Skip to Content
The Architecture of Privacy
book

The Architecture of Privacy

by Courtney Bowman, Ari Gesher, John K Grant, Daniel Slate, Elissa Lerner
September 2015
Intermediate to advanced
224 pages
5h 55m
English
O'Reilly Media, Inc.
Content preview from The Architecture of Privacy

Part II. Access and Control: Controlling Authorized Data Access

We have grouped our privacy-protective capabilities under two broad umbrellas—access and oversight. In this section, we discuss architectural choices related to data access. Access refers to the ability of users to see, share, and manipulate data within a system. The more precisely you can control access and the more nuanced those control decisions can be, the more flexibility your users have in finding ways to work with data within the FIPPs paradigm. A data-processing technology will generally function within a larger IT system that in itself must be secure as discussed in Chapter 5 on Security Architecture. Chapters 6 and 7 then explore the myriad possibilities for privacy protection offered by application-level access controls. As we’ll show, these can be configured to do far more than just provide all-or-nothing access to data.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Compliance Revolution: How Compliance Needs to Change to Survive

The Compliance Revolution: How Compliance Needs to Change to Survive

David Jackman
Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran

Publisher Resources

ISBN: 9781491904503Errata Page