting app access to registered participants only (based on their email address) ensures the greatest control over event details and participant listings by locking out anyone not registered to attend.
  • ...1 more annotation...
  • Aside from ensuring your event app provider is security-conscious, it’s important to consider implementing processes that mitigate risk around how other vendors and/or your employees access or use event participant data.
  •  
    This article tells about how important the security features are for the event registration software and apps. The authors tells what security ensuring procedures have to be implemented in the apps, what kinds of information should the attendees agree to before signing up and the regulations that have to followed by the event planners using the event apps.
  •  
    This article is a piece of nice introduction on how to protect event information security with apps. It gives us an insight of how event planners can set the registration system and limit access of the participants to protect privacy. Besides the settings and consideration of the system (app) itself (like the provider of the app and their policies) and the privacy policies, this article also mentions other considerations like Wi-Fi security, employee training and limited information access.
anonymous

Data Privacy and Security in the Travel Industry - Security Boulevard - 0 views

  • As COVID-19 mauls the travel sector and hotels, airlines and cruise lines shutter their doors or park their planes and ships, this interlude may present them an opportunity to address how they handle passenger information. Each of these sectors of the travel industry collects personally identifiable information and each has suffered considerable breaches or lapses in how data is handled.
  • Like British Airways, the hotelier Marriott Corp. was socked with a £99 million fine by the ICO for its 2018 exposure of 383 million customers booking information.There is no doubt that the hotel industry is awash with personal data on their guests and are ripe for targeting by cybercriminals.
  • Every infosec professional will tell you, don’t collect what you can’t protect. These examples from within the travel industry serve to drive home that point. In the case of the Gekko Group and Spice Jet, their attempts to protect their data revealed configuration errors or a lack of understanding. With respect to Marriott, British Airways and Carnival, they were subjected to an attack that managed to maneuver through their defenses. What is inexplicable is the time delay between discovery and disclosure
  •  
    The article breaks down Data Privacy in the Travel Industry. It explains how the pause due to the pandemic is a good time to address security concerns. The article covers examples in the cruise sector, the airline sector and the hotel sector. It also warns companies that it shouldn't collect what it cant protect.
mandalysha

How Hotels Can Drive Increased Revenue and Loyalty By Offering a Reciprocal Value Excha... - 1 views

  • As privacy concerns related to data capture reach a fever pitch, consumer data – perhaps better described as the critical currency which powers personalization – is becoming a protected commodity.
  • Over time, privacy and personal data protection concerns began competing with consumer desire for a data-driven, personalized experience.
  • Industries like hospitality, which rely on retrieving traveler information to curate more relevant messaging, offers, experiences, and loyalty rewards, must adjust their approach.
  • ...5 more annotations...
  • Data is valuable, and it’s due time for hotel operators to establish a two-way value exchange that incentives guests to readily share their information to unlock a heightened experience.
  • hotels cannot offer a great guest experience without prioritizing data protection and transparency; one tier of service (personalization) cannot come at the expense of another (privacy and consent)
  • If hotels elevate their efforts to meet guests’ expectations for customized offers and experiences, and treat personalization as a strategic priority, they will see immediate benefits that deliver long-term results.
  • 80% of consumers are willing to share personal data to earn loyalty program benefits. 70% of consumers are willing to share their data to receive special discounts and offers. 71% of consumers will shop more often with brands or retailers that personalize their communications.
  • Next-generation technology sets the stage for this dynamic by allowing hospitality brands to offer their guests data control and value in a seamless, scalable fashion.
  •  
    With privacy being a concern in the hospitality industry, hotels are incentivizing a customer sharing information with a heightened personalized experience. Customers are willing to share personal data to earn loyalty program benefits, receive special discounts and offers, and will shop more often with those brands that personalize their communications.
  •  
    Even though we are aware that generally, individuals are more inclined to do things when there are benefits to them, this new exchange of data for access to certain benefits has now placed that transaction at the forefront of my mind. This is because schemes are not being applied to secretly obtain customers' personal data, but rather the customers are willing to share them. This exchange is beneficial to guests since they earn travelers' consent, unlock richer experiences, better service, and high long-term loyalty. In my opinion, this is a fair trade. Thanks for sharing this article on "How Hotels Can Drive Increased Revenue and Loyalty By Offering a Reciprocal Value Exchange with Guests."
1 - 20 of 204 Next › Last »
Showing 20 items per page