Defending Customer Privacy

In: Business and Management

Submitted By awright
Words 257
Pages 2
Week 6
Customer Relations and Servicing
Professor Benoga
Antoinette Wright
August 17, 2014

Abstract 1. Evaluate the manner in which Keanna handled the situation. What did she do well in the customer situation and what are some errors she inadverntly made? 2. What suggestions could you make to this problem-solving approach, so that future dilemmas of this type have a more customer-oriented and positive solutions?

Body When it comes to this situation Keanna was polite and said what she felt was right. One thing she should have done was apply her focused listening skills. Effective listening skills are essential to “read a situation” correctly (Gibson pp 95). The ability to solve problems, resolve differences, and capture opportunities involves actively listening (Gibson pp 95). If she had applied her listening skills she would have used the avoiding conflict management style. By using that style would have given her more time to gather information. By gathering more information that is when she would have considered the company’s return policy. The first suggestion I would make is listen effectively. By listening properly a CSR can instantly come up with ideas to solve the conflict. Taking the customer to look at other mattresses is using the collaborating style. Both parties are trying to solve the problem together. After finding a better mattress for the customer, that is when they take it to the manager or customer service and the rest would be handled from there.

Gibson, P. (2012). Problem Solving. Mason, OH.…...

Similar Documents

A Company Is (Morally) Allowed Within the Legal Framework to Gain Unlimited Access to Consumer’s Privacy for the Use of Customer Loyalty Programmes.

...A company is (morally) allowed within the legal framework to gain unlimited access to consumer’s privacy for the use of customer loyalty programmes. As a consumer, loyalty to a company is largely based on trust. We expect the company to not abuse it. Firms have the responsibility of delivering quality- this refers both to the product that they deliver, and the customer relations – in order to maintain loyalty. In order to achieve this, customers expect their private information to be kept secure. How much does security matter to a consumer? A survey executed by Edelman show that “70% of people are more concerned about privacy than they were five years ago, and 68% feel they have lost control over how their information is shared and used by businesses.” A study carried out by PriceWaterhouseCoopers shows that, when given the choice, a majority (almost 2/3) of consumers choose to not give out personal information (Data Security, Michael) .These statistics show that the consumer base is extremely distrustful of companies using private information. How come? If we assess the risks and benefits of giving out these details, we can identify the reasons. The main risk is intrusion – an unwelcome look into your life. In theory, giving out personal details to a marketer gives them full access to your personal life. The firm has your name and phone number. It has entry to your Facebook (assuming it isn’t set to private) feed to see what sort of things you like, dislike......

Words: 825 - Pages: 4

Defending Democracy

...this. It seems like when they get up on the pedestal where they have placed themselves they forget about us the little person. I think that everything should be voted on by the people and not just a hand full that seem to have their best interest at heart and not ours. The people should be allowed to vote on things like health care reform, pay freezes and cuts, and pay raises for congress etc. The trouble with things in the past and today is everyone is looking out for themselves and does not give a thought to others. I especially think the next time our government gives millions of dollars to big businesses we should have a vote in it, after all that is our money to start with. Now do not get me wrong I love my country and will die defending it, but let’s be fair about the whole voting thing. We have accomplished much as Americans and the Constitution of the United States is outstanding, but it was drawn up many years ago, maybe it needs revising a bit....

Words: 336 - Pages: 2


..."Information Protection and Privacy" Please respond to the following: Based on the e-Activity, evaluate the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Suggest how the company may have presented the breach and / or responded differently once the breach was discovered. Provide support for your rationale.  Assess the ethical considerations for information privacy, indicating how these considerations should be addressed with a corporate policy. Provide support for your rationale. "Information Protection and Privacy": The word 'privacy' means different things to different people, it affect both personal and business. As individuals, we need some amount of privacy to succeed. As a person we need to protect our thoughts from intruders because if others new our must intimate thoughts they could use that information to manipulate our decision making process. Business, need to protect their trade secret and information they collect from their customer to succeed. My objectives for this week e-activity consist of, evaluating the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Facebook is an online social network that allows users to create detailed online profiles and connect with other users,...

