Author(s):
1. Siham Arfaoui:
National Institute of Posts and Telecommunications,,Morocco
2. Abdellatif Mezrioui:
National Institute of Posts and Telecommunications,,Morocco
3. Abdelhamid BelmekkI:
National Institute of Posts and Telecommunications,,Morocco
Abstract:
There is no doubt that privacy by design PbD has become a structuring paradigm for personal data protection. Certainly this paradigm has been in use since 1995; however the GDRP "The General Data Protection Regulation", by considering PbD in 2018 as a legal obligation, it testifies the PbD seven principles relevance. Companies are therefore called to put in place technical and organizational measures to integrate PbD into companies. Hence the need for a methodology to provide an exhaustive approach adapted to this implementation. Given the focus of the literature on the implementation of methodologies dedicated to the embodiment of PbD only in software systems, this article aims to propose an ISPM methodology "Information System Privacy Methodology" which focuses on the implementation of PbD in the enterprises architecture, specifically in information systems taking into account all the technical and organizational aspects which must be adopted for the said goal success.
Page(s):
364-375
DOI:
DOI not available
Published:
Journal: International Journal of Communication Networks and Information Security, Volume: 12, Issue: 3, Year: 2020
Keywords:
privacy
,
Information Systems
,
Privacy Enhancing Technologies PET
,
Personal Data
,
Threat Modeling
,
Togaf
,
Linddun
,
ISPM
References:
References are not available for this document.
Citations
Citations are not available for this document.