Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- D13.1: Identity and impact of privacy enhancing technologie.
- D13.1 Addendum: Identity and impact of privacy enhancing technologies.
- D13.3: Study on ID number policies.
- D13.6 Privacy modelling and identity.
- D13.7: Workshop Privacy.
- D14.1: Workshop on Privacy in Business Processes.
- D14.2: Study on Privacy in Business Processes by Identity Management.
- D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
- D14.4: Workshop on “From Data Economy to Secure.
- D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Privacy and Data Protection in Business Processes
The aim of this section is to define the term of privacy for this work and to identify the threats that exist for a customer with single and multi-stage business processes. Section 4.1 lead to an understanding of privacy for business processes. As sensor networks are used for business processes, e.g. by the METRO Future Store, interactions between customers and service providers get unconsented by customers. Personal data is collected without notification. Customers are not aware of the content of their profiles which are created by service providers. Section 4.2 focuses on unconsented profiling and introduces the need for ‘Ambient Law’ as an instrument for customers in order to retrace the collection and use of personal data. Section 4.5 describes privacy threats in general if personal data are disclosed and delegated in business processes. Section 4.4 shows a case study where personal data are used in order to get access on services. Section 4.5 picks up this kind of authorisation and presents in the case study loyalty program profiling as a privacy threat if personal data as access rights are delegated to service providers. Section 4.6 shows privacy threats if software agents get customers’ data act on behalf of them. Section 4.7 summarises the analysis of this chapter.
12 / 38 |