Words: 820 - Pages: 4


...Prabhjot Kaur Engr 310 Ms. Qudrat “Limitations on Privacy” 10.8: find out the your organization’s or institution’s policy with regard to employee e-mail privacy. Defend your opinion of its ethics. Have you ever wondered that you send an email to your friend from your work email address and it gets checked before it actually gets sent? I want to work at Apple Inc. where the email policy is very strict. The email policies have been set in 1988. Each year certain things get added into the policy. I will discuss the policies that have been added, restricted and prohibited. Starting with policies that recently added into the policy. After making a list of policies in 1988 when there was not that much technology. At first time they edited in 1990. The policy that was added to make sure the privacy of the sender and receiver of email address. Privacy means if there’s an issue that customer has with the product and they want to replace the item or get help with it. It is receiver’s job to forward the email to the right person who can help out the customer to receive customer satisfaction. Moving on with restricted policies, there are many restricted policies. Restricted policies are divided into different sub topics. If there are offensive words include in the email. The email will be forwarded to the manager to take a second look of it and then send it to receiver and make sure if its appropriate. Also, there are certain amounts of emails you can save in your Inbox...

Words: 441 - Pages: 2

Defending the Arts

...Defending the Arts 1 Defending the Arts 100/Arts 6/16/14 Defending the Arts 2 Me and my wife have always enjoyed the arts and took and opportunity recently to go see the play “Wicked” in Raleigh N.C.. It has always been one of my wives favorite plays so it ended up being what I wanted us to go see. Wicked is a new twist on the classic tale of the Wizard of Oz. It is a play adaptation of Gregory Maguire's book of the same name. In this retelling, the “wicked” witch is actually the heroine of the story, who starts out as the outcast and is coached by Glinda, her big sister. She begins to be popular, which is expressed in a musical number that was one of my wife's favorite songs in the play. However, she realizes her real desire is not to fall in love and pursue the wizard/witch love story, but to be free. During the play the musical numbers played a huge part in telling the story as well as the movements of the characters. With song it was easy to tell what each character was feeling and meaning to express. The songs also cause you to feel similar feelings to the characters. According to ("2knowmyself", 2006-2011) music is the fastest way to create emotion to the audience. Within seconds you can completely change a listener's emotional state  ("2knowmyself", 2006-2011) . During the song “Defying Gravity” two characters, Glinda the good witch and Elfie the wicked witch, are having an argument about following society and......

Words: 730 - Pages: 3

Privacy had furnished the information in person to our field office representatives or had completed an application and mailed it in to us. In both cases the uses of the information is subject to the provisions of the Privacy Act. The retention period will be the same. If, however, you send us an email, for example as to how we can improve our web site, we will use the information you provide for that purpose only. The identifying information you give us, such as your email address and your name, will not be retained in a Privacy Act system of records, where we can retrieve your suggestion by your name or email address. For statistical purposes, we also collect non-personal information about you. Sometimes we analyze this data to determine customer interest in different parts of our website. The information we share is in a format that does not personally identify anyone. Who We Will Share Your Personal Information With We may disclose information you give us (e.g., to the Social Security Administration, Department of Veteran's Affairs) if authorized or required by Federal Law, such as the Privacy Act, Railroad Retirement Act, or the Railroad Unemployment Insurance Act. Your Choice About Who We Share Your Personal Information With If Federal laws (e.g., Privacy Act, Railroad Retirement Act, or the Railroad Unemployment Insurance Act) does not allow us to share information, we must get your written authorization before we can furnish your information to anyone else....

Words: 448 - Pages: 2


...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University   THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced......

Words: 1783 - Pages: 8


...Privacy ‘The Limits of Privacy’ and ‘The Case for privacy’ are written by Amitai Etzioni and David D. Friedman respectively. Both of them have opposite views about privacy, which Etzioni states that less privacy is good for us and Friedman claims that more privacy makes the world a better place. In this paper, I will argue that Etzioni’s argument fails because privacy is really important for us to protect ourselves. I am going to explain in detail based on three different points in the next three paragraphs. First, in ‘The Limits of Privacy’, Etzioni argues that privacy is not important as many other goods. Based on his argument, he claims that “there are numerous values that trump or take precedence over privacy” (p.254) such as safety. However, I totally disagree his standpoint. Although safety also considers as a part of importance, it does not mean that safety can take priority over privacy consideration. Privacy does have significance effect for us to protect ourselves. Some people may think that it is worth to sacrifice their individual privacy in order to get freedom for safety. Once you give up your own privacy and allow anyone like governments to access to your information freely, your information is disclosed and you cannot get them back anymore. For example, after 9/11 attack in the United States, a lot of new measures about surveillance are introduced. The government can have authorities to wiretap, record or trace orders for email made by all Americans.......

