Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- D13.1: Identity and impact of privacy enhancing technologie.
- D13.1 Addendum: Identity and impact of privacy enhancing technologies.
- D13.3: Study on ID number policies.
- D13.6 Privacy modelling and identity.
- D13.7: Workshop Privacy.
- D14.1: Workshop on Privacy in Business Processes.
- D14.2: Study on Privacy in Business Processes by Identity Management.
- D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
- D14.4: Workshop on “From Data Economy to Secure.
- D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Results
The contributions of the participants in WP14 have been presented, discussed and fixed. Regarding D14.5, a method for the experimental study has been presented and discussed with regard to the participants in the study (students), the kind of personal data to be given to the service providers (modified e-mail addresses and names) and the point at which usage of this data becomes a violation of privacy in a legal sense. Regarding the latter, it was agreed that legal advice from FIDIS partners should be pursued.
Regarding D14.6, a sketch of the table of contents and the schedule was discussed and fixed by the contributors. Legal requirements will be taken into account regarding whether log data can be used as evidence of the misuse of personal data. Secure logging is the foundation for preserving privacy in logging while generating privacy evidence. A result of the discussion is that log data is also personal in nature and should therefore be kept confidential.
5 / 7 |