Privacy Technologies
Facebook Twitter LinkedIn

Privacy Protection: Architecture does not compromise, but application often will - what can be done?

Roundtable
Thursday, April 19, 2012 10:30—12:30
Location: Ammersee 2

The presentation will highlight that TAS3 as an architecture, with pair-wise pseudonymous design throughout, will not mandate as a technical requirement for operation any privacy compromise.

However, we are fully aware that users may supply voluntarily to applications (sometimes the apps even have need to know) privacy compromising information. This motivates the legal/audit/accountability (trustworthiness) aspect of TAS3. Given that PII is going to be given to apps by users, there has to be a credible framework in place to ensure it is handled responsibly and Service Providers are held accountable for handling it so.

Subscribe for updates
Please provide your email address