IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Challenges to Managing Privacy Impact Assessment of Personally Identifiable Data

Challenges to Managing Privacy Impact Assessment of Personally Identifiable Data
View Sample PDF
Author(s): Cyril Onwubiko (Research Series Limited, UK)
Copyright: 2012
Pages: 19
Source title: Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
Source Author(s)/Editor(s): Te-Shun Chou (East Carolina University, USA)
DOI: 10.4018/978-1-61350-507-6.ch010

Purchase

View Challenges to Managing Privacy Impact Assessment of Personally Identifiable Data on the publisher's website for pricing and purchasing information.

Abstract

The challenges organisations face in managing privacy risks are numerous, and inherently diverse. Traditionally, organisations focused on addressing business and security requirements of a project, but most recently, privacy impact assessment has become an essential part of the risk management regime for most projects. Significant efforts are now directed toward providing appropriate guidance on how to conduct privacy impact assessments. Appropriate assessments of privacy invasive technologies, justification for project, collection and handling of personally identifiable data and compliance to privacy legislations possess enormous challenges to carrying out appropriate privacy impact assessments. In this chapter, guidance on how to assess privacy risks of both new and in-service projects is provided. Further, lessons learned from managing privacy risks of new and in-service projects resulting from aggregation, collection, sharing, handling and transportation of personally identifiable information are discussed.

Related Content

Modeling Processes and Outcomes From Cybersecurity Talent Gaps in Global Labor Markets
Shalin Hai-Jew. © 2019. 18 pages.
View Details View Details PDF Full Text View Sample PDF
The Business Transformation Framework and Enterprise Architecture Framework for Managers in Business Innovation: The Role of Cyber and Information Technology Security in Automated Business Environments
Antoine Trad, Damir Kalpić. © 2019. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Cyber Risk Management in Banks: Cyber Risk Insurance
İsmail Yıldırım. © 2019. 13 pages.
View Details View Details PDF Full Text View Sample PDF
Access Control Challenges in Enterprise Ecosystems: Blockchain-Based Technologies as an Opportunity for Enhanced Access Control
Hugo Santos Martins, Sérgio Luís Guerreiro. © 2019. 26 pages.
View Details View Details PDF Full Text View Sample PDF
Developing the Social, Political, Economic, and Criminological Awareness of Cybersecurity Experts: A Proposal and Discussion of Non-Technical Topics for Inclusion in Cybersecurity Education
Marcus Leaning, Udo Richard Averweg. © 2019. 17 pages.
View Details View Details PDF Full Text View Sample PDF
Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
Winfred Yaokumah. © 2019. 17 pages.
View Details View Details PDF Full Text View Sample PDF
How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?
Sandra Blanke, Paul Christian Nielsen, Brian Wrozek. © 2019. 18 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom