Five Key Privacy Principles (2024)

Reprinted from Privacy For Business: Web Sites and Email, published by Dreva Hill LLC, all rights reserved..

Fair Information Practice Principles

Basic data privacy principles were being discussed long before the commercialization of the Internet. In 1998, the U.S. Federal Trade Commission reiterated these principles in the context of the Internet when it produced, at the request of the legislative branch, a document called “Privacy Online: A Report to Congress.” The report began by observing that:

“Over the past quarter century, government agencies in the United States, Canada, and Europe have studied the man ner in which entities collect and use personal information-their “information practices”-and the safeguards required to assure those practices are fair and provide adequate privacy protection. The result has been a series of reports, guidelines, and model codes that represent widely-accepted principles concerning fair information practices.”

Since its publication, this report has helped to shape the current “privacy-enforcement” role of the FTC. In this chapter, we focus on the five core principles of privacy protection that the FTC determined were “widely accepted,” namely: Notice/Awareness, Choice/Consent, Access/Participation, Integrity/Security, and Enforcement/Redress.

Notice/Awareness

Notice is a concept that should be familiar to network professionals. Many systems, including many Web sites, put users on notice with respect to ownership, security, and terms of use. Such notice might be a banner that appears during network log-on, warning that access to the network is restricted to authorized users. It might be a splash page for a Web site informing visitors that clicking to enter constitutes agreement to the terms of use. In the context of Web site privacy, notice means you must advise visitors to your site of your policies with respect to the personal data you process. As the FTC puts it:

“Consumers should be given notice of an entity’s information practices before any personal information is collected from them. Without notice, a consumer cannot make an informed decision as to whether and to what extent to disclose personal information. Moreover, three of the other principles (choice/consent, access/participation, and en-forcement/redress) are only meaningful when a consumer has notice of an entity’s policies, and his or her rights with respect thereto.”

In practical terms, the primary means of providing privacy notice to Web site visitors is the privacy statement. For simple sites that set no cookies or receive no user input, such a statement is easy to draft. The more complex and interactive the site, the more work it will take to craft a statement that covers all the bases. Here are the main points that need to be covered:

  • Identification of the entity collecting the data.
  • Identification of the intended use of the data.
  • Identification of any potential recipients of the data.
  • The nature of the data collected and the means by which it is collected, if not obvious (for example, passively, by means of electronic monitoring, or actively, by asking the consumer to provide the information).
  • Whether the provision of the requested data is voluntary or required, and the consequences of a refusal to provide the requested information.
  • The steps taken by the data collector to ensure the confidentiality, integrity, and quality of the data.

Of course, it might not be your job to pull together this information and come up with a privacy statement – in recent years, many large organizations have been appointing chief privacy officers to oversee the creation of privacy policies for the organization and its Web sites. Nevertheless, if you are responsible for the Web site, you may be asked to do some of the work, notably documenting logging activity and the use of cookies. The following sections briefly discuss these issues.

Logging Activity: You need to let visitors to your site know if you use automated tools to log information about their visits (information such as the type of browser and operating system they used to access your site, the date and time they accessed the site, the pages they viewed and the paths that they took through the site).

Use of Web Bugs and Beacons: Use of these techniques should be disclosed, along with a clear statement of how and why they are used, and what information they track.

Use of Cookies: Use of cookies should be disclosed and a distinction should be made between session cookies, which expire when the user closes the Web browser, and persistent cookies, which are downloaded to the user’s machine for future use on the site.

Choice/Consent

Like Notice/Awareness, this second principle should be addressed with honesty and sensitivity. Choice means giving consumers options as to how any personal information collected from them may be used. This relates to secondary uses of information, which the FTC describes as “uses beyond those necessary to complete the contemplated transaction.” The FTC notes that “such secondary uses can be internal, such as placing the consumer on the collecting company’s mailing list in order to market additional products or promotions, or external, such as the transfer of information to third parties.”

Whether or not you are involved in deciding what use is made of personal information that comes from your Web site, you need to know whether you are going to give users of the site any choice in the matter, even if it is something as simple as a check box that says “You may e-mail me about special offers on related products.” As you might expect, privacy advocates prefer the opt-in form of consent, in which people specifically request to be included on a mailing list, rather than opt-out, which adds people to the list by default, until such time as they request to be removed.

Access/Participation

The point of access and participation is to let people about whom you have information find out what that information is, and contest its accuracy and completeness if they believe it is wrong. Many online systems currently lack the means to implement such processes securely. However, access is considered an essential element of fair information practices and privacy protection. In the context of business Web sites, the main obstacle to providing access and participation is a lack of cheap and secure methods of reliably identifying, that is, authenticating, the data subjects.

Compliance with U.S. laws that mandate access, such as the Fair Credit Reporting Act, is accomplished right now through more traditional channels of communication, such as letters and faxes. Both require human participation and review. Unless you have a high level of assurance that you are giving online access to the appropriate person – such as multiple factor authentication – there is a serious risk that providing access in support of privacy will actually lead to privacy breaches (for example, through unauthorized disclosure to someone posing as the data subject).

Watch Out: More and more companies are finding that the cost of communicating with customers via the Web and e-mail is much lower than communicating via voice or paper. Consequently, management will want to explore, sooner or later, data subject access to company PII databases through the Web site and/or e-mail. Unfortunately, until the security of the underlying technology improves, this strategy is fraught with risks, such as unauthorized disclosure through spoofing, pretexting or the interception of unencrypted e-mail. Do not attempt unless management is fully aware of the risks and prepared to fund appropriate levels of additional security.

Integrity/Security

The fourth widely accepted principle is that data be accurate and secure. To assure data integrity, data collectors, like Web sites, must take reasonable steps, such as using only reputable sources of data and cross-referencing data against multiple sources, providing consumer access to data and destroying untimely data or converting it to anonymous form. Security involves both managerial and technical measures to protect against loss and the unauthorized access, destruction, use or disclosure of the data. Managerial measures include internal organizational measures that limit access to data and ensure that those individuals with access do not utilize the data for unauthorized purposes. Technical security measures to prevent unauthorized access include the following:

  • Limiting access through access control lists (ACLs), network passwords, database security and other methods
  • Storing data on secure servers that cannot be accessed via the Internet or modem
  • Encryption of data during transmission and storage (Secure Sockets Layer, or SSL, is considered acceptable when submitting information via a Web site – but note that, unless the client system has a digital certificate or other authentication upon which the server can rely, SSL may not be acceptable for disclosure from server to client).

Enforcement/Redress

The FTC has observed that “the core principles of privacy protection can only be effective if there is a mechanism in place to enforce them.” What that mechanism is for your Web site will depend on several factors. Your Web site may have to comply with specific privacy laws. Your organization may subscribe to an industry code of practice or privacy seal program, both of which may include dispute resolution mechanisms and consequences for failure to comply with program requirements. A private action against your organization is also a possibility if the organization is found to be responsible for a breach of privacy that caused harm to an individual. Class-action lawsuits have also been brought, alleging privacy invasion.

Reprinted from Privacy For Business: Web Sites and Email, published by Dreva Hill LLC, all rights reserved. For ordering information visit drevahill.com/cw or call 1-800-247-6553.

Compliance Headaches

Stories in this report:

  • Compliance Headaches
  • Privacy Potholes
  • Outsourcing: Losing Control
  • Chief Privacy Officers: Hot or Not?
  • Privacy Glossary
  • The Almanac: Privacy
  • The RFID Privacy Scare is Overblown
  • Test Your Privacy Knowledge
  • Five Key Privacy Principles
  • Privacy Payoff: Better Customer Data
  • California Privacy Law a Yawner So Far
  • Five Steps Your Company Can Take To Keep Information Private

Related content

  • how-toMicrosoft OneDrive cheat sheet: Using OneDrive for Web OneDrive for Web lets you save, access, share, and manage your files in the cloud using your favorite browser. Learn how to use its new interface for a big productivity boost.ByHoward Wen07 Jun 202419 minsMicrosoftMicrosoft 365OneDrive
  • tip6 secret settings for a smarter Chrome Android setup Supercharge your smartphone browsing experience with these powerful yet completely concealed options for Google's Chrome Android app.ByJR Raphael07 Jun 202414 minsChromeMobile AppsInternet
  • newsNvidia, Microsoft and OpenAI facing antitrust probes, says report The US Department of Justice and the Federal Trade Commission are coordinating their investigations of the companies, according to a report.ByLynn Greiner07 Jun 20243 minsGenerative AI
  • newsGoogle buys Cameyo to deliver Windows applications on Chromebooks The acquisition cements Google’s relationship with longtime partner Cameyo for delivery of virtualized Windows applications on ChromeOS.ByGyana Swain06 Jun 20243 minsChromebooksDesktop VirtualizationChrome OS

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

Five Key Privacy Principles (2024)

FAQs

What are the key privacy principles? ›

Generally, these principles include: Purpose limitation. Fairness, lawfulness, and transparency. Data minimization.

