Guidelines for privacy protection and confidentiality

From wiki.gpii
Jump to: navigation, search

Under Construction / Draft / 

These ethical guidelines have been developed in Prosperity4All, building upon work of Cloud4All. They should be adapted to be valid for the whole GPII.


Guidelines of Prosperity4All (Ethics Manual)

These ethical guidelines have been developed in Prosperity4All, building upon work of Cloud4All. They should be adapted to be valid for the whole GPII.


As many end users in Prosperity4All will not have enough knowledge of legal or technical issues it is necessary to obtain sufficient information from the service provider to resolve concerns about information privacy and security, and to understand the inner workings of the particular service. The Global Public Inclusive Infrastructure (GPII) of Prosperity4All will store its information either locally at the user’s device or within a cloud.

Within cloud computing, different implications of privacy protection and security apply, see Implications of cloud computing in terms of privacy protection and confidentiality for more information.

Prosperity4All and GPII recognize that privacy is important. The user will always have full control of the stored data. Personal data will be kept confidentially and private. Services developed within Prosperity4All and GPII will be in accordance with the guidelines in this document. Some of this information is treated in the section related to the informed consent. See Data Handling for information about who stores the data and whom can be addressed to see / control them. A checklist can be found in Work practices and environments in Prosperity4All Personal data handling and privacy.


Security and Privacy

Already existing, related pages

(those pages will be perhaps linked within this page)

  1. GPII Security Infrastructure
  2. GPII Security Plan
  3. Notes on Security and Privacy
  4. Security and Privacy
  5. Security and Privacy Architectural Research
  6. D104.3 (of Cloud4All)
  7. Architecture security
  8. Prototype Security Gateway Overview
  9. Security FAQ
  10. Security Dashboard
  11. Security Gateway
  12. Security Gateway page
  13. Security Plan
  14. Security Meeting 2015-02-25
  15. Security Meeting 2015-03-03
  16. Security Gateway Deployment Step-by-step
  17. WP Test Scenarios I
  18. WP Test Scenarios II
  19. Security & Payment