A pragmatic approach to privacy risk optimization: privacy by design for business practices [Book Review]
David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Identity in the Information Society 3 (2):379-396 (2010)
This paper introduces Nymity’s Privacy Risk Optimization Process (PROP), a process that enables the implementation of privacy into operational policies and procedures, which embodies in Privacy by Design for business practices. The PROP is based on the International Organization for Standardization (ISO) concept that risk can be positive and negative; and further defines Risk Optimization as a process whereby organizations strive to maximize positive risks and mitigate negative ones. The PROP uses these concepts to implement privacy into operational policies and procedures. This paper was produced by Nymity and the Office of the Information and Privacy Commissioner of Ontario, Canada. It was presented by Terry McQuay, President of Nymity, at Privacy by Design: The Definitive Workshop, in Madrid, Spain, on November 2nd, 2009. The workshop was hosted by Dr. Ann Cavoukian, Information and Privacy Commissioner of Ontario, Canada, and Yoram Hacohen, Head of the Israeli Law, Information and Technology Authority.
|Keywords||Data protection Privacy laws Data security Risk management Compliance Risk assessment Management|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Ann Cavoukian, Scott Taylor & Martin E. Abrams (2010). Privacy by Design: Essential for Organizational Accountability and Strong Business Practices. [REVIEW] Identity in the Information Society 3 (2):405-413.
Ann Cavoukian (2010). Privacy by Design: The Definitive Workshop. A Foreword by Ann Cavoukian, Ph.D. [REVIEW] Identity in the Information Society 3 (2):247-251.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. [REVIEW] Identity in the Information Society 3 (2):253-255.
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Julie David & Marilyn Prosch (2010). Extending the Value Chain to Incorporate Privacy by Design Principles. Identity in the Information Society 3 (2):295-318.
Luciano Floridi (2006). Four Challenges for a Theory of Informational Privacy. Ethics and Information Technology 8 (3):109-119.
Irene Pollach (2011). Online Privacy as a Corporate Social Responsibility: An Empirical Study. Business Ethics 20 (1):88-102.
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
Irene Pollach (2005). A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent. [REVIEW] Journal of Business Ethics 62 (3):221 - 235.
Dawn Jutla (2010). Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design. Identity in the Information Society 3 (2):319-341.
Masahiko Mizutani, James Dorsey & James H. Moor (2004). The Internet and Japanese Conception of Privacy. Ethics and Information Technology 6 (2):121-128.
Wade L. Robison (1997). Privacy and Personal Identity. Ethics and Behavior 7 (3):195 – 205.
Alan R. Peslak (2005). An Ethical Exploration of Privacy and Radio Frequency Identification. Journal of Business Ethics 59 (4):327 - 345.
Added to index2010-12-05
Total downloads12 ( #183,461 of 1,696,633 )
Recent downloads (6 months)1 ( #346,145 of 1,696,633 )
How can I increase my downloads?