Information Technology Reference
In-Depth Information
4.2
Privacy Architectural Principles,
Constraints, and Assumptions
4.2.1 
PI Business and Technical Principles
4.2.2 
PI Business and Technical Constraints
4.2.3 
PI Business and Technical Assumptions
5
priacy Architecture Views
5.1
People
5.2
Policy
5.3
Business Process
5.4
Systems and Applications
5.5 Data/Information
5.6 Infrastructure
5.6.1  Physical
5.6.2  Technical
6 priacy: A Worklow perspectie
There are many perspectives with which to view privacy. One perspective is a work-
flow. A generic workflow consists of a front office (customer interactions), back
office (processing), and data transmission, in this case the transmission of protected
information.
6.1 Front Office
6.1.1  Protected Information (PI) Creation and Acceptance
6.1.2  PI Owners and Custodians
Search WWH ::




Custom Search