A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises

نویسندگان

  • Marco Casassa Mont
  • Robert Thyne
چکیده

It is common practice for enterprises and other organisations to ask people to disclose their personal data in order to grant them access to services and engage in transactions. This practice is not going to disappear, at least in the foreseeable future. Most enterprises need personal information to run their businesses and provide the required services, many of whom have turned to identity management solutions to do this in an efficient and automated way. Privacy laws dictate how enterprises should handle personal data in a privacy compliant way: this requires dealing with privacy rights, permissions and obligations. It involves operational and compliance aspects. Currently much is done by means of manual processes, which make them difficult and expensive to comply. A key requirement for enterprises is being able to leverage their investments in identity management solutions. This paper focuses on how to automate the enforcement of privacy within enterprises in a systemic way, in particular privacy-aware access to personal data and enforcement of privacy obligations: this is still a green field. We introduce our work in these areas: core concepts are described along with our policy enforcement models and related technologies. Two prototypes have been built as a proof of concept and integrated with HP state-of-the-art identity management solutions to demonstrate the feasibility of our work. We provide technical details, discuss open issues and our next steps.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises

Privacy management is important for enterprises that handle personal data: they must deal with privacy laws and people’s expectations. Currently much is done by means of manual processes, which make them difficult and expensive to comply. Key enterprises’ requirements include: automation, simplification, cost reduction and leveraging of current identity management solutions. This paper describe...

متن کامل

Enforcement of a P3P Privacy Policy

P3P is a machine readable XML language used by enterprises to express their privacy policy on a web site. The language is well supported with a number of tools now available for creating P3P policies, browsers beginning to support P3P function, and numerous web sites including P3P policy files on them. P3P is useful for declaring privacy promises but there is little experience in enforcing P3P ...

متن کامل

Accountability and Enforceability of Enterprise Privacy Policies

This paper describes our approach to the evolution of enterprise privacy policies and related privacy management ecosystems. We argue that it is important to be able to express enforceable privacy policies, to explicitly manage accountability and to develop the whole privacy infrastructure, rather than just one part of this. In this paper we briefly illustrate our philosophy and vision, present...

متن کامل

An Algebra for Composing Enterprise Privacy Policies

Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with different privacy policies when several parts of an organization or different enterprises cooperate, it is crucial to have tools at hand that allow for a practical management of varying privacy requirements. We propose an algebr...

متن کامل

Extending HP Identity Management Solutions to Enforce Privacy Policies and Obligations for Regulatory Compliance by Enterprises

This paper describes issues and requirements related to privacy management as an aspect of improved governance in enterprises. It focuses on the privacy enforcement aspect, in particular related to privacy-aware access control and enforcement of privacy obligations: this is still a green field and, at the same time, is a key aspect to be taken into account to ensure compliance both with regulat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006