Technology’s influence on privacy has become a matter of everyday concern for millions of people, from software architects designing new products to political leaders and consumer groups. This book explores the issue from the perspective of technology itself: how privacy-protective features can become a core part of product functionality, rather than added on late in the d Technology’s influence on privacy has become a matter of everyday concern for millions of people, from software architects designing new products to political leaders and consumer groups. This book explores the issue from the perspective of technology itself: how privacy-protective features can become a core part of product functionality, rather than added on late in the development process. The Architecture of Privacy will not only help empower software engineers, but also show policymakers, academics, and advocates that, through an arsenal of technical tools, engineers can form the building blocks of nuanced policies that maximize privacy protection and utility—a menu of what to demand in new technology. Topics include: - How technology and privacy policy interact and influence one another - Privacy concerns about government and corporate data collection practices - Approaches to federated systems as a component of privacy-protecting architecture - Alternative approaches to compartmentalized access to data - Methods to limit the amount of data revealed in searches, sidestepping all-or-nothing choices - Techniques for data purging and responsible data retention - Keeping and analyzing audit logs as part of a program of comprehensive system oversight - Security architecture that includes separation of roles and minimum access to data, while avoiding a single point of trust - Forecast of likely developments, and recommendations on how to address or alter them
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
Technology’s influence on privacy has become a matter of everyday concern for millions of people, from software architects designing new products to political leaders and consumer groups. This book explores the issue from the perspective of technology itself: how privacy-protective features can become a core part of product functionality, rather than added on late in the d Technology’s influence on privacy has become a matter of everyday concern for millions of people, from software architects designing new products to political leaders and consumer groups. This book explores the issue from the perspective of technology itself: how privacy-protective features can become a core part of product functionality, rather than added on late in the development process. The Architecture of Privacy will not only help empower software engineers, but also show policymakers, academics, and advocates that, through an arsenal of technical tools, engineers can form the building blocks of nuanced policies that maximize privacy protection and utility—a menu of what to demand in new technology. Topics include: - How technology and privacy policy interact and influence one another - Privacy concerns about government and corporate data collection practices - Approaches to federated systems as a component of privacy-protecting architecture - Alternative approaches to compartmentalized access to data - Methods to limit the amount of data revealed in searches, sidestepping all-or-nothing choices - Techniques for data purging and responsible data retention - Keeping and analyzing audit logs as part of a program of comprehensive system oversight - Security architecture that includes separation of roles and minimum access to data, while avoiding a single point of trust - Forecast of likely developments, and recommendations on how to address or alter them
Compare
Nicky Lim –
An easy and relevant book that answers (1) Why is privacy important to companies [ Because it threatens our freedom]; (2) How to implement privacy [Authorization policies, data encryption in transit/ at rest/ etc, retention/ deletion policies]; (3) the history and legality that surrounds it [FIPPs from the 70s that spawned Privacy laws such as EU Data Protection DIrectives, Australia's Privacy Act, Singapore's PDPA (yay!) and GDPR] The book is accessible to elementary readers, but perhaps some c An easy and relevant book that answers (1) Why is privacy important to companies [ Because it threatens our freedom]; (2) How to implement privacy [Authorization policies, data encryption in transit/ at rest/ etc, retention/ deletion policies]; (3) the history and legality that surrounds it [FIPPs from the 70s that spawned Privacy laws such as EU Data Protection DIrectives, Australia's Privacy Act, Singapore's PDPA (yay!) and GDPR] The book is accessible to elementary readers, but perhaps some computer science background is necessary. Broadly, it is to focus on access and control (where to keep data, who can get data, what data to keep, revelation about data and metadata) and oversight (logging, auditing, purging). A helpful framework on how to think abut privacy too in Chapter 11. one-line summary: You think privacy is not important; it is and let me help you achieve privacy. Interesting technologies to take away: (1) homomorphic encryption - calculations on encrypted data without first decrpyting. (2) hash-chainings and external authority checkpointing (Chp 9)
Petri –
Exceptionally US centric The heavy focus on US centric issues is at odds with where the leading edge of privacy happens. Not up to the O’Reilly standards.
Håvard Estensen –
Bảo –
ellery –
Ben –
Ola Bini –
Andy Culbertson –
Yuri –
Sebastien –
Alice –
Haley Bryk –
Adam Anderson –
Colin Tucker –
Lindsey B –
Aamer Akhter –
Timothy Henry –
Dan Walker –
Noah –
Noah Jacobs –
Michelle Tran –
Clark –
Dan Goodwin –
Sarah –
Chris –
Colin Rhodes –
David Wheeler –
Fizal –
Matt –
Kevin Lo –
Vivek –
Elise –
Jenny –
Tom –
Simon –
David Fox –
Trenton –
madhape –
David Jackson –
Risto Saarelma –
Daniel –
Mahbub –
Tom –
Amy –
Gregory –