Abstract
The broad adoption and increasing reliance on computing and communication systems in applications domains such as health services, insurance, telecommunication and direct marketing leads to the creation, collection and processing of enormous amounts of personal data. Responding to this development, international bodies, the European Union and various countries established personal data protection laws and Authorities to regulate and control their application. The legal framework imposes the taking of appropriate security measures, that may be different compared with those specified by data controllers based on their business needs, since personal data are assets with, possibly, different values for the data subjects and the controllers. In this paper, we propose a security controls selection model, that supports data controllers in their effort to methodologically choose security measures compliant to privacy protection laws being in force. Also, we propose a process to assess (methodologically) the privacy protection requirements according to the related legal provisions and the selected and implemented security controls.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
C. Pounder, ‘Security And The New Data Protection Law’, J. Computers & Security, 17 (1998), pp. 124–128.
Institute for Certification of Information Technology (ICIT), ‘Scheme for self-assessment and certification of information security against BS 7799’, 1997.
OECD, Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, Paris, 1980.
Lynette Barnard and Prof. Rossuw von Solms, ‘A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls’, J. Computers & Security, Vol. 19, No. 2, pp. 185–194, 2000.
V. C. Zorkadis, E. Siougle, Ph. Mitletton, ‘Technical and Legal Reports on Evaluation of Security and Privacy Protection’, Hellenic Data Protection Authority, 1999–2000.
V. Zorkadis, E. Siougle, ‘Information Security and Privacy Audit Modeling’, Proc. of the 5 th World Multiconference on Circuits, Systems, Communications and Computers, Crete, July 2001
A. Jones, ‘Penetration testing and system audit-Experience gained during the investigation the investigation of systems within the UK’, J. Computers & Security, 16 (1997), pp. 595–602.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Siougle, E.S., Zorkadis, V.C. (2002). A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls. In: Davida, G., Frankel, Y., Rees, O. (eds) Infrastructure Security. InfraSec 2002. Lecture Notes in Computer Science, vol 2437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45831-X_8
Download citation
DOI: https://doi.org/10.1007/3-540-45831-X_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44309-4
Online ISBN: 978-3-540-45831-9
eBook Packages: Springer Book Archive