Challenges in enabling privacy self management

From being a set of desirable principles to the legal binding requirement, privacy has come off age. Newer privacy regulations demand enterprises to inculcate privacy-by-design principles. Importantly, they are mandating enterprises to implement privacy self management paradigm that empowers data su...

Full description

Saved in:
Bibliographic Details
Published inCSI TRANSACTIONS ON ICT Vol. 9; no. 3; pp. 185 - 191
Main Authors Vidhani, Kumar, Banahatti, Vijayanand, Lodha, Sachin
Format Journal Article
LanguageEnglish
Published New Delhi Springer India 01.09.2021
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:From being a set of desirable principles to the legal binding requirement, privacy has come off age. Newer privacy regulations demand enterprises to inculcate privacy-by-design principles. Importantly, they are mandating enterprises to implement privacy self management paradigm that empowers data subjects with control and rights over their data. This paradigm shift has brought in a major disruption and created multiple challenges for enterprises and data subjects. In this article, we first highlight the challenges faced by enterprises with respect to data, applications and technology. Here we describe the problems pertaining to both structured and unstructured data. Then we discuss issues in bringing enterprise legacy systems up to speed as well as some potential challenges for greenfield applications while following the privacy-by-design principles. We also outline problems that enterprises need to pay attention to while adopting some of the latest technologies, namely, Cloud, Artificial Intelligence and Internet of Things. Subsequently, we discuss multiple challenges from data subject’s perspective. We particularly deliberate on the lack of standardization of privacy policy, consent fatigue, inappropriate consent and granularity of data sharing challenges. Lastly, we briefly outline four core principles that could serve enterprise to create an effective, rewarding and futuristic privacy program.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2277-9078
2277-9086
DOI:10.1007/s40012-021-00335-6