Cannon_index.qxd 8/24/04 1:20 PM Page 327

= Index

A automatic updates, 64-65 accept lists, spam, 85 centralized privacy settings, 32-33 access cookies, 24, 159-165 control, 36 CPG, 120-123 databases CPO, 119 data minimization, 248-251 databases, 272 data obfuscation, 252-253 DRM, 289 data perturbation, 262-265 applications, 297-298 data quantization, 254 defending privacy, 290 management, 272 development, 298-299 physical security, 245 DMCA, 290 programmatic security, 246-247 languages, 292-296 transaction auditing, 247-248 methods of copyright, 291 Web sites, 148-149 GPO, 76 accounts, e-mail, 89 Group Policy, 55-63 ACLU (American Civil Liberties Help and Support Center, 56 Union), 101 IRM, 37 addresses Linux-based configuration, 33 IP Office 2003, 69-73 GUIDs, 9 My Recent Documents, 66 logging, 148-149 papers (), 54 privacy, 19 policies, 12 .adm files (administrative template), privacy hierarchies, 124 creating, 74-76 assigning privacy leads, 126 administration creating privacy councils, 124 .adm files, 74-76 developing privacy standards, Authorization Manager, 279, 126-127 285-287

327 Cannon_index.qxd 8/24/04 1:15 PM Page 328

328 Index privacy response centers privacy response teams, 190 manual processes, 139-141 product release, 190 monthly reporting, 142 starting, 176-182 need for, 132 testing, 188 organization of, 133-135 headers, 87 resources, 142-143 specifications, 192 workflow, 135-137 data analysis, 194-195 privacy reviews, 204, 206 dependency analysis, 202 meetings, 207 disclosure plans, 200-202 scope, 208 entity description, 203 team members, 206-207 phone home disclosure, 202-203 templates, 208-211 security analysis, 197-198 spam, 80 usage analysis, 196-197 anti-spam applications, 85-91 user access analysis, 199 bulk e-mail solutions, 94 user control analysis, 198 controlling, 83-84 templates, 307 cost of, 80-81 trend, 139-141 e-mail solutions, 93 anonymity, PATs/PETs, 18 litigation, 82 anonymizers, 19-21 server-side anti-spam applications, anonymous e-mail Web sites, 20 91-92 anti-spam WER, 57-63 applications, 83-92 WMP9, 67-69 policies, 84 administrative template (.adm) files, tools, 22 creating, 74-76 APPEL, 171-172 advertisements applications cookie managers, 24 anti-spam, 83-92 popup blockers, 22-23 context-level application spyware, 23 decomposition, 217 Alexa Toolbar, 43 databases algorithms, 259. See also encryption configuring, 276-278 American Civil Liberties Union creating, 272 (ACLU), 101 program files, 274-275 analysis, 180 testing, 280-287 development, 187-188 decomposition rollup, 221-222, 225 beta release, 189 development, 176 code complete, 189 exposure, 5, 7 deployment guides, 191 Group Policy management, 55-56 design, 186-187 level 0 application documentation, 182-186 decomposition, 218 feature complete, 187 Cannon_index.qxd 8/24/04 1:15 PM Page 329

Index 329 MFCs C design, 228-230 CADP (correlated-noise additive data disclosure, 233-235 perturbation), 265 encryption, 240-241 calculations, perturbation, 266 files, 231-232 CAN-SPAM (Controlling the Assault installing, 231 of Non-Solicited Pornography and privacy settings, 236-238 Marketing), 89 Microsoft Office 2003, 69-73 CAPICOM (Crypto Application onion routing, 21 Programming Interface PATs, 36-37 ) privacy library, 273, 279 settings, 29-33 categorization statements, 7-8 data, 251 rights management, 297-298 databases, 272 spam, 84 quantization, 254 spyware, 23 Cavoukian, Ann, 13 tracking, 9-10 centralized privacy setting WER, 61-63 management, 32-33 asymmetric encryption, 260 certification, privacy-certification AT&T Privacy Bird, 166 programs, 51 attachments, 91. See also e-mail; spam CES (Contract Enabled Server), 295 audio, WMP9, 67-69 CFAA (Computer Fraud and Abuse audits, transactions, 247-248 Act), 41, 50 authorization, 19 challenge-response, spam, 86 automatic updates, 64-65 checklists, Web sites, 311-313 Avant, 166 Chief Privacy Officer (CPO), 119 AzMan (Authorization Manager), Children’s Online Privacy Protection 279, 285-287 Act (COPPA), 49-50 classification of data, 250-251 B clearing Backscatter x-ray devices, 110 files, 35 Bayesian filters, spam, 88 histories, 21 beta release phase, 189. See also client-side antispam solutions, 90-91 development client-side components, 303-304 block lists, 86, 91-92 Clip Art tool, 6 blocking RFID tags, 99 clothing, privacy-invasive devices boundaries, DFDs, 219 under, 109-110 branch offices, 134-135 code Brandeis, Louis D., 80 APPEL, 171-172 building privacy-aware complete phase, 189. See also applications, 176 development bulk e-mail, 94 Cannon_index.qxd 8/24/04 1:15 PM Page 330

