Identity in the Information Society 3 (2):295-318 (2010)
AbstractMorgan et al. examine the notion of corporate citizenship and suggest that for it to be effective companies need to minimize harm and maximize benefits through its activities and, in so doing, take account of and be responsive to a full range of stakeholders. Specifically, they call for a “next generation” approach to corporate citizenship that embeds structures, systems, processes and policies into and across the company’s value chain. We take this notion of corporate citizenship and apply it to Privacy by Design concepts in a value chain model. Privacy by Design is comprised of Seven Foundational Principles, and as we develop the Privacy by Design Value Chain, those principles are incorporated. First, we examine the primary activities in the value chain and consider each of these seven principles, and then we extend the analysis to the support activities. Finally, we consider privacy implications and the challenges to be faced in supply chain and federated environments. Designing privacy into the value chain model is a practical, business view of organizational and privacy issues. This puts privacy where it belongs in an organization—everywhere personal information exists. We conclude that further research is needed to consider the internal stakeholders’ communications among the various departments within an organization with the goal of better communications and shared values, and we believe the value chain approach helps to further this research agenda. Also, federated environments necessitate that organizations can “trust” their third parties providers. Research and case studies are needed regarding how these organizations can create value and competitive advantages by voluntarily providing their customers with privacy practice compliance reports. For the most part, the future is bright for the protection of personal information because solutions, not problems are being proposed, researched, developed and implemented.
Similar books and articles
Privacy by Design: Delivering the Promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
A Pragmatic Approach to Privacy Risk Optimization: Privacy by Design for Business Practices. [REVIEW]Terry McQuay & Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):379-396.
Privacy by Design: The Definitive Workshop. A Foreword by Ann Cavoukian, Ph.D. [REVIEW]Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):247-251.
Privacy in the Information Age: Stakeholders, Interests and Values. [REVIEW]Lucas Introna & Athanasia Pouloudi - 1999 - Journal of Business Ethics 22 (1):27 - 38.
Designing Databases That Enhance People’s Privacy Without Hindering Organizations: Towards Informational Self-Determination.Thomas B. Hodel-Widmer - 2006 - Ethics and Information Technology 8 (1):3-15.
Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
Strengthening Uniform Privacy Principles: An Analysis of the Alrc's Proposed Principles.Graham Greenleaf, Nigel Waters & Lee A. Bygrave - unknown
Biobank Research and the Right to Privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
Health Information: Reconciling Personal Privacy with the Public Good of Human Health. [REVIEW]Lawrence O. Gostin - 2001 - Health Care Analysis 9 (3):321-335.
Online Privacy as a Corporate Social Responsibility: An Empirical Study.Irene Pollach - 2011 - Business Ethics, the Environment and Responsibility 20 (1):88-102.
PETs and Their Users: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. [REVIEW]Seda Gürses - 2010 - Identity in the Information Society 3 (3):539-563.
Added to PP
Historical graph of downloads