Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes it inside the enterprise and shares it with partner enterprises. In particular, we analyse three different privacy systems that can be used in the different stages of this lifecycle. One of them is the Audit Logic, recently introduced, which can be used to keep data private when it travels across enterprise boundaries. We conclude with an analysis of the features and shortcomings of these systems.
|Title of host publication||Security, Privacy and Trust in Modern Data Management|
|Editors||M. Petkovic, W. Jonker, Willem Jonker|
|Place of Publication||Berlin|
|Number of pages||15|
|Publication status||Published - 2007|
|Name||Data-Centric Systems and Applications|
Dekker, M. A. C., Etalle, S., & den Hartog, J. (2007). Privacy Policies. In M. Petkovic, W. Jonker, & W. Jonker (Eds.), Security, Privacy and Trust in Modern Data Management (pp. 383-397). (Data-Centric Systems and Applications; Vol. XVIII). Berlin: Springer. https://doi.org/10.1007/978-3-540-69861-6_25