330 Index collection Group Policy, 55-56 control of data collection, 316 Linux-based, 33 of personal information, 148-149 Microsoft Office 2003, 69-73 privacy policies, 117 My Recent Documents, 66 collusion, avoiding, 248 privacy settings, 29-33 column-count limitations, queries, 257 WER, 61-63 columns dialog categorization, 272 box, 58 security, 247 WMP9, 67-69 commands, Help and Support (Start connections menu), 56 phone home disclosure, 202-203 compact policy (P3P), 158, 186 security, 301 compliance, planning, 178 ContentGuard, 298 component teams, privacy hierarchies, context-level application 124-127 decomposition, 217 components Contract Enabled Server (CES), 295 client-side, 303-304 control privacy-process flowcharts, 178-180 access, 36 Web services, 304 of data collection, 316 Computer Fraud and Abuse Act spam, 83-84 (CFAA), 41, 50 Controlling the Assault of Non- computers Solicited Pornography and data minimization, 248-251 Marketing (CAN-SPAM) Act, 89 data obfuscation, 252-253 cookies, 24, 148-149, 159 data perturbation, 262-265 COPPA (Children’s Online Privacy data quantization, 254 Protection Act), 49-50 physical security, 245 copyrights, 289 programmatic security, 246-247 applications, 297-298 transaction auditing, 247-248 defending privacy, 290 concealing data (obfuscation), development, 298-299 252-253 DMCA, 290 configuration languages, 292-296 .adm files, 74-76 methods, 291 Authorization Manager, 279, corporate policies, 12 285-287 Corporate Privacy Group (CPG), automatic updates, 65 120-123 databases, 272 correlated-noise additive data executing, 276-278 perturbation (CADP), 265 program files, 274-275 costs testing, 280-287 right languages, 296 GPO, 76 spam, 80-81 Cannon_index.qxd 8/24/04 1:15 PM Page 331

Index 331 councils, creating, 124 hippocratic, 266-268 CPG (Corporate Privacy Group), 120- linking, 134-135 123, 133-135 management, 272 CPO (Chief Privacy Officer), 119 physical security, 245 crowds, 21 program files, 274-275 Crypto Application Programming programmatic security, 246-247 Interface Component Object queries, 256-257 Model (CAPICOM) library, suppression, 258 273, 279 testing, 280-287 customer service transaction auditing, 247-248 privacy response centers translucent, 252 manual processes, 139-141 dataflow diagrams (DFDs), 213-217 monthly reporting, 142 context-level application need for, 132 decomposition, 217 organization of, 133-135 decomposition rollup, 221-222, 225 resources, 142-143 level 0 application workflow, 135-137 decomposition, 218 providing, 129-132 privacy boundaries, 219 customization. See also configuration privacy-aware applications, 228-230 .adm files, 74-76 decomposition GPO, 76 context-level application Microsoft Office 2003, 69-71, 73 decomposition, 217 My Recent Documents, 66 level 0 application Customize Start Menu dialog box, 66 decomposition, 218 rollup, 221-222, 225 D defending privacy, 290 data analysis, 194-195, 307. See also defining, tracking, 9-10 analysis deleting data classification/isolation, 250-251 files, 25 data minimization, 248-251 hidden data, 73 data obfuscation, 252-253 Deloitte and Touche, privacy data perturbation, 262-265 training, 177 data quantization, 254 demographics, 263 data retention policies, 249 departmental flow of privacy databases policies, 122 configuring, 276, 278 dependency analysis, 202 data minimization, 248-251 deployment data obfuscation, 252-253 guides, 186, 191 data perturbation, 262-265 P3P, 150-151 data quantization, 254 compact policy, 158 encryption, 258-262 policy files, 153-157 Cannon_index.qxd 8/24/04 1:15 PM Page 332

332 Index reference files, 151-153 specifications, 192 design. See also configuration data analysis, 194-195 applications, 228-230 dependency analysis, 202 disclosure, 233-235 disclosure plans, 200-202 encryption, 240-241 entity description, 203 files, 231-232 phone home disclosure, 202-203 installing, 231 security analysis, 197-198 phase, 186-187. See also development usage analysis, 196-197 privacy settings, 236-238 user access analysis, 199 destinations, mix networks, 20 user control analysis, 198 development, 187-188 standards, 315-317 applications, 5 starting, 176-182 beta release, 189 testing, 188 code complete, 189 training programs, 177 deployment guides, 191 trustworthiness, 11-12 design, 186-187 devices, 97 documentation, 182-186 legal view of, 110-111 DRM, 298-299 nTag smart ID badges, 107 feature complete, 187 RFID tags, 98-105 legislation, 41-43 smart dust, 108-109 CFAA, 50 Spotme conferencing devices, COPPA, 49-50 106-107 EU directives on data protection, under clothing, 109-110 45-46 DFDs (dataflow diagrams), 213-217 GLBA, 50 context-level application HIPAA, 51 decomposition, 217 OECD, 44-45 decomposition rollup, 221-222, 225 PIPEDA, 46 level 0 application privacy-certification programs, 51 decomposition, 218 regulations, 42 privacy boundaries, 219 Safe Harbor Privacy Principles, privacy-aware applications, 228-230 47-49 diagrams (DFDs), 213-217 need for, 10-11 context-level application phases, 302 decomposition, 217 planning, 178 decomposition rollup, 221-222, 225 policies, 12 level 0 application privacy response teams, 190 decomposition, 218 product release, 190 privacy boundaries, 219 spam, 84 dialog boxes Automatic Updates, 64 Customize Start Menu, 66 Cannon_index.qxd 8/24/04 1:15 PM Page 333

