Google Case Study

Submitted by: Submitted by

Views: 348

Words: 312

Pages: 2

Category: Business and Industry

Date Submitted: 10/30/2012 08:04 PM

Report This Essay

Problem

As Google keeps growing incredibly fast, its user database is also quickly growing larger and larger. Google not only knows all details of user search histories, but also retain these information for some time both for its own purpose of analysing manner of user interest and for federal government’s access. Therefore, people are questioning that whether Google is manipulating or using their sensitive information in a fair way. Such concerns could hurt customers’ trust toward Google’s brand and willingness of using its service. Thus, the issue of privacy has become more serious than ever to Google today.

Recommendation

Google should shape itself as a leader in protecting internet privacy rights. First, it must convince the public that the company has established strict internal privacy policies to prevent abuse of customers’ private information. The company also has to clearly identify what they can and cannot do with the information they gather. Besides, it should keep advancing technologies of security for its data systems. Last but not least, the company should support and involve in government’s creation of new privacy laws.

Rationale

A positive public image helps the company ensure a safe environment for the investors and shareholders. Because of the healthy image, more advertisers and business partners will be willing to use Google’s advertising service. This will also help strengthen public relations and gain more customers and loyalty for the company. The company will take advantages as a standard-maker by involving in establishing standards and regulations for internet privacy.

Implementation

1. Establish a positive image as an ethically and socially responsible company that believes in respecting people’s privacy.

2. Follow the regulations regarding privacy and be a strong supporter of standards for privacy.

3. Clarify the usage of sensitive information with legal permission to public.

4. Give warnings to users when some...