Information Privacy - Protecting Privacy in Information Systems

Protecting Privacy in Information Systems

As heterogeneous information systems with differing privacy rules are interconnected and information is shared, policy appliances will be required to reconcile, enforce and monitor an increasing amount of privacy policy rules (and laws). There are two categories of technology to address privacy protection in commercial IT systems: communication and enforcement.

Policy Communication
  • P3P - The Platform for Privacy Preferences. P3P is a standard for communicating privacy practices and comparing them to the preferences of individuals.
Policy Enforcement
  • XACML - The Extensible Access Control Markup Language together with its Privacy Profile is a standard for expressing privacy policies in a machine-readable language which a software system can use to enforce the policy in enterprise IT systems.
  • EPAL - The Enterprise Privacy Authorization Language is very similar to XACML, but is not yet a standard.
  • WS-Privacy - "Web Service Privacy" will be a specification for communicating privacy policy in web services. For example, it may specify how privacy policy information can be embedded in the SOAP envelope of a web service message.
Protecting Privacy on the Internet

On the internet you almost always give away a lot of information about yourself: Unencrypted e-mails can be read by the administrators of the e-mail server, if the connection is not encrypted (no https), and also the internet service provider and other parties sniffing the traffic of that connection are able to know the contents. Furthermore, the same applies to any kind of traffic generated on the internet (webbrowsing, instant messaging, ...) In order not to give away too much personal information, e-mails can be encrypted and browsing of webpages as well as other online activities can be done traceless via anonymizers, or, in cases those are not trusted, by open source distributed anonymizers, so called mix nets. Renowned open-source mix nets are I2P - The Anonymous Network or tor.

Read more about this topic:  Information Privacy

Famous quotes containing the words protecting, privacy, information and/or systems:

    America today is capable of terrific intolerance about smoking, or toxic waste that threatens trout. But only a deeply confused society is more concerned about protecting lungs than minds, trout than black women.
    Garry Wills (b. 1934)

    There is a privacy I love in this snowy night.
    Driving around, I will waste more time.
    Robert Bly (b. 1926)

    English literature is a kind of training in social ethics.... English trains you to handle a body of information in a way that is conducive to action.
    Marilyn Butler (b. 1937)

    In all systems of theology the devil figures as a male person.... Yes, it is women who keep the church going.
    Don Marquis (1878–1937)