Skip to Content
The Architecture of Privacy
book

The Architecture of Privacy

by Courtney Bowman, Ari Gesher, John K Grant, Daniel Slate, Elissa Lerner
September 2015
Intermediate to advanced
224 pages
5h 55m
English
O'Reilly Media, Inc.
Content preview from The Architecture of Privacy

Part III. Oversight: Holding Users and Systems Accountable

The second of our broad capability umbrellas is oversight. Oversight refers to mechanisms that allow appropriately authorized system users to monitor how data is used in order to ensure compliance with whatever legal, ethical, and other imperatives govern data usage. In Chapter 8, we look at how federated systems can enable data sharing while allowing the data controller to maintain oversight of the data. Chapter 9 explores the potential of audit logs to provide detailed insight into data usage as a means of enforcing rigorous privacy policy. In Chapter 10, we discuss the ultimate oversight decision by which data is removed from a system entirely and effectively returned to the sole control of the data subject once again.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Compliance Revolution: How Compliance Needs to Change to Survive

The Compliance Revolution: How Compliance Needs to Change to Survive

David Jackman
Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran

Publisher Resources

ISBN: 9781491904503Errata Page