Words: 1250 - Pages: 5

Defending the Arts

...Defending the Arts Tiffany O’Connell ARTS/100 Defending the Arts Art refers to the expression or application of human creative skill and imagination typically in a visual form such as painting and producing works to be appreciated primarily for their beauty or emotional power. They are various branches of creative activity, such as painting, music, literature, and dance. The elements of the composition of the art are used to arrange or organize the components in a way that is pleasing to the artist and, hopefully, the viewer. It helps give structure to the layout and the way the subject is presented. It also encourages or leads the viewer's eye to wander around the whole painting, taking in everything and ultimately coming back to rest on the point. These elements are considered to be unit, balance, rhythm, focus, contrast, pattern, color, line among others. Unit refers to when the parts of the composition feel as if they belong together. Balance is the symmetrical arrangement of objects. It creates a sense of calm when symmetrical and a sense of unease and imbalance where it’s not. Rhythm: just like music, a piece of art has rhythm, a piece of art can have a rhythm or underlying beat that leads and paces the eye as you look at it .Repeated color and shapes creates a rhythm in a paint (Rosenberg 2013). Focus refers to emphasis on a particular object. The viewer's eye may want to rest in the most of the things in the painting,......

Words: 908 - Pages: 4

The Defending of the Arts

...The defending of the arts 100 6/15/2015 BRENDA DURDEN The defending of the arts Recently my family went to an art gallery that had some, many different forms of art that made it so interesting. To view, many of them had much meaning, with a lot of history and culture in the mix within it. Some of the local artists came around, mingle, with the crowd, and explain their art in a more in-depth ways. An art gallery that I went to is in the location of ells square in the city market of Georgia that has a beautiful art gallery with amazing art forms. However, the art piece that stood out to me was from Irene Sainz Mayo the painting call on the lake to the composition elements description. Like the line element on the lake, two painting is curved lines, which the tree line gives off the image within the sky. Drift off towards, the sides of the canvas and the curve line show in the length within the tree line and beyond. The colors united, in the painting. Is the sky is mix with dark and light blue. Also, a combined with a yellow mix, with reddish orange the clouds look grayish black color. The tree lines in this painting are a blackish color. The lake watercolor in this painting is the dark blue mix, with light blue and blended colors of yellow, reddish orange color. The on the lake two painting movement the shape of the paint is two-dimensional space, the element in the paint are organic and geometric shapes distance within the canvas .The theme of this......

Words: 979 - Pages: 4

Defending the Arts

...Defending the Arts What is art? Art can mean many things to many people. For me, the arts are an expression of one's imagination, the ability to create so that others can enjoy. There are different kinds of art. Art could come in the form of paintings, sculptor, poetry, music, or theater to name a few. Art makes you feel; it makes you think. . Art in some shape or form has existed as long as humans. Art surrounds our daily lives and is present all around the world. Love and Anguish What do you think of when someone mentions Miami? Beautiful beaches, beautiful people, vibrant nightlife, and fun in the sun. I'm a native of Florida and had no idea Miami is home to one of the most dramatic heartfelt memorial. The memorial is to honor the millions of lives that were lost and to those who survived. The Holocaust Memorial of the Greater Miami Jewish Federation (Miami, FL) is a must to see if you are ever in Miami. There is one particular piece that I will be telling you about that made the most impact on me that day. It is a sculptor designed and created by Kenneth Triester. His memorial art piece is called the Sculpture of Love and Anguish (Holocaust Memorial Miami Beach, 1990). You walk upon a bronze sculpture that stands at 42-feet. Its outstretched arm marked with the symbolic numbers from prison camp is reaching towards the sky. It is what you see at the base working its way up the arm to the sky that gets to you. There are life-sized bronze figures placed......

