Privacy by Design: essential for organizational accountability and strong business practices [Book Review]
David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Identity in the Information Society 3 (2):405-413 (2010)
An accountability-based privacy governance model is one where organizations are charged with societal objectives, such as using personal information in a manner that maintains individual autonomy and which protects individuals from social, financial and physical harms, while leaving the actual mechanisms for achieving those objectives to the organization. This paper discusses the essential elements of accountability identified by the Galway Accountability Project, with scholarship from the Centre for Information Policy Leadership at Hunton & Williams LLP. Conceptual Privacy by Design principles are offered as criteria for building privacy and accountability into organizational information management practices. The authors then provide an example of an organizational control process that uses the principles to implement the essential elements. Initially developed in the ‘90s to advance privacy-enhancing information and communication technologies, Dr. Ann Cavoukian has since expanded the application of Privacy by Design principles to include business processes
|Keywords||Fair information practices Organizational accountability Privacy by Design Privacy assurance|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
Ugo Pagallo (2013). Online Security and the Protection of Civil Rights: A Legal Overview. [REVIEW] Philosophy and Technology 26 (4):381-395.
Ugo Pagallo (2011). ISPs & Rowdy Web Sites Before the Law: Should We Change Today's Safe Harbour Clauses? Philosophy and Technology 24 (4):419-436.
U. Pagallo (2012). Cracking Down on Autonomy: Three Challenges to Design in IT Law. [REVIEW] Ethics and Information Technology 14 (4):319-328.
Anders Nordgren (2013). Privacy by Design in Personal Health Monitoring. Health Care Analysis:1-17.
Anders Nordgren (2012). Remote Monitoring or Close Encounters? Ethical Considerations in Priority Setting Regarding Telecare. Health Care Analysis (4):1-15.
Similar books and articles
Terry McQuay & Ann Cavoukian (2010). A Pragmatic Approach to Privacy Risk Optimization: Privacy by Design for Business Practices. [REVIEW] Identity in the Information Society 3 (2):379-396.
Ann Cavoukian (2010). Privacy by Design: The Definitive Workshop. A Foreword by Ann Cavoukian, Ph.D. [REVIEW] Identity in the Information Society 3 (2):247-251.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. [REVIEW] Identity in the Information Society 3 (2):253-255.
Julie David & Marilyn Prosch (2010). Extending the Value Chain to Incorporate Privacy by Design Principles. Identity in the Information Society 3 (2):295-318.
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Ann Cavoukian, Jules Polonetsky & Christopher Wolf (2010). SmartPrivacy for the Smart Grid: Embedding Privacy Into the Design of Electricity Conservation. [REVIEW] Identity in the Information Society 3 (2):275-294.
Alan R. Peslak (2005). An Ethical Exploration of Privacy and Radio Frequency Identification. Journal of Business Ethics 59 (4):327 - 345.
Kathleen A. Wallace (1999). Anonymity. Ethics and Information Technology 1 (1):21-31.
Thomas B. Hodel-Widmer (2006). Designing Databases That Enhance People's Privacy Without Hindering Organizations. Ethics and Information Technology 8 (1):3-15.
Rae André (2010). Assessing the Accountability of Government-Sponsored Enterprises and Quangos. Journal of Business Ethics 97 (2):271 - 289.
Jonathan Schonscheck (1997). Privacy and Discrete "Social Spheres". Ethics and Behavior 7 (3):221 – 228.
Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu (2007). Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices. Journal of Business Ethics 73 (2):145 - 160.
Dawn Jutla (2010). Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design. Identity in the Information Society 3 (2):319-341.
Lawrence O. Gostin (2001). Health Information: Reconciling Personal Privacy with the Public Good of Human Health. [REVIEW] Health Care Analysis 9 (3):321-335.
Irene Pollach (2011). Online Privacy as a Corporate Social Responsibility: An Empirical Study. Business Ethics 20 (1):88-102.
Added to index2010-12-05
Total downloads17 ( #111,074 of 1,410,540 )
Recent downloads (6 months)4 ( #58,228 of 1,410,540 )
How can I increase my downloads?