TY - JOUR
T1 - Privacy impact assessment
T2 - Its origins and development
AU - Clarke, Roger
PY - 2009
Y1 - 2009
N2 - Privacy impact assessment (PIA) is a systematic process for evaluating the potential effects on privacy of a project, initiative or proposed system or scheme. Its use has become progressively more common from the mid-1990s onwards. On the one hand, privacy oversight agencies and privacy advocates see PIAs as an antidote to the serious privacy-intrusiveness of business processes in the public and private sectors and the ravages of rapidly developing information technologies. On the other, governments and business enterprises alike have struggled to encourage public acceptance and adoption of technologies that are very apparently privacy-invasive, and have been turning to PIAs as a means of understanding concerns and mitigating business risks. This paper distinguishes PIAs from other business processes, such as privacy issues analysis, privacy law compliance checking and privacy audit, and identifies key aspects of the development of PIA practice and policy from their beginnings through to the end of 2008.
AB - Privacy impact assessment (PIA) is a systematic process for evaluating the potential effects on privacy of a project, initiative or proposed system or scheme. Its use has become progressively more common from the mid-1990s onwards. On the one hand, privacy oversight agencies and privacy advocates see PIAs as an antidote to the serious privacy-intrusiveness of business processes in the public and private sectors and the ravages of rapidly developing information technologies. On the other, governments and business enterprises alike have struggled to encourage public acceptance and adoption of technologies that are very apparently privacy-invasive, and have been turning to PIAs as a means of understanding concerns and mitigating business risks. This paper distinguishes PIAs from other business processes, such as privacy issues analysis, privacy law compliance checking and privacy audit, and identifies key aspects of the development of PIA practice and policy from their beginnings through to the end of 2008.
KW - Data matching program protocol
KW - Privacy
KW - Privacy impact
KW - Privacy impact statement
KW - Privacy strategy
KW - Technology assessment
UR - http://www.scopus.com/inward/record.url?scp=63849328022&partnerID=8YFLogxK
U2 - 10.1016/j.clsr.2009.02.002
DO - 10.1016/j.clsr.2009.02.002
M3 - Article
SN - 0267-3649
VL - 25
SP - 123
EP - 135
JO - Computer Law and Security Review
JF - Computer Law and Security Review
IS - 2
ER -