SlideShare a Scribd company logo
1 of 3
Frequent Buyer Program<br />This is an information age where everybody relies on information. Everybody wants information about people - be it for business purpose, for keeping record or any other purpose. The businesses are modernizing with the world and thus with their business techniques and tactics. With the development of technology it is easy to keep record of individual. To take an example – you just provide your phone number to a phone company, it provides you all your call history and all the problems and solution related with that phone number. This arise a very important issue called “privacy”. Privacy issues are important because they affect all individual. <br />Let us take an example and be specific. In departmental stores, Safeway is a grocery store chain which uses a program called club card in which if a customer agrees to become the member of the store and provide their personal information, they provide them some sort of card like club card, loyalty card, membership card which can be used for discount while buying goods from them. To get the card each customers have to fill out the form which includes name, address, telephone number or billing information and in return they provide card with bar code in which all their information are stored. So each time whenever they buy anything if they have card they show it to attendant who scan it along with the thing one has purchased. It records everything date, time, quantity and record in the database which they can use it evaluates the customer what is his/her interest is what she frequently buys. We even don’t need any ID to become member of any club we can just give our telephone number (or someone else number).<br />Whenever we scan our membership card/club card assuming that we would get some kind of discount not knowing that instead we are providing them our personal information and allowing them to record in their database about what we bought. However in reality, the fact is different. We don’t get any discount; they raise the price of the product than their actual price. Customers who don’t have membership card have to pay much more than its actual price. Main target of the store is to profile and target their customers more accurately rather than giving some savings. <br />Most people think that companies keep their data private and it is only to benefit the customer.  This is not true, as of today there are no laws stating what a company may or may not do with this information, after all, you voluntarily signed for the card and presented it to the cashier upon checkout. In fact, there has actually been a case where the information collected on a particular customer has been used against him in court. Like for example firefighter, Philip Scott Lyons was arrested and charged with attempted arson. Police alleged that Lyons tried to set fire to his own house while his wife and children were inside and the evidence used against his arrest was the record of his supermarket purchases that he made with his Safeway Club Card. Police investigators had discovered that his Club Card was used to buy fire starters of the same type that was used in the arson attempt.<br />Private information could be sold illegally and there is potential risk for identity theft. Identity theft is one of the risks that may arise through implementation of this technology. Identity thief may pay a store employee for information about us that appears on an application for goods or services. With our information they may apply for credit card, they can misuse our information and take benefit from us. Main issue raised in this article is how safe it is to be member of such frequent buyer program. How they use our information for our benefit as well as for their own benefit? How they use our purchase record to flourish their business and how they can use that record against us. Privacy issues arise because databases contain lots of information about an individual. Our privacy will not be ours as everybody will knows many things about us. Technology that is being used are like computer, software for examining customer data and provide them deals according to their purchase, database to store all the information, card with bar code, scanner or card reader. Internet is being used for online shopping and use card to take advantage of deals. Before use of technology the cash register can record amount of purchases and didn’t record about who bought what. It was not easy to track the purchase of each customer but now since every transaction is recorded in database due to which it is easy to trace customers. Companies can now directly market to greater amounts of people and build customer loyalty and relationship. <br />Similar program to frequent buyer program is electronic toll road technology. The objective of an electronic road toll system is to reduce traffic congestion, increase convenience and safety. The vehicles do not have to slow down or stop to pay the tolls, so it increases the overall efficiency. But while looking for our convenience we don’t see that every movement is being recorded which results in loss of privacy. The electronic road toll system creates large personal information database that could be useful to the government and the private industry. Vehicle tracking information could become important in many court cases, such as criminal investigations, work compensation and personal disputes. The government can have access to private information such as date and time and the route vehicle took. <br />So, the impact of data collection could be far more disturbing. Like using cards, they can track purchase histories, segment customers into groups based on how much and how often they purchase. Such information will help stores target profitable customers and supply their needs. This information’s about our shopping habits can be accessed with a subpoena or warrant and used against us in court proceedings. Companies that collect information from places like supermarkets can sell the information to insurance company, Credit Card Company. They can match up our shopping history with database from other databases or public records like how much we paid for our house, what we purchase and can use it to decide about our insurance etc. There are the possibilities that hacker and cracker can break into database creating threat to our privacy.<br />Even though Safeway insists that the data they collect is kept private, but there are no laws that state Safeway cannot sell this information to marketers/companies or even use it against you. Our personal information can be easily compromised and appropriated by others for illicit use. So to avoid becoming a victim, we must be careful in protecting our identity, and care should be taken when providing our name and address to, as well as other information relating to us.<br />References<br />http://www.dbmarketing.com/articles/Art144.htm<br />http://couponing.about.com/od/groceryzone/a/disccards.htm <br />http://couponing.about.com/od/groceryzone/a/loyaltyprograms.htm <br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm <br />http://couponing.about.com/gi/o.htm?zi=1/XJ&zTi=1&sdn=couponing&cdn=money&tm=6168&f=10&su=p284.9.336.ip_&tt=2&bt=1&bts=0&zu=http://www.consumeraffairs.com/news04/2005/loyalty_cards2.html <br />http://www.consumeraffairs.com/news04/2005/loyalty_cards.hhtm <br />http://www.safeway.com/IFL/Grocery/Privacy-Policy <br />http://www.walgreens.com/topic/help/generalhelp/privacyandsecurity.jsp <br />http://www.schneier.com/blog/archives/2005/02/security_risks.html <br />http://archive.seattlepressonline.com/article-9715.html<br />http://www.nocards.org/savings/regular_price_study.shtml<br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm<br />http://www.nocards.org/overview/index.shtml<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26301<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26340<br />http://bhc3.wordpress.com/2009/02/23/data-privacy-data-ownership-and-who-you-trust/<br />http://www.seattlepi.com/local/70072_loyal11.asp<br />http://www.accessmylibrary.com/article-1G1-19018304/supermarket-loyalty-cards-can.html<br />
Frequent Buyer Privacy Risks
Frequent Buyer Privacy Risks

