Information accountability
2008, Communications of the ACM
https://doi.org/10.1145/1349026.1349043…
1 page
1 file
Sign up for access to the world's latest research
Abstract
With access control and encryption no longer capable of protecting privacy, laws and systems are needed that hold people accountable for the misuse of personal information, whether public or secret.
Related papers
2005
Abstract. This chapter summarizes empirical findings on the influence of information and communication technologies (ICTs) on organisational, professional, political, legal, and administrative accountability. ICTs enforce and challenge these traditional accountability arrangements and call for new forms of accountability. Both local accountability practices and linkages between government practices and the (accountability) environment are affected.
Dewald Roode Workshop on IS Security Research 2010, IFIP WG 8.11 / 11.13, Waltham, Massachusetts, USA, October 8–9, 2010
2010
What is accountability, and why is no one willing to implement sound accountability measures? Accountability is neither popular with business nor is attractive enough for technologists to implement, and finally, security professionals can barely keep up with audit. You heard it here first: Accountability will be the next version of audit, identity management, and systems administration. Accountability is about as opposite to "set it and forget it" as you can get. Everyone is looking for a silver bullet to kill the specter of compliance and regulation. But no silver bullet exists. The strength of our audit holy water gets dangerously diluted by the "turn it on when the auditor comes" attitude. It is time for the technical and business process of accountability.
2009
As organizations come to rely on the collection and use of personal information in order to complete the transactions and providing good services to their users, more and more user personal information is being shared with web service providers leading to the need to protect the privacy. Personal information is processed, stored and disclosed and often it generated in the course of making a commercial exchange. Credit card numbers, individual identity number, purchase records, monthly income, and related types of personal information all have important role with his this commercial information system. However this creation and use of personal information raises issues of privacy not only for the individual, but also for organizations. Easy access to private personal information will cause the misuse of data, no control over the information and others. Because of this, it's important to protect the information not only from external threats but also from insider threats. Data di...
Surveillance & Society, 2009
In February 2009 the House of Lords Constitutional Committee in the United Kingdom published the report Surveillance: Citizens and the State. Some have hailed this as a landmark document. The following is one of four commentaries that the editors of Surveillance & Society solicited in response to the report.
Advances in systems analysis, software engineering, and high performance computing book series, 2014
The chapter discusses the role of CNPD (Comissão Nacional de Proteção de Dados) in case of violation of privacy, like dissemination or revelation of personal data by a public/private organization or entity. About this subject, the CNPD can issue a recommendation to the Portuguese Treasury to take some measures to strictly protect the security of the personal information using the Portuguese "E-Invoice." Portuguese people must be protected against the misuse of personal data by the use of the "E-Invoice." A Security System Administrator continuously monitors the network and all data traffic to prevent any misuse or abuse of the system. A prerequisite for trust and acceptance of these information systems is that appropriate data protection measures are implemented against possible misuse of personal data decreasing the risks in its utilization. Protective measures should be taken by the Treasury referring additional procedures against the misuse of data because the administrative control system is inefficient regarding unauthorized access, disclosure, misuse of localization data or loss, modification, and appropriation of information linked with the use of the Portuguese "E-Invoice."
2011
The author would like to thank Jake Barnes for his help in the tort law discussions of this chapter. To the extent my knowledge of tort law is accurate, I accept full responsibility. As for the errors, blame Jake. Chris Hoofnagle, Ted Janger, and Paul Schwartz provided helpful comments on the manuscript. This book chapter was originally written in 2004. Subsequent to the redrafting of this chapter, in 2005, a litany of organizations announced that they had suffered massive data security breaches. I have updated this chapter slightly to discuss the 2005 data security breaches, but I am unable to add more to discuss the legal developments in the aftermath of the breaches. By and large, these developments have unfolded as I predicted back in 2004 when writing this chapter. Data security is quickly becoming one of the major concerns of the Information Age. Computer networks are vulnerable to siege from hackers, viruses, intercepted communications, and electronic surveillance. 1 Much of the data residing in these computer networks pertains to our personal lives. Increasingly, extensive digital dossiers about us are being constructed, as businesses and the government gather pieces of personal data and assemble them in data bases. Hundreds-perhaps thousands-of entities may have our personal information. 2 Our dossiers play a profound role in our lives. They are used to assess our reputation and credibility. They are examined to determine whether we receive a loan, a job, or a license-and even whether we are detained or arrested by the police. Because so many critical decisions are based on our dossiers, ensuring that they are accurate and protected from tampering is of paramount importance.
Agenda - A Journal of Policy Analysis and Reform, 1999
My thanks to two anonymous referees for helpful comments on an earlier draft of this article.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.