Privacy by Design in der Softwareentwicklung
In: Zeitschrift für Informationsrecht: ZIR, Band 8, Heft 2, S. 145
ISSN: 2309-754X
93534 Ergebnisse
Sortierung:
In: Zeitschrift für Informationsrecht: ZIR, Band 8, Heft 2, S. 145
ISSN: 2309-754X
In: IEEE technology and society magazine: publication of the IEEE Society on Social Implications of Technology, Band 31, Heft 4, S. 18-19
ISSN: 0278-0097
Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice. Blockchain and Holochain are examples of recently emerged technologies that were shaped by, and are now shaping of, social contexts in which economic transactions may occur. The right to be forgotten represents a compliance challenge for public and private implementations of blockchain technology. This paper describes a few of these challenges.
BASE
SSRN
SSRN
In: Privacy in Germany: PinG ; Datenschutz und Compliance, Heft 5
ISSN: 2196-9817
The Digital Age brings along some relevant changes for lawyers and jurists. As a matter of fact, modern technologies invention and their diffusion cause specific requirements in order to protect the right of privacy because of the huge collection of individual's information. Today, the concept of privacy is changing: the right to be let alone evolves in personal data protection. The aim of this thesis is to propose and explain the innovative approach of privacy by design. This new methodology for privacy protection may be an efficient solution for technologies challenges and may increase law enforcement. The starting point is certainly the law and his power to conform technology with the regulative system. Privacy by design approach has as a goal to design and develop a system, a product or a service in a way that supports and materializes privacy principles, rules and values. Privacy measures are embedded into the design and the architecture of ICT systems and business practices. Privacy by design is characterized by proactive technical and organizational measures in time for preventing privacy infractions in each situation and for better safeguarding data collection and data security. The concept requires more respect for user privacy, keeping it central. The idea of privacy by design arose in Canada thanks to the Commissioner Ann Cavoukian and then became an international principle for privacy protection. It is even used by Federal Trade Commission and Canadians Commissioners in few procedures. Nowadays some norms explicitly require privacy by design; this is the case of the General Data Protection Regulation of the European Union published in 2016. The main goal of this work is to analyze the principle in a critical, comparative and interdisciplinary way, considering the historical point of view, the regulatory interventions and the case law. The analysis might be useful for understanding and implementing the approach in more countries, taking into account the benefits and the level of criticality. It is necessary to give some guidelines for the real implementation of privacy by design, looking at the future, and to find a norm that can be applied all over the word; in fact, it is urgent to find a global solution for privacy concerns. Privacy by design won't be the unique solution for privacy protection, but it will be essential for his future. This principle will safeguard better individual rights through a coherent and whole method. Designing privacy-friendly the technology means guarantee the other fundamental rights even more
BASE
In: New media & society: an international and interdisciplinary forum for the examination of the social dynamics of media and information change, Band 14, Heft 5, S. 798-814
ISSN: 1461-7315
Discourse analysis of the technical document series that records the internet design history, the RFCs, shows that those involved during the first decade saw privacy as a multi-dimensional and interactive problem requiring use of a suite of solutions at the network, individual, and data levels that had to take into account the need to balance privacy against experimentation and innovation. Internet designers were sophisticated in their pragmatic thinking about privacy when evaluated vis-a-vis theoretical developments since that time, viewing privacy as a contextual matter involving boundary setting, and using information architecture and metadata as tools for privacy protection. Those in the social science and legal communities think about the privacy effects of communication on humans, while those in the technical design community must focus on privacy as a set of logistical problems. Bringing these diverse communities into a single conversation can considerably enrich and strengthen the work of all.
