Avoiding Pitfalls in Policy-Based Privacy Management

Avoiding Pitfalls in Policy-Based Privacy Management

George O.M. Yee
ISBN13: 9781605661322|ISBN10: 1605661325|EISBN13: 9781605661339
DOI: 10.4018/978-1-60566-132-2.ch009
Cite Chapter Cite Chapter

MLA

Yee, George O.M. "Avoiding Pitfalls in Policy-Based Privacy Management." Handbook of Research on Social and Organizational Liabilities in Information Security, edited by Manish Gupta and Raj Sharman, IGI Global, 2009, pp. 142-160. https://doi.org/10.4018/978-1-60566-132-2.ch009

APA

Yee, G. O. (2009). Avoiding Pitfalls in Policy-Based Privacy Management. In M. Gupta & R. Sharman (Eds.), Handbook of Research on Social and Organizational Liabilities in Information Security (pp. 142-160). IGI Global. https://doi.org/10.4018/978-1-60566-132-2.ch009

Chicago

Yee, George O.M. "Avoiding Pitfalls in Policy-Based Privacy Management." In Handbook of Research on Social and Organizational Liabilities in Information Security, edited by Manish Gupta and Raj Sharman, 142-160. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-132-2.ch009

Export Reference

Mendeley
Favorite

Abstract

The growth of the Internet is increasing the deployment of e-services in such areas as e-commerce, e-learning, and e-health. In parallel, the providers and consumers of such services are realizing the need for privacy. The use of P3P privacy policies on Web sites is an example of this growing concern for privacy. Managing privacy using privacy policies is a promising approach. In this approach, an e-service provider and an e-service consumer each have separate privacy policies. Before an e-service is engaged, the provider’s policy must be “compatible” with the consumer’s policy. However, beyond compatibility, the policies may face pitfalls arising from improper specification, misapplication, and improper maintenance (e.g. failing to keep a personal privacy policy up-to-date). This can result in the lost of privacy and even lead to serious safety issues in certain cases. This chapter gives examples of how such pitfalls can arise and suggests ways to avoid these pitfalls.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.