On the Web, information collection and transfer are routine, often conducted by multiple parties in a manner transparent to the user. As more parties are granted access to information, it becomes more challenging to track chains of privacy promises and to enforce them. Tools can help, but tools require descriptions of access privileges, and such descriptions can be hard to formulate when so many parties are involved.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access