Words: 607 - Pages: 3


...Are Law Enforcement Cameras an Invasion of Privacy? Are law enforcement and government cameras become a real threat to our privacy? In today's society, we've become accustomed to being tracked; complacent really. Many can't decide if this is a legitimate way to keep us secure, or just another move by the government to gain control. We are monitored with traffic cameras, police dashboard and body cameras, location services on our cell phones and store security cameras. How much is too much? Are we even aware of all the things that we encounter every day that are able to track our every move? Good questions. What will be your paper’s answer? The line is a thin one, that line between privacy and feeling as though we're in a fish bowl with people watching our every move. I think that TV shows such as "Person of Interest" that highlight a government system called "The Machine" which uses facial recognition and social security database information to warn the good guys of who is in danger based on a series of data information it compiled to determine their risk rating based on movements of both the target and the aggressor. While I believe this show only proves to ramp up the paranoid to believe that we live in a society where you're tracked and monitored every step of your day. Some people live with the belief that the police and government agencies truly are watching our every move, even in our own homes. And are they? What does the research say? While a little far......

Words: 1169 - Pages: 5

Defending the Arts

...Defending the Arts Trouble Carter ARTS/100 1-18-2016 Doris Doyon Defending the Arts I recently attended a college Step Show in my community a few months ago. Step Shows showcase multiple teams who stomp, clap, dance, shout, and ignite the audience. I have been viewing Step Shows since my first year in high school. I frequent Step Shows due to the electrifying energy that the step teams display. These teams work hard to perfect their artwork of expression. Some of them even employ professional dancers to assist with the stage shows. Just like painters or sculptors, step teams provide messages and creative expression in every performance. Stepping is a growing art form and an important part of our country’s artistic and cultural heritage. In stepping, the body is used as an instrument. The body motion and movement is part of the story. The step teams maneuver in synchronized progressions to create intricate rhythms through a plethora of footsteps, claps and the spoken word (Degregory PHD, 2015). The winner of the Step Show approached the stage wearing clown outfits including colorful masked faces. The clown outfits mislead the audience to expect a clumsy, unorganized show. We received the exact opposite. The winning step team was well organized and choreographed, regardless of their clown suits. They brought the crowd to their feet with “call and response” chants. Moreover, the Step Show entertained me to the fullest. I enjoyed every team’s performance. I get excited...

Words: 721 - Pages: 3

Defending the Defenseless

...1   Defending the Defenseless During the American Revolution, slavery was in the process of being abolished in Europe and in the Northern states of America. Even though parts of the world were willing to free slaves, the Southern states found ways to defend slavery. In Paul Finkelman’s book Defending Slavery: Proslavery Thought in the Old South, Finkelman provides the writings of many white leaders from the South who believed that slavery was essential to America’s society. The white leaders who spoke about proslavery included a broad range of defenses to justify themselves because they wanted Americans to believe that slavery had a lasting impact economically, religiously, legally, and racially. One of the defenders in Finkelman’s book was Thomas R.R. Cobb. He justified slavery by arguing the effects of abolition in the United States. Cobb said, “The emancipated negroes do not enjoy full and equal civil and political rights in any State in the union, except the State of Vermont” (Finkelman, 79). He was convinced that those who became free of slavery did not live a better life. He believed that any African American slave who is free is not capable of living successfully and “His moral condition compares unfavorably with that of the slave of the South” (Finkleman, 79). This argument states that African Americans who are enslaved are in better hands with the slave owners and therefore they should remain as slaves. Cobb’s defense was justifiable because he...

Words: 1323 - Pages: 6

It Privacy

...Information Technology Practices and Privacy Concerns David Rebovich TS5536 – Ethical and Legal Considerations in Information Technology Professor Gold November 27, 2011 Technology has made it hard to live a life that is truly private. Many devices and services that people use on a daily basis are repositories for private information. Cell phones, with GPS services, can be helpful, but can also be used by authorities to track a person’s location. Social networking sites make it easy to stay in touch with people, but they also store personal information, and activity history that can be subpoenaed and used against a person if they are ever accused of a crime. Facebook postings in March, 2011 led to the arrest of one of the five suspects in the killing of a teenager in Queens New York. Anthony Collao, 18, was killed after attending a birthday party that was being hosted by gay hosts. The five suspects crashed the party, made slurs, and caused Collao, who was not gay, to leave because of the impending trouble. Collao, after leaving, was chased, beaten and killed, by the suspects. A fifth suspect charged in the fatal beating of a teen in Queens bragged about the attack in anti-gay Facebook postings, law enforcement sources said. (Mark Morales, 2011) The Patriot Act, signed into law shortly after the terrorist events of September 11, 2001, has the ability to be interpreted, by lawmakers, to allow the use of cell phone tracking by government agencies on......

Words: 1123 - Pages: 5