Privacy Management in Global Organisations

In this paper it is considered how meeting privacy requirements can be challenging for global organisations, particularly where future Internet service provision models are involved. Approaches will be explained that can be used to help address these issues, with a focus on some of the innovative solutions that the author has been involved in developing in HP Labs that are currently being used, rolled out or are the subjects of further research.

[1]  American Statisticai Assobiation American Institute of Certified Public Accountants (AICPA) , 2018, The Grants Register 2021.

[2]  A. Anonymous,et al.  Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy , 2013, J. Priv. Confidentiality.

[3]  Radu State,et al.  Data Privacy Management and Autonomous Spontaneous Security , 2013, Lecture Notes in Computer Science.

[4]  Siani Pearson,et al.  Privacy, Security and Trust in Cloud Computing , 2013 .

[5]  Jan Camenisch,et al.  Information privacy?! , 2012, Comput. Networks.

[6]  Siani Pearson,et al.  Privacy Management in Global Organisations , 2012, Communications and Multimedia Security.

[7]  A. Cavoukian Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era , 2012 .

[8]  Siani Pearson,et al.  A Decision Support System for Privacy Compliance , 2012 .

[9]  Bu-Sung Lee,et al.  Towards Achieving Accountability, Auditability and Trust in Cloud Computing , 2011, ACC.

[10]  Siani Pearson,et al.  Privacy Compliance Checking using a Model-Based Approach , 2011 .

[11]  Siani Pearson,et al.  Enhancing privacy in cloud computing via policy-based obfuscation , 2012, The Journal of Supercomputing.

[12]  S. Qureshi,et al.  E-Business Applications for Product Development and Competitive Growth: Emerging Technologies , 2010 .

[13]  Andrew Charlesworth,et al.  Analysis of Privacy Impact Assessments within Major jurisdictions , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[14]  Siani Pearson Addressing Complexity in a Privacy Expert System , 2010, IPMU.

[15]  A. Cavoukian,et al.  Privacy by Design: essential for organizational accountability and strong business practices , 2010 .

[16]  Stuart S. Shapiro,et al.  Privacy by design , 2010, Commun. ACM.

[17]  Siani Pearson,et al.  Decision Support for Selection of Cloud Service Providers , 2010 .

[18]  Andrew Charlesworth,et al.  Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.

[19]  Siani Pearson,et al.  Scalable, accountable privacy management for large organizations , 2009, 2009 13th Enterprise Distributed Object Computing Conference Workshops.

[20]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[21]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[22]  James A. Hendler,et al.  Information accountability , 2008, CACM.

[23]  Siani Pearson,et al.  Securing Information Transfer in Distributed Computing Environments , 2008, IEEE Security & Privacy.

[24]  J. Borges,et al.  A TAXONOMY OF PRIVACY , 2006 .

[25]  J. C. Cannon Privacy: What Developers and IT Professionals Should Know , 2004 .

[26]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[27]  Stefanos Gritzalis,et al.  Privacy Enhancing Technologies: A Review , 2003, EGOV.

[28]  Andrew S. Patrick,et al.  From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions , 2003, Privacy Enhancing Technologies.

[29]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[30]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[31]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[32]  J. Rubenfeld The Right of Privacy , 1989 .

[33]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[34]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[35]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .