•  
  •  
 

Abstract

A common casualty of poor information security is the privacy of the individual. Much has been written about formulating privacy policies, and there has been some work in identifying privacy abuses. This paper brings the two areas together by reviewing some of the key aspects of privacy policy. It presents a taxonomy of privacy abuses distilled from publicly available online reports issued during 2001. The gaps between policy and practice are identified and some solutions put forward to fill those gaps.

Share

COinS