enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  3. Privacy Impact Assessment - Wikipedia

    en.wikipedia.org/wiki/Privacy_Impact_Assessment

    Identify appropriate privacy controls to mitigate unacceptable risks. A privacy impact report seeks to identify and record the essential components of any proposed system containing significant amounts of personal information and to establish how the privacy risks associated with that system can be managed. [7]

  4. Digital privacy - Wikipedia

    en.wikipedia.org/wiki/Digital_privacy

    In the context of digital privacy, communication privacy is the notion that individuals should have the freedom, or right, to communicate information digitally with the expectation that their communications are secure—meaning that messages and communications will only be accessible to the sender's original intended recipient.

  5. ePrivacy Directive - Wikipedia

    en.wikipedia.org/wiki/EPrivacy_Directive

    Directive 2002/58/processing of personal data and the protection of privacy in the electronic communications sector European Union directive Made by European Parliament & Council Made under Art. 95 Journal reference L201, 2002-07-31, pp. 37 – 47 History Date made 2002-07-12 Entry into force 2002-07-31 Implementation date 2003-10-31 Preparative texts EESC opinion C123, 2001-01-24, p. 53 EP ...

  6. Contextual integrity - Wikipedia

    en.wikipedia.org/wiki/Contextual_Integrity

    The privacy concerns induced by the collection, dissemination and use of personal data via smartphones have received a large amount of attention from different stakeholders. A large body of computer science research aims to efficiently and accurately analyze how sensitive personal data (e.g. geolocation, user accounts) flows across the app and ...

  7. Information privacy law - Wikipedia

    en.wikipedia.org/wiki/Information_privacy_law

    Data should be deleted when it is no longer needed for the stated purpose. Transmission of personal information to locations where "equivalent" personal data protection cannot be assured is prohibited. Some data is too sensitive to be collected, unless there are extreme circumstances (e.g., sexual orientation, religion).

  8. FTC fair information practice - Wikipedia

    en.wikipedia.org/wiki/FTC_fair_information_practice

    Currently the FTC version of the Fair Information Principles are only recommendations for maintaining privacy-friendly, consumer-oriented data collection practices, and are not enforceable by law. The enforcement of and adherence to these principles is principally performed through self-regulation.

  9. American Data Privacy and Protection Act - Wikipedia

    en.wikipedia.org/wiki/American_Data_Privacy_and...

    As the chair of the Senate committee responsible for data privacy, Maria Cantwell was the gatekeeper for any such bill to reach the senate floor. Cantwell, who had her own online privacy bill in draft, had similarly declined another bipartisan online privacy bill proposed by Senators Richard Blumenthal and Marsha Blackburn earlier in the year ...