More Related Content

What's hot

ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name- Mark - Fullbright
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerceAleeza Haya
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Donald E. Hester
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
E cigarettes Merchant Account
E cigarettes Merchant AccountE cigarettes Merchant Account
E cigarettes Merchant AccountHighRisk Gateways
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraudshreemala1
 
Id Theft
Id TheftId Theft
Id Theftmojo_5
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 
Ecommerce types and payment models
Ecommerce types and payment modelsEcommerce types and payment models
Ecommerce types and payment modelsNiharika Gupta
 
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Prepaid Card Fraud:  Understanding the Problem, Developing a SolutionPrepaid Card Fraud:  Understanding the Problem, Developing a Solution
Prepaid Card Fraud: Understanding the Problem, Developing a SolutionChristopher Uriarte
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97alessio d
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
BITCOIN’S WINNING SHOPPERS IN TAIWAN WITH THIS RETAIL GIANT’S HELP
BITCOIN’S WINNING SHOPPERS IN TAIWAN WITH THIS RETAIL GIANT’S HELPBITCOIN’S WINNING SHOPPERS IN TAIWAN WITH THIS RETAIL GIANT’S HELP
BITCOIN’S WINNING SHOPPERS IN TAIWAN WITH THIS RETAIL GIANT’S HELPSteven Rhyner
 

What's hot (20)

ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerce
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
E cigarettes Merchant Account
E cigarettes Merchant AccountE cigarettes Merchant Account
E cigarettes Merchant Account
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Id Theft
Id TheftId Theft
Id Theft
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Ecommerce types and payment models
Ecommerce types and payment modelsEcommerce types and payment models
Ecommerce types and payment models
 
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Prepaid Card Fraud:  Understanding the Problem, Developing a SolutionPrepaid Card Fraud:  Understanding the Problem, Developing a Solution
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
BITCOIN’S WINNING SHOPPERS IN TAIWAN WITH THIS RETAIL GIANT’S HELP
BITCOIN’S WINNING SHOPPERS IN TAIWAN WITH THIS RETAIL GIANT’S HELPBITCOIN’S WINNING SHOPPERS IN TAIWAN WITH THIS RETAIL GIANT’S HELP
BITCOIN’S WINNING SHOPPERS IN TAIWAN WITH THIS RETAIL GIANT’S HELP
 

Viewers also liked

Ipanema Philippines Collection Pairing For Philippine Fashion Week 2012
Ipanema Philippines Collection Pairing For Philippine Fashion Week 2012Ipanema Philippines Collection Pairing For Philippine Fashion Week 2012
Ipanema Philippines Collection Pairing For Philippine Fashion Week 2012Ryan Joson-Vargas
 
Aalekhan Presentation
Aalekhan PresentationAalekhan Presentation
Aalekhan Presentationhimkik
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertyaamatya
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source softwareaamatya
 
Chapter5 freesoftware
Chapter5 freesoftwareChapter5 freesoftware
Chapter5 freesoftwareaamatya
 
Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1aamatya
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Viewers also liked (9)

Ipanema Philippines Collection Pairing For Philippine Fashion Week 2012
Ipanema Philippines Collection Pairing For Philippine Fashion Week 2012Ipanema Philippines Collection Pairing For Philippine Fashion Week 2012
Ipanema Philippines Collection Pairing For Philippine Fashion Week 2012
 
Aalekhan Presentation
Aalekhan PresentationAalekhan Presentation
Aalekhan Presentation
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
Chapter5 freesoftware
Chapter5 freesoftwareChapter5 freesoftware
Chapter5 freesoftware
 
Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1
 
Ethics
EthicsEthics
Ethics
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Frequent Buyer Privacy Risks

Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Vesta Corporation
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber securitynahinworld
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Technology makes us a marketing tool
Technology makes us a marketing toolTechnology makes us a marketing tool
Technology makes us a marketing toolrandomacca
 
Managing and sharing customer data
Managing and sharing customer dataManaging and sharing customer data
Managing and sharing customer dataSHARATH P G
 
The Times 3 December 2015
The Times 3 December 2015The Times 3 December 2015
The Times 3 December 2015Kurt Rowe
 
Lab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxLab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxDIPESH30
 
Social profiling scott moore
Social profiling scott mooreSocial profiling scott moore
Social profiling scott mooreScott Moore
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1Lawrence Norman
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolutionDan Brookman
 
The lecturer
The lecturerThe lecturer
The lecturerndifuna
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelAbhijeet Kelkar
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Vivastream
 
LoginRadius Toronto Identity Meetup November 2019
LoginRadius Toronto Identity Meetup November 2019LoginRadius Toronto Identity Meetup November 2019
LoginRadius Toronto Identity Meetup November 2019Bimal Parmar
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 

Similar to Frequent Buyer Privacy Risks (20)

Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
 
Latest business trends in e commerce market
Latest business trends in e commerce marketLatest business trends in e commerce market
Latest business trends in e commerce market
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Technology makes us a marketing tool
Technology makes us a marketing toolTechnology makes us a marketing tool
Technology makes us a marketing tool
 
Managing and sharing customer data
Managing and sharing customer dataManaging and sharing customer data
Managing and sharing customer data
 
The Times 3 December 2015
The Times 3 December 2015The Times 3 December 2015
The Times 3 December 2015
 
Lab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxLab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docx
 
Social profiling scott moore
Social profiling scott mooreSocial profiling scott moore
Social profiling scott moore
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1
 
E commerce
E commerceE commerce
E commerce
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolution
 
E commerce
E commerceE commerce
E commerce
 
The lecturer
The lecturerThe lecturer
The lecturer
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
 
LoginRadius Toronto Identity Meetup November 2019
LoginRadius Toronto Identity Meetup November 2019LoginRadius Toronto Identity Meetup November 2019
LoginRadius Toronto Identity Meetup November 2019
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 

