Information Privacy - Protecting Privacy in Information Systems

Protecting Privacy in Information Systems

As heterogeneous information systems with differing privacy rules are interconnected and information is shared, policy appliances will be required to reconcile, enforce and monitor an increasing amount of privacy policy rules (and laws). There are two categories of technology to address privacy protection in commercial IT systems: communication and enforcement.

Policy Communication
  • P3P - The Platform for Privacy Preferences. P3P is a standard for communicating privacy practices and comparing them to the preferences of individuals.
Policy Enforcement
  • XACML - The Extensible Access Control Markup Language together with its Privacy Profile is a standard for expressing privacy policies in a machine-readable language which a software system can use to enforce the policy in enterprise IT systems.
  • EPAL - The Enterprise Privacy Authorization Language is very similar to XACML, but is not yet a standard.
  • WS-Privacy - "Web Service Privacy" will be a specification for communicating privacy policy in web services. For example, it may specify how privacy policy information can be embedded in the SOAP envelope of a web service message.
Protecting Privacy on the Internet

On the internet you almost always give away a lot of information about yourself: Unencrypted e-mails can be read by the administrators of the e-mail server, if the connection is not encrypted (no https), and also the internet service provider and other parties sniffing the traffic of that connection are able to know the contents. Furthermore, the same applies to any kind of traffic generated on the internet (webbrowsing, instant messaging, ...) In order not to give away too much personal information, e-mails can be encrypted and browsing of webpages as well as other online activities can be done traceless via anonymizers, or, in cases those are not trusted, by open source distributed anonymizers, so called mix nets. Renowned open-source mix nets are I2P - The Anonymous Network or tor.

Read more about this topic:  Information Privacy

Famous quotes containing the words protecting, privacy, information and/or systems:

    The manufacturing corporation, except in comparatively few instances, no longer represents a protecting care, a parental influence, over its operatives. It is too often a soulless organization; and its members forget that they are morally responsible for the souls and bodies, as well as for the wages, of those whose labor is the source of their wealth.
    Harriet H. Robinson (1825–1911)

    All violations of essential privacy are brutalizing.
    Katharine Fullerton Gerould (1879–1944)

    Information networks straddle the world. Nothing remains concealed. But the sheer volume of information dissolves the information. We are unable to take it all in.
    Günther Grass (b. 1927)

    Before anything else, we need a new age of Enlightenment. Our present political systems must relinquish their claims on truth, justice and freedom and have to replace them with the search for truth, justice, freedom and reason.
    Friedrich Dürrenmatt (1921–1990)