E-Mail and the Law: How to Manage Privacy Issues Using the AICPA/CICA Framework

By Leizerov, Sagi | Journal of Accountancy, August 2004 | Go to article overview

E-Mail and the Law: How to Manage Privacy Issues Using the AICPA/CICA Framework


Leizerov, Sagi, Journal of Accountancy


Companies that market their products and services through e-mail face a new challenge the need to comply with privacy and spare (often defined as unsolicited bulk e-mail) regulations. Those that invest in building and preserving consumer trust cannot afford to ignore these laws for two primary reasons: the possibility of consumer alienation and the risk of breaking privacy laws, thus incurring penalties. This article explains how CPAs can help implement e-mail programs that reduce compliance risks by using the privacy framework developed jointly by the AICPA and the Canadian Institute of Chartered Accountants (CICA).

The AICPA/CICA Privacy Framework provides criteria for protecting the privacy of consumer information. It incorporates concepts from significant domestic and international privacy laws, regulations and guidelines. In this article CPAs will learn how to apply the framework to create privacy-and compliance-based e-mail programs.

NEW COMPLIANCE RULES

The emergence of spam-related regulations--the U.S. Controlling the Assault of N on-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003 and the Electronic Directive on Privacy and Electronic Communication implemented (with country-specific variations) in the 25 European Union (EU) countries--has cast a wide net of compliance over the use of e-mail for commercial purposes. The rules affect any company that advertises its products or services in any e-mail message, in other words they apply whether you are a spammer sending thousands of e-mails to complete strangers with attractive propositions for remortgaging their home or a firm contacting a long-time client about a new service. CPAs should be clear on one important point: Although spam often is associated with mass distribution, unscrupulously obtained lists and shady offers, the scope of the regulations companies now face in the United States and the EU covers even a single e-mail a legitimate company sends to a single business acquaintance or customer.

THE FRAMEWORK CAN HELP

To avoid incurring regulatory penalties companies must apply specific and elaborate privacy controls to the commercial distribution ore-mail. The AICPA/CICA Privacy Framework is a tool CPAs can use to help entities effectively meet this challenge.

Accountants in both industry and public practice can use the framework to guide organizations in developing their email privacy policies. They are in a unique position to provide services that will help companies design, implement, maintain and evaluate their e-mail privacy programs. Such programs will help organizations to

* Mitigate privacy-related risks such as those raised by spam.

* Protect valuable business assets.

* Preserve brand and reputation.

* Maintain customer loyalty.

The framework contains 10 components that are essential to the proper protection and management of customers' personal information. In addition to helping provide companies guidance in implementing privacy programs, the framework also can be viewed more narrowly as a foundation for managing the commercial use of e-mail. The components are based on internationally known fair-information practices included in the privacy laws and regulations of jurisdictions around the world and in common privacy practices. They are

* Management.

* Notice.

* Choice and consent.

* Collection.

* Use and retention.

* Access.

* Disclosure to third parties.

* Security.

* Quality.

* Monitoring and enforcement.

For each component the framework provides relevant, objective, complete and measurable criteria CPAs can use to evaluate and provide value-added services to an entity's privacy policies, communications, procedures and controls.

LAWS ON E-MAIL USE

In recent years governments worldwide have passed regulations in an attempt to curb, if not completely eliminate, span. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

E-Mail and the Law: How to Manage Privacy Issues Using the AICPA/CICA Framework
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.