IB  Vol.4 No.2 , June 2012
Privacy Accountability Model and Policy for Security Organizations
Author(s) Yoel Raban
ABSTRACT
This paper describes a new model of privacy accountability and associates its dimensions with elements of the proposed European Commission regulation on the protection of individuals with regard to the processing and free movement of personal data. The model is applied to the security industry with special emphasis on the video surveillance and biometrics sectors. The use of the specific dimension and indicators described in the model enables security organizations to provide privacy accountability to customers such that the principles of data protection regulation and self-regulation are met.

Cite this paper
Y. Raban, "Privacy Accountability Model and Policy for Security Organizations," iBusiness, Vol. 4 No. 2, 2012, pp. 168-172. doi: 10.4236/ib.2012.42020.
References
[1]   A. Cavoukian, S. Taylor and M. E. Abrams, “Privacy by Design: Essential for Organizational Accountability and Strong Business Practices,” Identity in the Information Society, Vol. 3, No. 2, 2010, pp. 405-413. doi:10.1007/s12394-010-0053-z

[2]   C. Bennett, “International Privacy Standards: Can Accountability Be Adequate?” Privacy Laws and Business International, Vol. 106, 2010, pp. 21-23.

[3]   D. Guagnin, L. Hempel and C. Ilten, “Privacy Practices and the Claim for Accountability,” In: R. Von Schomberg, Ed., Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields, Publication Office of the European Union, Luxembourg, 2011, pp. 99-110.

[4]   C. Ilten, D. Guagnin and L. Hempel, “How Can Privacy Accountability Become Part of Business Process?” Privacy Laws and Business International, No. 112, 2011, pp. 28-30.

[5]   Y. Fan, “Ethical Branding and Corporate Reputation,” Corporate Communications: An International Journal, Vol. 10, No. 4, 2005, pp. 341-350. doi:10.1108/13563280510630133

[6]   A. Crane, “Unpacking the Ethical Product,” Journal of Business Ethics, Vol. 30, No. 4, 2001, pp. 361-373. doi:10.1023/A:1010793013027

[7]   D. Tancock, S. Pearson and A. Charlesworth, “The Emergence of Privacy Impact Assessments,” HPL-2010-63, Technical Reports, Hewlett-Packard Laboratories, 2010.

[8]   D. Wright, “Should Privacy Impact Assessment Be Mandatory,” Communication of the ACM, Vol. 54, No. 8, 2011. pp. 121-131. doi:10.1145/1978542.1978568

[9]   I. Rubinstein, “Regulating Privacy by Design,” Berkeley Technology Law Journal, Vol. 26, 2012, pp. 1409.

[10]   A. Peters, “Soft Law as a New Mode of Governance,” In: U. Diedrichs. W. Reiners and W. Wessels, Eds., The Dynamics of Change in EU Governance, Edward Elgar Publishing, Cheltenham, 2011, pp. 21-51.

[11]   K. Martin and K. N. Plataniotis, “Privacy Protected Surveillance Using Secure Visual Object Coding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 18, No. 8, 2008, pp. 1152-1162.

[12]   A. Cavoukian, M Chibba and A. Stoianov, “Advances in Biometric Encryption: Taking Privacy by Design from Academic Research to Deployment,” Review of Policy Research, Vol. 29, No. 1, 2012, pp. 37-61. doi:10.1111/j.1541-1338.2011.00537.x

 
 
Top