What are the five key aspects of the data protection Act? ›

There are five key data protection principles that organizations must adhere to: lawful, fair, and transparent processing; purpose limitation; data minimization; accuracy; and storage limitation.

What are the five privacy principles from the GDPR the United States should adopt to advance economic justice? ›

The GDPR provides the following: (1) the right to an explanation about automated decision-making; (2) the right not to be subject to decisions based solely on automated profiling; (3) the right to be forgotten; (4) opportunities for public participation in data processing programs; and (5) robust implementation and ...

What is key privacy? ›

It asks that an eaves- dropper in possession of a ciphertext not be able to tell which specific key, out of a set of known public keys, is the one under which the cipher- text was created, meaning the receiver is anonymous from the point of view of the adversary.

What are the five principles outlined by the Federal Trade Commission that relate to Internet privacy? ›

First, let's outline the five principles outlined by the Federal Trade Commission (FTC) related to internet privacy. They are: 1) Notice/Awareness, 2) Choice/Consent, 3) Access/Participation, 4) Security/Integrity, and 5) Enforcement/Redress.

What are 5 pieces of information that a person should keep private on the Internet? ›

Sharing sensitive information such as your address, phone number, family members' names, car information, passwords, work history, credit status, social security numbers, birth date, school names, passport information, driver's license numbers, insurance policy numbers, loan numbers, credit/ debit card numbers, PIN ...

What are the 4 pillars of privacy? ›

The four pillars of adoption, practice, system, and review are foundational to ensuring preparedness for data privacy within any business organization, especially in the context of complying with regulations like the Digital Personal Data Protection Act, 2023, of India.

What are the elements of privacy? ›

According to Ruth Gavison, there are three elements in privacy: secrecy, anonymity and solitude.

What are the 5 pillars of compliance to the data privacy Act? ›

To ensure data privacy, there are 5 main pillars of data privacy which include: appointment of a data protection officer, conducting of privacy impact assessment (PIA), formulation of a privacy management program (PMP), execution of data privacy and protection measures, and preparation of data breach management ...

What is the 5th principle of data protection? ›

Article 5 of the UK GDPR sets out seven key principles which lie at the heart of the general data protection regime. Article 5(1) requires that personal data shall be: “(a) processed lawfully, fairly and in a transparent manner in relation to individuals ('lawfulness, fairness and transparency');

What 5 data protection principles must the data controller abide by? ›

Lawfulness, fairness and transparency. Purpose limitation. Data minimisation. Accuracy.

What principle 5 states that personal data should only be retained for? ›

Storage Limitation: Personal data should only be kept in a form which permits identification of data subjects for as long as is necessary for the purposes for which the personal data are processed.

What are the principles of privacy in the United States? ›

The principles of the Privacy Act of 1974, commonly referenced as the fair information practice principles (FIPPs), require agencies to comply with statutory norms for collection, maintenance, access, use and dissemination of records.

How many principles are used to go on the protection of data privacy? ›

In simpler terms, the GDPR's data processing requirements are based on 7 fundamental principles for privacy. Familiarizing yourself with these 7 principles will help you grasp the regulations and guidelines more easily. The 7 data protection principles are: Lawfulness, fairness, and transparency.

What are the three 3 general data privacy principles? ›

Section 11 of the law lists the general data privacy principles that apply to the processing of personal data, namely transparency, legitimate purpose, and proportionality.

What are the four elements of privacy? ›

Evaluating the four Ps of privacy is also a process I recommend my law students to follow when attacking their final in my privacy law class. The four Ps of privacy are people, places, platforms, and purposes.

What are the three pillars of privacy? ›

Confidentiality, Integrity and Availability, often referred to as the CIA triad (has nothing to do with the Central Intelligence Agency!), are basic but foundational principles to maintaining robust security in a given environment.

Top Articles
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6114

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.