Skip to main content

Privacy Policies and Preferences

  • Reference work entry
  • First Online:
  • 20 Accesses

Definition

Privacy policies describe an enterprise’s data practices, what information is collected from individuals (subjects), what the information (objects) will be used for, whether the enterprise provides access to the information, who the recipients are of any result generated from the information, how long the information will be retained, and who will be informed in the event of a dispute. A subject releases his or her data to the custody of an enterprise while consenting to the set of purposes for which the data may be used. The subject can express his or her preferences in a set of preference rules to make decisions regarding the acceptability of privacy policies.

Historical Background

People have been concerned with privacy policies and preferences for more than 200 years. For example, the Hippocratic oath was written as a guideline of medical ethics for doctors in respect to a patient’s health condition, and states as follows: “Whatsoever things I see or hear concerning the...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Cheng VSY, Hung PCK. Health Insurance Portability and Accountability Act (HIPAA) compliant access control model for web services. Int J Health Inf Syst Inform. 2005;1(1):22–39.

    Google Scholar 

  2. Fischer-Hubner S. IT-security and privacy. Lecture notes in computer science. Berlin/Heidelberg/New York: Springer; 2001.

    Book  MATH  Google Scholar 

  3. Online Privacy Alliance. Effective enforcement of self regulation. Online: http://www.privacyalliance.org/resources/enforcement.shtml

  4. Powers CS, Ashley P, Schunter M. Privacy promises, access control, and privacy management – enforcing privacy throughout an enterprise by extending access control. In: Proceedings of the 3rd International Symposium on Electronic Commerce; 2002. p. 13–21.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick C. K. Hung .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Hung, P.C.K., Zheng, Y., Chow, S. (2018). Privacy Policies and Preferences. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_273

Download citation

Publish with us

Policies and ethics