The IT Law Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 5: Line 5:
 
== Overview ==
 
== Overview ==
   
  +
Expanding opportunities in [[cloud computing]], [[big data]], and [[cyber-physical system]]s are bringing dramatic changes to how we use [[information technology]]. While these [[technologies]] bring advancements to U.S. [[National security|national]] and economic security and our quality of life, they also pose [[risk]]s to individuals' [[privacy]].
βˆ’
This document provides an introduction to the concepts of [[privacy engineering]] and [[risk management]] for federal systems. These concepts establish the basis for a common vocabulary to facilitate better understanding and [[communication]] of [[privacy risk]] within federal systems, and the [[effective]] [[implementation]] of [[privacy principles]]. This publication introduces two key components to support the application of [[privacy engineering]] and [[risk management]]: privacy engineering objectives and a privacy risk model.
 
  +
  +
This publication introduces a [[privacy]] [[risk management]] [[framework]] for anticipating and addressing [[risk]]s to individuals' [[privacy]]. In particular, it focuses on three [[privacy engineering]] objectives and a [[privacy risk]] [[model]].
 
[[Category:Publication]]
 
[[Category:Publication]]
 
[[Category:Privacy]]
 
[[Category:Privacy]]
 
[[Category:Technology]]
 
[[Category:Technology]]
βˆ’
[[Category:2017]]
+
[[Category:2015]]

Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA

Cancel Editing help (opens in new window)