Reference Hub3
A Decision Support System for Privacy Compliance

A Decision Support System for Privacy Compliance

Siani Pearson, Tomas Sander
ISBN13: 9781466609785|ISBN10: 1466609788|EISBN13: 9781466609792
DOI: 10.4018/978-1-4666-0978-5.ch008
Cite Chapter Cite Chapter

MLA

Pearson, Siani, and Tomas Sander. "A Decision Support System for Privacy Compliance." Threats, Countermeasures, and Advances in Applied Information Security, edited by Manish Gupta, et al., IGI Global, 2012, pp. 158-180. https://doi.org/10.4018/978-1-4666-0978-5.ch008

APA

Pearson, S. & Sander, T. (2012). A Decision Support System for Privacy Compliance. In M. Gupta, J. Walp, & R. Sharman (Eds.), Threats, Countermeasures, and Advances in Applied Information Security (pp. 158-180). IGI Global. https://doi.org/10.4018/978-1-4666-0978-5.ch008

Chicago

Pearson, Siani, and Tomas Sander. "A Decision Support System for Privacy Compliance." In Threats, Countermeasures, and Advances in Applied Information Security, edited by Manish Gupta, John Walp, and Raj Sharman, 158-180. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0978-5.ch008

Export Reference

Mendeley
Favorite

Abstract

Regulatory compliance in areas such as privacy has become a major challenge for organizations. In large organizations there can be hundreds or thousands of projects that involve personal information. Ensuring that all those projects properly take privacy considerations into account is a complex challenge for accountable privacy management. Accountable privacy management requires that an organization makes sure that all relevant projects are in compliance and that there is evidence and assurance that this actually is the case. To date, there has been no suitable automated, scalable support for accountable privacy management; it is such a tool that the authors describe in this chapter. Specifically, they describe a privacy risk assessment and compliance tool which they are developing and rolling out within a large, global company – called HP Privacy Advisor (HP PA) – and its generalisation and extension. The authors also bring out those security, privacy, risk, and trust-related aspects they have been researching related to this work in particular.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.