Difference between revisions of "Guidelines for privacy protection and confidentiality"
m (repaired broken link) |
|||
Line 11: | Line 11: | ||
Within cloud computing, different implications of privacy protection and security apply, see [[Implications of cloud computing in terms of privacy protection and confidentiality|Implications of cloud computing in terms of privacy protection and confidentiality]] for more information. | Within cloud computing, different implications of privacy protection and security apply, see [[Implications of cloud computing in terms of privacy protection and confidentiality|Implications of cloud computing in terms of privacy protection and confidentiality]] for more information. | ||
− | Prosperity4All and GPII recognize that privacy is important. The user will always have full control of the stored data. Personal data will be kept confidentially and private. Services developed within Prosperity4All and GPII will be in accordance with the guidelines in this document. Some of this information is treated in the section related to the informed consent. See [[ | + | Prosperity4All and GPII recognize that privacy is important. The user will always have full control of the stored data. Personal data will be kept confidentially and private. Services developed within Prosperity4All and GPII will be in accordance with the guidelines in this document. Some of this information is treated in the section related to the informed consent. See [[Guidelines_for_Data_Handling|Data Handling]] for information about who stores the data and whom can be addressed to see / control them. A checklist can be found in [[Work Practices and Environments in GPII and P4A Personal Data Handling and Privacy|Work practices and environments in Prosperity4All Personal data handling and privacy]]. |
</div><div><br/></div><div>[[Security and Privacy]]</div> | </div><div><br/></div><div>[[Security and Privacy]]</div> | ||
=== Already existing, related pages === | === Already existing, related pages === | ||
Line 18: | Line 18: | ||
#[[GPII Security Infrastructure|GPII security infrastructure]] | #[[GPII Security Infrastructure|GPII security infrastructure]] | ||
− | #[[ | + | #[[GPII Security Plan|GPII security plan]] |
#[[Notes on Security and Privacy|Notes on security and privacy]] | #[[Notes on Security and Privacy|Notes on security and privacy]] | ||
#[[Security and Privacy|Security and Privacy]] | #[[Security and Privacy|Security and Privacy]] |
Revision as of 09:08, 10 April 2015
Under Construction / Draft /
These ethical guidelines have been developed in Prosperity4All, building upon work of Cloud4All. They should be adapted to be valid for the whole GPII.
Guidelines of Prosperity4All (Ethics Manual)
These ethical guidelines have been developed in Prosperity4All, building upon work of Cloud4All. They should be adapted to be valid for the whole GPII.
As many end users in Prosperity4All will not have enough knowledge of legal or technical issues it is necessary to obtain sufficient information from the service provider to resolve concerns about information privacy and security, and to understand the inner workings of the particular service. The Global Public Inclusive Infrastructure (GPII) of Prosperity4All will store its information either locally at the user’s device or within a cloud.
Within cloud computing, different implications of privacy protection and security apply, see Implications of cloud computing in terms of privacy protection and confidentiality for more information.
Prosperity4All and GPII recognize that privacy is important. The user will always have full control of the stored data. Personal data will be kept confidentially and private. Services developed within Prosperity4All and GPII will be in accordance with the guidelines in this document. Some of this information is treated in the section related to the informed consent. See Data Handling for information about who stores the data and whom can be addressed to see / control them. A checklist can be found in Work practices and environments in Prosperity4All Personal data handling and privacy.
(those pages will be perhaps linked within this page)
- GPII security infrastructure
- GPII security plan
- Notes on security and privacy
- Security and Privacy
- Security and Privacy Architectural Research
- D104.3 (of Cloud4All)
- Architecture security
- Prototype Security Gateway Overview
- Security FAQ
- Security Dashboard
- Security Gateway
- Security Gateway page
- Security Plan
- Security Meeting 2015-02-25
- Security Meeting 2015-03-03
- Security Gateway Deployment Step-by-step
- WP Test Scenarios I
- WP Test Scenarios II
- Security & Payment