Frequent Buyer Privacy Risks

  • 1. Frequent Buyer Program<br />This is an information age where everybody relies on information. Everybody wants information about people - be it for business purpose, for keeping record or any other purpose. The businesses are modernizing with the world and thus with their business techniques and tactics. With the development of technology it is easy to keep record of individual. To take an example – you just provide your phone number to a phone company, it provides you all your call history and all the problems and solution related with that phone number. This arise a very important issue called “privacy”. Privacy issues are important because they affect all individual. <br />Let us take an example and be specific. In departmental stores, Safeway is a grocery store chain which uses a program called club card in which if a customer agrees to become the member of the store and provide their personal information, they provide them some sort of card like club card, loyalty card, membership card which can be used for discount while buying goods from them. To get the card each customers have to fill out the form which includes name, address, telephone number or billing information and in return they provide card with bar code in which all their information are stored. So each time whenever they buy anything if they have card they show it to attendant who scan it along with the thing one has purchased. It records everything date, time, quantity and record in the database which they can use it evaluates the customer what is his/her interest is what she frequently buys. We even don’t need any ID to become member of any club we can just give our telephone number (or someone else number).<br />Whenever we scan our membership card/club card assuming that we would get some kind of discount not knowing that instead we are providing them our personal information and allowing them to record in their database about what we bought. However in reality, the fact is different. We don’t get any discount; they raise the price of the product than their actual price. Customers who don’t have membership card have to pay much more than its actual price. Main target of the store is to profile and target their customers more accurately rather than giving some savings. <br />Most people think that companies keep their data private and it is only to benefit the customer.  This is not true, as of today there are no laws stating what a company may or may not do with this information, after all, you voluntarily signed for the card and presented it to the cashier upon checkout. In fact, there has actually been a case where the information collected on a particular customer has been used against him in court. Like for example firefighter, Philip Scott Lyons was arrested and charged with attempted arson. Police alleged that Lyons tried to set fire to his own house while his wife and children were inside and the evidence used against his arrest was the record of his supermarket purchases that he made with his Safeway Club Card. Police investigators had discovered that his Club Card was used to buy fire starters of the same type that was used in the arson attempt.<br />Private information could be sold illegally and there is potential risk for identity theft. Identity theft is one of the risks that may arise through implementation of this technology. Identity thief may pay a store employee for information about us that appears on an application for goods or services. With our information they may apply for credit card, they can misuse our information and take benefit from us. Main issue raised in this article is how safe it is to be member of such frequent buyer program. How they use our information for our benefit as well as for their own benefit? How they use our purchase record to flourish their business and how they can use that record against us. Privacy issues arise because databases contain lots of information about an individual. Our privacy will not be ours as everybody will knows many things about us. Technology that is being used are like computer, software for examining customer data and provide them deals according to their purchase, database to store all the information, card with bar code, scanner or card reader. Internet is being used for online shopping and use card to take advantage of deals. Before use of technology the cash register can record amount of purchases and didn’t record about who bought what. It was not easy to track the purchase of each customer but now since every transaction is recorded in database due to which it is easy to trace customers. Companies can now directly market to greater amounts of people and build customer loyalty and relationship. <br />Similar program to frequent buyer program is electronic toll road technology. The objective of an electronic road toll system is to reduce traffic congestion, increase convenience and safety. The vehicles do not have to slow down or stop to pay the tolls, so it increases the overall efficiency. But while looking for our convenience we don’t see that every movement is being recorded which results in loss of privacy. The electronic road toll system creates large personal information database that could be useful to the government and the private industry. Vehicle tracking information could become important in many court cases, such as criminal investigations, work compensation and personal disputes. The government can have access to private information such as date and time and the route vehicle took. <br />So, the impact of data collection could be far more disturbing. Like using cards, they can track purchase histories, segment customers into groups based on how much and how often they purchase. Such information will help stores target profitable customers and supply their needs. This information’s about our shopping habits can be accessed with a subpoena or warrant and used against us in court proceedings. Companies that collect information from places like supermarkets can sell the information to insurance company, Credit Card Company. They can match up our shopping history with database from other databases or public records like how much we paid for our house, what we purchase and can use it to decide about our insurance etc. There are the possibilities that hacker and cracker can break into database creating threat to our privacy.<br />Even though Safeway insists that the data they collect is kept private, but there are no laws that state Safeway cannot sell this information to marketers/companies or even use it against you. Our personal information can be easily compromised and appropriated by others for illicit use. So to avoid becoming a victim, we must be careful in protecting our identity, and care should be taken when providing our name and address to, as well as other information relating to us.<br />References<br />http://www.dbmarketing.com/articles/Art144.htm<br />http://couponing.about.com/od/groceryzone/a/disccards.htm <br />http://couponing.about.com/od/groceryzone/a/loyaltyprograms.htm <br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm <br />http://couponing.about.com/gi/o.htm?zi=1/XJ&zTi=1&sdn=couponing&cdn=money&tm=6168&f=10&su=p284.9.336.ip_&tt=2&bt=1&bts=0&zu=http://www.consumeraffairs.com/news04/2005/loyalty_cards2.html <br />http://www.consumeraffairs.com/news04/2005/loyalty_cards.hhtm <br />http://www.safeway.com/IFL/Grocery/Privacy-Policy <br />http://www.walgreens.com/topic/help/generalhelp/privacyandsecurity.jsp <br />http://www.schneier.com/blog/archives/2005/02/security_risks.html <br />http://archive.seattlepressonline.com/article-9715.html<br />http://www.nocards.org/savings/regular_price_study.shtml<br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm<br />http://www.nocards.org/overview/index.shtml<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26301<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26340<br />http://bhc3.wordpress.com/2009/02/23/data-privacy-data-ownership-and-who-you-trust/<br />http://www.seattlepi.com/local/70072_loyal11.asp<br />http://www.accessmylibrary.com/article-1G1-19018304/supermarket-loyalty-cards-can.html<br />