Difference between revisions of "Guidelines for privacy protection and confidentiality"

From wiki.gpii
Jump to: navigation, search
m (repaired broken link)
Line 11: Line 11:
 
Within cloud computing, different implications of privacy protection and security apply, see [[Implications of cloud computing in terms of privacy protection and confidentiality|Implications of cloud computing in terms of privacy protection and confidentiality]] for more information.
 
Within cloud computing, different implications of privacy protection and security apply, see [[Implications of cloud computing in terms of privacy protection and confidentiality|Implications of cloud computing in terms of privacy protection and confidentiality]] for more information.
  
Prosperity4All and GPII recognize that privacy is important. The user will always have full control of the stored data. Personal data will be kept confidentially and private. Services developed within Prosperity4All and GPII will be in accordance with the guidelines in this document. Some of this information is treated in the section related to the informed consent. See [[Data Handling|Data Handling]] for information about who stores the data and whom can be addressed to see / control them. A checklist can be found in [[Work Practices and Environments in GPII and P4A Personal Data Handling and Privacy|Work practices and environments in Prosperity4All Personal data handling and privacy]].
+
Prosperity4All and GPII recognize that privacy is important. The user will always have full control of the stored data. Personal data will be kept confidentially and private. Services developed within Prosperity4All and GPII will be in accordance with the guidelines in this document. Some of this information is treated in the section related to the informed consent. See [[Guidelines_for_Data_Handling|Data Handling]] for information about who stores the data and whom can be addressed to see / control them. A checklist can be found in [[Work Practices and Environments in GPII and P4A Personal Data Handling and Privacy|Work practices and environments in Prosperity4All Personal data handling and privacy]].
 
</div><div><br/></div><div>[[Security and Privacy]]</div>
 
</div><div><br/></div><div>[[Security and Privacy]]</div>
 
=== Already existing, related pages&nbsp; ===
 
=== Already existing, related pages&nbsp; ===
Line 18: Line 18:
  
 
#[[GPII Security Infrastructure|GPII security infrastructure]]
 
#[[GPII Security Infrastructure|GPII security infrastructure]]
#[[GPII_Security_Plan|GPII security plan]]
+
#[[GPII Security Plan|GPII security plan]]
 
#[[Notes on Security and Privacy|Notes on security and privacy]]
 
#[[Notes on Security and Privacy|Notes on security and privacy]]
 
#[[Security and Privacy|Security and Privacy]]
 
#[[Security and Privacy|Security and Privacy]]

Revision as of 09:08, 10 April 2015

Under Construction / Draft / 

These ethical guidelines have been developed in Prosperity4All, building upon work of Cloud4All. They should be adapted to be valid for the whole GPII.


Guidelines of Prosperity4All (Ethics Manual)

These ethical guidelines have been developed in Prosperity4All, building upon work of Cloud4All. They should be adapted to be valid for the whole GPII.


As many end users in Prosperity4All will not have enough knowledge of legal or technical issues it is necessary to obtain sufficient information from the service provider to resolve concerns about information privacy and security, and to understand the inner workings of the particular service. The Global Public Inclusive Infrastructure (GPII) of Prosperity4All will store its information either locally at the user’s device or within a cloud.

Within cloud computing, different implications of privacy protection and security apply, see Implications of cloud computing in terms of privacy protection and confidentiality for more information.

Prosperity4All and GPII recognize that privacy is important. The user will always have full control of the stored data. Personal data will be kept confidentially and private. Services developed within Prosperity4All and GPII will be in accordance with the guidelines in this document. Some of this information is treated in the section related to the informed consent. See Data Handling for information about who stores the data and whom can be addressed to see / control them. A checklist can be found in Work practices and environments in Prosperity4All Personal data handling and privacy.


Security and Privacy

Already existing, related pages 

(those pages will be perhaps linked within this page)

  1. GPII security infrastructure
  2. GPII security plan
  3. Notes on security and privacy
  4. Security and Privacy
  5. Security and Privacy Architectural Research
  6. D104.3 (of Cloud4All)
  7. Architecture security
  8. Prototype Security Gateway Overview
  9. Security FAQ
  10. Security Dashboard
  11. Security Gateway
  12. Security Gateway page
  13. Security Plan
  14. Security Meeting 2015-02-25
  15. Security Meeting 2015-03-03
  16. Security Gateway Deployment Step-by-step
  17. WP Test Scenarios I
  18. WP Test Scenarios II
  19. Security & Payment