Information protection policy

Автор работы: Пользователь скрыл имя, 28 Ноября 2012 в 04:31, реферат

Описание работы

Information protection policy is a document which provides guidelines to users on the processing, storage and transmission of sensitive information. Main goal is to ensure information is appropriately protected from modification or disclosure. It may be appropriate to have new employees sign policy as part of their initial orientation. It should define sensitivity levels of information.
Content
Should define who can have access to sensitive information.
Should define how sensitive information is to be stored and transmitted (encrypted, archive files, uuencoded, etc).

Файлы: 1 файл

information.docx

— 138.30 Кб (Скачать файл)

 

Principles

The core principles of privacy addressed by these principles are:

 

1. Notice/Awareness Consumers should be given notice of an entity's information practices before any personal information is collected from them. This requires that companies explicitly notify of some or all of the following:

  • identification of the entity collecting the data;
  • identification of the uses to which the data will be put;
  • identification of any potential recipients of the data;
  • the nature of the data collected and the means by which it is collected;
  • whether the provision of the requested data is voluntary or required;
  • the steps taken by the data collector to ensure the confidentiality, integrity and quality of the data.

 

2. Choice/Consent Choice and consent in an online information-gathering sense means giving consumers options to control how their data is used. Specifically, choice relates to secondary uses of information beyond the immediate needs of the information collector to complete the consumer's transaction. The two typical types of choice models are 'opt-in' or 'opt-out.' The 'opt-in' method requires that consumers affirmatively give permission for their information to be used for other purposes; without the consumer taking these affirmative steps in an 'opt-in' system, the information gatherer assumes that it cannot use the information for any other purpose. The 'opt-out' method requires consumers to affirmatively decline permission for other uses; without the consumer taking these affirmative steps in an 'opt-out' system, the information gatherer assumes that it can use the consumer's information for other purposes. Each of these systems can be designed to allow an individual consumer to tailor the information gatherer's use of the information to fit his or her preferences by checking boxes to grant or deny permission for specific purposes rather than using a simple "all or nothing" method.

2-1. Problems with Choice/Consent Consumers do not have a fair say in the consent process. For example, customers provide their health information such as their social insurance number or health card number while making an appointment for a dental check-up through on-line. Customers are commonly asked to sign an agreement stating that ‘third-party may have an access to the information you provide under certain conditions.’ The certain conditions are rarely specified in any part of the agreement. Later on, the third-party may share the information with their subsidiary institutions. Thus, access to customers’ personal information is beyond their control.

3. Access/Participation Access as defined in the Fair Information Practice Principles includes not only a consumer's ability to view the data collected, but also to verify and contest its accuracy. This access must be inexpensive and timely in order to be useful to the consumer.

 

4. Integrity/Security Information collectors should ensure that the data they collect is accurate and secure. They can improve the integrity of data by cross-referencing it with only reputable databases and by providing access for the consumer to verify it. Information collectors can keep their data secure by protecting against both internal and external security threats. They can limit access within their company to only necessary employees to protect against internal threats, and they can use encryption and other computer-based security systems to stop outside threats.

5. Enforcement/Redress In order to ensure that companies follow the Fair Information Practice Principles, there must be enforcement measures. The FTC identified three types of enforcement measures: self-regulation by the information collectors or an appointed regulatory body; private remedies that give civil causes of action for individuals whose information has been misused to sue violators; and government enforcement, which can include civil and criminal penalties levied by the government.

 

Enforcing the principles

Currently the FTC version of the Fair Information Principles are only recommendations for maintaining privacy-friendly, consumer-oriented data collection practices, and are not enforceable by law. The enforcement of and adherence to these principles is principally performed through self-regulation. The FTC has, however, undertaken efforts to evaluate industry self-regulation practices, provides guidance for industry in developing information practices,and uses its authority under the FTC Act to enforce promises made by corporations in their privacy policies.

Since self-regulatory initiatives fall short of ideal implementation of the principles (the 2000 FTC Report noted, for example, that self-regulatory initiatives lacked meaningful monitoring and enforcement polices and practices), the Commission recommends that the United States Congress enact legislation that, in conjunction with continuing self-regulatory programs, will ensure adequate protection of consumer privacy online. "The legislation recommended by the Commission would set forth a basic level of privacy protection for consumer-oriented commercial Web sites" and "would establish basic standards of practice for the collection of information online...consumer-oriented commercial Web sites that collect personal identifying information from or about consumers online... would be required to comply with the four widely-accepted fair information practices.

 

The principles, however, form the basis of many individual laws at the both federal and state levels -- called the "sectoral approach." Examples are the Fair Credit Reporting Act, the Right to Financial Privacy Act, the Electronic Communications Privacy Act, the Video Privacy Protection Act (VPPA), and the Cable Television Protection and Competition Act. Additionally, the principles continue to serve as a model for privacy protections in newly developing areas, such as in designing Smart Grid programs. Main article: FTC Fair Information Practice The four critical issues identified in Fair Information Principles are:

 

Notice – data collectors must disclose their information practices before collecting personal information from consumers Choice – consumers must be given options with respect to whether and how personal information collected from them may be used for purposes beyond those for which the information was provided Access – consumers should be able to view and contest the accuracy and completeness of data collected about them Security – data collectors must take reasonable steps to assure that information collected from consumers is accurate and secure from unauthorized use. In addition the Principles discuss the need for enforcement mechanisms to impose sanctions for noncompliance with fair information practices.

Other proposals regarding 'fair information'

The Organisation for Economic Co-operation and Development (OECD) and European Union, among others, have adopted more comprehensive approaches to fair information practices. The OECD principles provide added protections via the Individual Participation principle where specific requirements are made for access and modification of personally collected information by the individual and the Accountability principle (a data controller should be accountable for complying with measures which give effect to the principles stated above). The European Union Data Protection Directive is another model for comprehensive privacy protections.

Criticism of the FTC Principles

The FIPs are criticized by some scholars for being less comprehensive in scope than privacy regimes in other countries, in particular in European Union and other OECD countries. Additionally, the FTC's formulation of the principles has been criticized in comparison to those issued by other agencies. The FTC's 2000 version of FIPs is shorter and less complete than the privacy protection principles issued by the Privacy Office of the Department of Homeland Security in 2008, which include eight principles closely aligned with the OECD principles.

 

Some in the privacy community criticize the FIPs for being too weak, allowing too many exemptions, failing to require a privacy agency, failing to account for the weaknesses of self-regulation, and not keeping pace with information technology. Many privacy experts have called for omnibus privacy protection legislation in the US in lieu of the current blend of self-regulation and selective codification in certain sectors.Critics from a business perspective often prefer to limit FIPs to reduced elements of notice, consent, and accountability. They complain that other elements are unworkable, expensive, or inconsistent with openness or free speech principles.

 

 

 

 

 

 


Информация о работе Information protection policy