The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2010 vol.8)
pp: 64-68
Paula J. Bruening , Centre for Information Policy Leadership, Hunton & Williams
ABSTRACT
The ubiquitous collection, use, and flow of data challenge existing frameworks for data protection and management. Organizations collect and derive data from myriad sources and use it for various purposes, so that the rules that apply to their data holdings vary. The authors describe data governance in this complex and dynamic environment, where the rules and obligations that govern how organizations use and protect information attach to the data and must be met wherever or by whomever collects, processes, or stores it. They suggest data tagging to facilitate such an approach.
INDEX TERMS
privacy, data tagging, information governance
CITATION
Paula J. Bruening, "Data Tagging for New Information Governance Models", IEEE Security & Privacy, vol.8, no. 5, pp. 64-68, September/October 2010, doi:10.1109/MSP.2010.147
REFERENCES
1. "The Future of Privacy," Joint Contribution to the Consultation of the European Commission on the Legal Framework for the Fundamental Right to Protection of Personal Data, Article 29 Data Protection Working Party, 2009; http://ec.europa.eu/justice_home/fsj/privacy/ docs/spdocs/2009wp168_en.pdf.
2. "Opinion 3/2010 on the Principle of Accountability," Article 29 Data Protection Working Party, 2010; http://ec.europa.eu/justice/policies/privacy/ docs/wpdocs/2010wp173_en.pdf.
3. F.H. Cate, "The Failure of Fair Information Practice Principles," Consumer Protection in the Age of the Information Economy, J.K. Winn ed., Ashgate Publishing, 2006.
4. "Refocusing the FTC's Role in Privacy Protection," Comments of the Center for Democracy & Technology in Regards to the FTC Consumer Privacy Roundtable,6 Nov. 2009.
5. "Data Protection Accountability: The Essential Elements, a Document for Discussion," The Galway Accountability Project, Oct. 2009; www.ftc.gov/os/comments/privacyroundtable 544506-00059.pdf.
6. , "A Use and Obligations Approach to Protecting Privacy: A Discussion Document," The Business Forum for Consumer Privacy,7 Dec. 2009.
7. P. Bruening et al., "Strategic Information Management," Privacy & Security Law, Bureau of Nat'l Affairs, vol. 7, no. 36, 2008.
8. In re Advocat "Christopher X, "Cour de Cassation, no. 07-83228, 12 Dec. 2007.
9. United States v. Vetco, Federal Reporter, 2nd Series, vol. 691, 1981, p. 1281 (US 9th Circuit Court of Appeals).
10. "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data," 1980; www.oecd.org/document/180,2340,en_2649_34255_1815186_1_1_1_1,00.html .
11. "APEC Privacy Framework," 2005; www.ag.gov.au/www/agd/rwpattach.nsf/VAP/ (03995EABC73F94816C2AF4AA2645824B)~APEC+Privacy+Framework.pdf/ $fileAPEC+Privacy+Framework.pdf .
12. "Strategic Information Management," Privacy & Security Law, Bureau of Nat'l. Affairs, Sept. 2008.
50 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool