The Architecture Of Privacy: On Engineering Technologies That Can Deliver Trustworthy Safeguards

The Architecture Of Privacy: On Engineering Technologies That Can Deliver Trustworthy Safeguards
by Courtney Bowman / / / PDF


Read Online 18.4 MB Download


Technology’s influence on privacy has become a matter of everyday concern for millions of people, from software architects designing new products to political leaders and consumer groups. This book explores the issue from the perspective of technology itself: how privacy-protective features can become a core part of product functionality, rather than added on late in the development process.

Technology’s influence on privacy has become a matter of everyday concern for millions of people, from software architects designing new products to political leaders and consumer groups. This book explores the issue from the perspective of technology itself: how privacy-protective features can become a core part of product functionality, rather than added on late in the development process.The Architecture of Privacy

The Architecture of Privacy will not only help empower software engineers, but also show policymakers, academics, and advocates that, through an arsenal of technical tools, engineers can form the building blocks of nuanced policies that maximize privacy protection and utility—a menu of what to demand in new technology.

will not only help empower software engineers, but also show policymakers, academics, and advocates that, through an arsenal of technical tools, engineers can form the building blocks of nuanced policies that maximize privacy protection and utility—a menu of what to demand in new technology. Topics include:

Topics include:How technology and privacy policy interact and influence one another

How technology and privacy policy interact and influence one anotherPrivacy concerns about government and corporate data collection practices

Privacy concerns about government and corporate data collection practicesApproaches to federated systems as a component of privacy-protecting architecture

Approaches to federated systems as a component of privacy-protecting architectureAlternative approaches to compartmentalized access to data

Alternative approaches to compartmentalized access to dataMethods to limit the amount of data revealed in searches, sidestepping all-or-nothing choices

Methods to limit the amount of data revealed in searches, sidestepping all-or-nothing choicesTechniques for data purging and responsible data retention

Techniques for data purging and responsible data retentionKeeping and analyzing audit logs as part of a program of comprehensive system oversight

Keeping and analyzing audit logs as part of a program of comprehensive system oversightSecurity architecture that includes separation of roles and minimum access to data, while avoiding a single point of trust

Security architecture that includes separation of roles and minimum access to data, while avoiding a single point of trustForecast of likely developments, and recommendations on how to address or alter them

Forecast of likely developments, and recommendations on how to address or alter them

views: 639