Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy

The Privacy Engineer's Manifesto

Getting from Policy to Code to QA to Value

by Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran

The Privacy Engineer's Manifesto

Subscribe to new books via dBooks.org telegram channel

Join
DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy.

The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle - regardless of development methodology - from inception to retirement, including data deletion and destruction.

In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun.

The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy.

Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track.

This open book is licensed under a Creative Commons License (CC BY-NC-ND). You can download The Privacy Engineer's Manifesto ebook for free in PDF format (7.5 MB).

Table of Contents

Part 1
Getting Your Head Around Privacy
Chapter 1
Technology Evolution, People, and Privacy
Chapter 2
Foundational Concepts and Frameworks
Chapter 3
Data and Privacy Governance Concepts
Part 2
The Privacy Engineering Process
Chapter 4
Developing Privacy Policies
Chapter 5
Developing Privacy Engineering Requirements
Chapter 6
A Privacy Engineering Lifecycle Methodology
Chapter 7
The Privacy Component App
Chapter 8
A Runner's Mobile App
Chapter 9
Vacation Planner Application
Chapter 10
Privacy Engineering and Quality Assurance
Part 3
Organizing for the Privacy Information Age
Chapter 11
Engineering Your Organization to Be Privacy Ready
Chapter 12
Organizational Design and Alignment
Part 4
Where Do We Go from Here?
Chapter 13
Value and Metrics for Data Assets
Chapter 14
A Vision of the Future: The Privacy Engineer's Manifesto
Appendix A
Use-Case Metadata
Appendix B
Meet the Contributors

Book Details

Title
The Privacy Engineer's Manifesto
Subject
Computer Science
Publisher
Apress
Published
2014
Pages
386
Edition
1
Language
English
ISBN13
9781430263555
ISBN10
1430263555
ISBN13 Digital
9781430263562
ISBN10 Digital
1430263563
PDF Size
7.5 MB
License
CC BY-NC-ND

Related Books

Open Government
In a world where web services can make real-time data accessible to anyone, how can the government leverage this openness to improve its operations and increase citizen participation and awareness? Through a collection of essays and case studies, leading visionaries and practitioners both inside and outside of government share their ideas on how to...
The Onlife Manifesto
What is the impact of information and communication technologies (ICTs) on the human condition? In order to address this question, in 2012 the European Commission organized a research project entitled The Onlife Initiative: concept reengineering for rethinking societal concerns in the digital transition. This volume collects the work of the Onlife ...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
Social Theory of Fear
In the current crisis of the capitalist world system, elites promote fear of crime and terrorism to keep and expand their privileges and control the masses. This book offers an analysis of the crisis and strategies for rebellion....
Happiness is the Wrong Metric
This timely book addresses the conflict between globalism and nationalism. It provides a liberal communitarian response to the rise of populism occurring in many democracies. The book highlights the role of communities next to that of the state and the market. It spells out the policy implications of liberal communitarianism for privacy, freedom o...
Forecasting and Assessing Risk of Individual Electricity Peaks
The overarching aim of this book is to present self-contained theory and algorithms for investigation and prediction of electric demand peaks. A cross-section of popular demand forecasting algorithms from statistics, machine learning and mathematics is presented, followed by extreme value theory techniques with examples.In order to achieve carbon t...