Challenges in enabling privacy self management
From being a set of desirable principles to the legal binding requirement, privacy has come off age. Newer privacy regulations demand enterprises to inculcate privacy-by-design principles. Importantly, they are mandating enterprises to implement privacy self management paradigm that empowers data su...
Saved in:
Published in | CSI TRANSACTIONS ON ICT Vol. 9; no. 3; pp. 185 - 191 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New Delhi
Springer India
01.09.2021
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | From being a set of desirable principles to the legal binding requirement, privacy has come off age. Newer privacy regulations demand enterprises to inculcate privacy-by-design principles. Importantly, they are mandating enterprises to implement privacy self management paradigm that empowers data subjects with control and rights over their data. This paradigm shift has brought in a major disruption and created multiple challenges for enterprises and data subjects. In this article, we first highlight the challenges faced by enterprises with respect to data, applications and technology. Here we describe the problems pertaining to both structured and unstructured data. Then we discuss issues in bringing enterprise legacy systems up to speed as well as some potential challenges for greenfield applications while following the privacy-by-design principles. We also outline problems that enterprises need to pay attention to while adopting some of the latest technologies, namely, Cloud, Artificial Intelligence and Internet of Things. Subsequently, we discuss multiple challenges from data subject’s perspective. We particularly deliberate on the lack of standardization of privacy policy, consent fatigue, inappropriate consent and granularity of data sharing challenges. Lastly, we briefly outline four core principles that could serve enterprise to create an effective, rewarding and futuristic privacy program. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 2277-9078 2277-9086 |
DOI: | 10.1007/s40012-021-00335-6 |