2019
DOI: 10.1108/ics-04-2019-0047
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating privacy impact assessment methods: guidelines and best practice

Abstract: Purpose This paper aims to practically guide privacy impact assessment (PIA) implementation by proposing a PIA process incorporating best practices from existing PIA guidelines and privacy research. Design/methodology/approach This paper critically reviews and assesses generic PIA methods proposed by related research, data protection authorities and standard’s organizations, to identify best practices and practically support PIA practitioners. To address identified gaps, best practices from privacy literatur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(17 citation statements)
references
References 15 publications
0
17
0
Order By: Relevance
“…To facilitate an understanding of the PIA process, as well as the core components that are essential for establishing a riskbased approach, we illustrate a generalized PIA process inspired by works from [21] and [30] in Fig. 1.…”
Section: B Pia Processmentioning
confidence: 99%
See 1 more Smart Citation
“…To facilitate an understanding of the PIA process, as well as the core components that are essential for establishing a riskbased approach, we illustrate a generalized PIA process inspired by works from [21] and [30] in Fig. 1.…”
Section: B Pia Processmentioning
confidence: 99%
“…Given the context and purpose of processing personal data, a data controller can assess whether the processing will result in high risk; hence, a threshold analysis should be performed [31]. The threshold analysis provides an overview of whether a full-blown PIA process is necessary [30], [31]. If a PIA process is necessary, the system is comprehensively described to model its behavior and characteristics.…”
Section: B Pia Processmentioning
confidence: 99%
“…Privacy impact assessment (PIA) is a risk management approach which complement the privacy by design context [33] [34], evaluating the risk of every processing regarding to a specific initiative. PIA is necessarily carried out especially, in case of a (a) systematic and extensive evaluation of personal aspects (profiling), (b) existence of big data sensitive (Article 9) or (c) data about criminal convictions and offences (Article 10) and (d) a systematic monitoring of a publicly accessible area on a large scale.…”
Section: Security Of Personal Data (Articles 25 32-35)mentioning
confidence: 99%
“…The paramount importance of privacy preservation, along with the establishment of the General Data Protection Regulation (GDPR) that governs the European territory, has rendered the privacy risk assessment a rapidly changing field, due to notable standardisation actions and legal establishments. However, a common language and a practical methodology that is flexible enough to address diverse privacy needs is still missing [10], while the community has identified the need for further research towards the implementation of tools to support Privacy Impact Assessment (PIA) conduction [12].…”
Section: Introductionmentioning
confidence: 99%
“…This is rather contradictory considering the NIST proposed guidelines [10], according to which, the data protection lies in the intersection of the cybersecurity and privacy risks. Therefore, the lack of sufficient tools and methodologies that can offer the PIA a level of automation [12], so that risk impact assessment can be extracted in a timely manner, but most importantly the lack of proper metrics that can steer the decisions of the assessor in identifying, prioritising, anticipating and, finally, mitigating the risks, could raise questions on the effectiveness of the tools and the thoroughness of the assessments. Indeed, the diversity and complexity of proposed privacy properties makes an informed choice of metrics rather challenging [13] and sets the challenge ahead on how to efficiently converge the usually contradicting security and privacy requirements, of a business ecosystem, towards a better risk assessment and estimation.…”
Section: Introductionmentioning
confidence: 99%