In: The information society: an international journal, Band 30, Heft 5, S. 355-365
ISSN: 1087-6537
In: Forschungsjournal Soziale Bewegungen: Analysen zu Demokratie und Zivilgesellschaft, Band 30, Heft 2, S. 189-199
ISSN: 2365-9890
Zusammenfassung
Es ist eine weit verbreitete Ansicht mit sozialphilosophischer Plausibilität, dass bestimmte Formen der Privatheit und der Demokratie in einem konstitutiven Verhältnis zueinander stehen. Demzufolge gilt, dass nur Demokratien ihren Bürgerinnen politisch nutzbare Privatheit zugestehen und dass umgekehrt nur Sozialformationen, die solche Privatheitsformen institutionalisieren, demokratischen Charakter erlangen können. Der vorliegende Beitrag fragt nun, inwiefern der Konstitutionszusammenhang schon bei der Gestaltung von Privatheit zum Tragen kommen muss, um tragfähig und vor den Erosionsgefahren in Zeiten der Digitalisierung geschützt zu sein. Um dieser Frage nachzugehen, schließen wir am Privacy by Design-Konzept (PbD) an, erweitern dieses jedoch, indem wir auch dessen institutionell-diskursive Rahmung in die Gestaltungsperspektive einrücken. Wir gehen dabei systematisch-explorativ vor: Zunächst werden zwei konträr orientierte Gestaltungsansätze als Pole des Spektrums identifiziert, innerhalb dessen sich PbD-Ansätze bewegen können. Daraufhin werden explorativ fünf weitere PbD-Formen bestimmt. Abschließend diskutieren wir Implikationen, die sich aus der Exploration alternativer PbD-Formen für die Etablierung eines demokratischen PbD ergeben.
Nowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors integrated into smartphones allow the devices to collect very precise information about the owner and his environment at any time. The important flow of personal and business data becomes hard to manage.The "Privacy by Design" approach with 7 privacy principles states privacy can be integrated into any system from the software design stage. In Europe, the Data Protection Directive (Directive 95/46/EC) includes "Privacy by Design" principles. The new General Data Protection Regulation enforces privacy protection in the European Union, taking into account modern technologies such as mobile systems and making "Privacy by Design" not only a benefit for users, but also a legal obligation for system designers and developers.The goal of this thesis is to propose pattern-oriented solutions to cope with mobile privacy problems, such as lack of transparency, lack of consent, poor security and disregard for purpose limitation, thus giving mobile systems more Privacy by (re) Design ; De nos jours, les smartphones et les tablettes génèrent, reçoivent, mémorisent et transfèrent vers des serveurs une grande quantité de données en proposant des services aux utilisateurs via des applications mobiles facilement téléchargeables et installables. Le grand nombre de capteurs intégrés dans un smartphone lui permet de collecter de façon continue des informations très précise sur l'utilisateur et son environnement. Cette importante quantité de données privées et professionnelles devient difficile à superviser.L'approche «Privacy by Design», qui inclut sept principes, propose d'intégrer la notion du respect des données privées dès la phase de la conception d'un traitement informatique. En Europe, la directive européenne sur la protection des données privées (Directive 95/46/EC) intègre des notions du «Privacy by Design». La nouvelle loi européenne unifiée (General Data Protection Régulation) renforce la protection et le respect des données privées en prenant en compte les nouvelles technologies et confère au concept de «Privacy by Design» le rang d'une obligation légale dans le monde des services et des applications mobiles.L'objectif de cette thèse est de proposer des solutions pour améliorer la transparence des utilisations des données personnelles mobiles, la visibilité sur les systèmes informatiques, le consentement et la sécurité pour finalement rendre les applications et les systèmes mobiles plus conforme au «Privacy by (re)Design»
BASE
Nowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors integrated into smartphones allow the devices to collect very precise information about the owner and his environment at any time. The important flow of personal and business data becomes hard to manage.The "Privacy by Design" approach with 7 privacy principles states privacy can be integrated into any system from the software design stage. In Europe, the Data Protection Directive (Directive 95/46/EC) includes "Privacy by Design" principles. The new General Data Protection Regulation enforces privacy protection in the European Union, taking into account modern technologies such as mobile systems and making "Privacy by Design" not only a benefit for users, but also a legal obligation for system designers and developers.The goal of this thesis is to propose pattern-oriented solutions to cope with mobile privacy problems, such as lack of transparency, lack of consent, poor security and disregard for purpose limitation, thus giving mobile systems more Privacy by (re) Design ; De nos jours, les smartphones et les tablettes génèrent, reçoivent, mémorisent et transfèrent vers des serveurs une grande quantité de données en proposant des services aux utilisateurs via des applications mobiles facilement téléchargeables et installables. Le grand nombre de capteurs intégrés dans un smartphone lui permet de collecter de façon continue des informations très précise sur l'utilisateur et son environnement. Cette importante quantité de données privées et professionnelles devient difficile à superviser.L'approche «Privacy by Design», qui inclut sept principes, propose d'intégrer la notion du respect des données privées dès la phase de la conception d'un traitement informatique. En Europe, la directive européenne sur la protection des données privées (Directive 95/46/EC) intègre des ...
BASE
In: Privacy e innovazione 2
In: International journal of information management, Band 53, S. 102124
ISSN: 0268-4012