A conceptual privacy governance framework

被引:2
作者
Swartz, Paulus [1 ]
Da Veiga, Adele [1 ]
Martins, Nico [2 ]
机构
[1] Univ South Africa, Sch Comp, Coll Sci Engn & Technol, Pretoria, South Africa
[2] Univ South Africa, Dept Ind & Org Psychol, Coll Econ & Management Sci, Pretoria, South Africa
来源
2019 CONFERENCE ON INFORMATION COMMUNICATIONS TECHNOLOGY AND SOCIETY (ICTAS) | 2019年
关键词
Privacy; privacy governance; privacy governance framework; Protection of Personal Information Act; POPIA; PROTECTION;
D O I
10.1109/ictas.2019.8703636
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Owing to the growth of technological advancements and the enactment of comprehensive data privacy legislation, organisations must meet the requirements of privacy laws. Organisations must incorporate the protection of personal information in their strategic planning and govern it across the organisation. The purpose of this paper is to propose a conceptual privacy governance framework. This is done by comparing existing privacy governance frameworks and proposing a consolidated framework that incorporates a comprehensive set of privacy components that can assist management in governing privacy across an organisation. Such a framework can serve as a point of reference to assist organisations in obtaining the support of senior management, establishing clear processes and delegating responsibilities to individuals, utilising existing standards, and establishing monitoring and audit practices. The privacy governance framework can help to reinforce privacy protection, enhance the organisation's reputation, foster a culture of privacy and ensure compliance with privacy regulatory requirements.
引用
收藏
页数:6
相关论文
共 33 条
[1]  
AICPA/ CICA, 2011, PRIV MAT MOD
[2]  
Allen & Overy, 2016, EU GEN DAT PROT REG, V1
[3]  
[Anonymous], 2009, GEN ACC PRIV PRINC, P1
[4]  
[Anonymous], 2009, KING COD GOV S AFR 2
[5]  
[Anonymous], 2013, OECD COMMUNICATIONS OUTLOOK 2013
[6]  
Baloch N., 2017, 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), P1
[7]  
Botha J, 2017, INT C CYBER WARFARE, P57
[8]  
CCIM, 2010, COMM PRIV FRAM CCIM
[9]  
Clamp C., 2017, KING III VS KING IV
[10]   Information security culture and information protection culture: A validated assessment instrument [J].
Da Veiga, Adele ;
Martins, Nico .
COMPUTER LAW & SECURITY REVIEW, 2015, 31 (02) :243-256