2016 IEEE 24th International Requirements Engineering Conference Workshops (REW) 2016
DOI: 10.1109/rew.2016.051
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Shielding by Design — A Strategies Case for Near-Compliance

Abstract: Abstract-Changes to the EU-US agreements on transatlantic data transmission are accepted. With the updates leading to an adequacy decision for the Privacy Shield, the European Commission further advances US adherence to the General Data Protection Regulation. The regulation comes with increasing territorial scope for the processing of personal data of persons in the EU, and includes the risk of substantial fines. Soon, a Privacy Shield self-certification will be necessary for US organizations which process EU … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…[65] PbD is an approach for software development which protects privacy from the early/concept stages of the software development life cycle. [39] PbD means embedding privacy proactively in the design process of a technical system by using data minimization techniques. [62] PbD is moving from a design (in which the privacy requirements of an information system have been elicited) to an implementation that fulfills those requirements.…”
Section: Number Of Papersmentioning
confidence: 99%
See 3 more Smart Citations
“…[65] PbD is an approach for software development which protects privacy from the early/concept stages of the software development life cycle. [39] PbD means embedding privacy proactively in the design process of a technical system by using data minimization techniques. [62] PbD is moving from a design (in which the privacy requirements of an information system have been elicited) to an implementation that fulfills those requirements.…”
Section: Number Of Papersmentioning
confidence: 99%
“…Figure 6 shows the number of citations of the most mentioned goals, classified by category of study. [83], [47], [35], [42], [70], [71], [67], [39], [75], [62], [66], [49], [68], [69], [72], [51], [52], [59], [73], [74], [41], [44], [56], [54], [55], [53]…”
Section: Rq2 What Privacy Goals Have Been Addressed In the Developmementioning
confidence: 99%
See 2 more Smart Citations
“…Working on the modelling strategy, Colesky and Ghanavati (2016) have proposed to add a further level of abstraction that they define as tactic. Strategy "specifies a distinct architectural goal in privacy by design to achieve a certain level of privacy protection", while tactics is "an approach to privacy by design which contributes to the goal of an overarching privacy design strategy".…”
Section: Semantic Web Regulatory Models (Swrm)mentioning
confidence: 99%