Index 333 Logging Properties, 249 DFDs, 213-217 popup blockers, 22-23 context-level application Windows Error Reporting, 34, decomposition, 217 57-58 decomposition rollup, WMP9 Privacy, 67 221-222, 225 Digital Millennium Copyright Act level 0 application (DMCA), 290 decomposition, 218 Digital Property Rights Language privacy boundaries, 219 (DPRL), 292 Information Rights Management, 73 digital rights management (DRM), 289 Microsoft Office 2003, 69-73 applications, 297-298 My Recent Documents, 66 defending privacy, 290 privacy development, 298-299 data, 36 DMCA, 290 disclosure (Microsoft Windows), languages, 292-296 53-54 methods of copyright, 291 flowcharts, 178-180 disclosure issues, 139-141 phone home disclosure, 202-203 reviews, 186 planning, 180, 200-202 statements, 185. See also privacy privacy statements content, 309 Domain Name System (DNS), 87 documents (Microsoft Windows), DoubleClick, privacy legislation, 42 53-54 DPRL (Digital Property Rights privacy-aware applications, 233-235 Language), 292 standards, 316 DRM (digital rights management), 289 DMCA (Digital Millennium applications, 297-298 Copyright Act), 290 defending privacy, 290 DNS (Domain Name System), 87 development, 298-299 documentation DMCA, 290 development, 187-188 languages, 292-296 beta release, 189 methods of copyright, 291 code complete, 189 deployment guides, 191 E design, 186-187 E-mail Service Provider Coalition feature complete, 187 (ESPC), 94 phases, 182-186 EFF (Electronic Frontier privacy response teams, 190 Foundation), 101 product release, 190 Electronic Media Management System testing, 188 (EMMS), 297 Electronic Privacy Information Center (EPIC), 101 Cannon_index.qxd 8/24/04 1:15 PM Page 334

334 Index elements execution compact policy (P3P), 158 Authorization Manager, 279, P3P policy files, 155 285-287 email databases, 276, 278 accounts, 89 exposure anonymous Web sites, 20 applications, 5, 7 bulk e-mail solutions, 94 ISP, 4-5 spam, 93 eXtensible Markup Language tracking, 4-5 (XML), 185 unsolicited, 9. See also spam eXtensible Rights Markup Language EMMS (Electronic Media (XrML), 292 Management System), 297 employees, avoiding collusion, 248 F encryption, 258-262, 273 Fair Information Practices, 316 JANUS routing, 21 feature complete phase, 187. See also mix networks, 20 development PATs, 36-37 features privacy-aware applications, 240-241 privacy (PATs), 27 end-user license agreement (EULA), 41 right languages, 296 enforcement of privacy policies Federal Trade Commission (FTC), Fair adherence to, 117 Information Practices, 316 lack of, 116 files Entertainment Software Rating Board .adm, 74-76 (ESRB), 51 PATs, 35 entity description, 203 policy (P3P), 153-157, 186 EPIC (Electronic Privacy Information privacy-aware applications, 231-232 Center), 101 program, 274-275 Ernst and Young, privacy reference (P3P), 151-153, 185 training, 177 secure deletion, 25 errors SQM, 36 Group Policy, 61-63 Web, 276-278 WER, 57-61 filtering ESPC (E-mail Service Provider client-side antispam solutions, 90-91 Coalition), 94 spam, 88 ESRB (Entertainment Software Rating flow of privacy policies to departments, Board), 51 122. See also workflow EU (European Union) directives on flowcharts, privacy-process, 178-180 data protection, 45-46 foreign subsidiaries, 134-135 EULA (end-user license agreement), 41 forms, online, 141 Excel, data analysis templates, 307 frequencies, RFID tags, 98-105 Cannon_index.qxd 8/24/04 1:15 PM Page 335

Index 335 FTC (Federal Trade Commission), Fair assigning privacy leads, 126 Information Practices, 316 creating privacy councils, 124 full-text privacy statements, 185. See developing privacy standards, also privacy statements 126-127 HIPAA (Health Information G Portability and Accountability GADP (general method for additive Act), 51, 266 data perturbation), 266 hippocratic databases, 266-268 GLBA (Gramm-Leach-Billey Act), histories 50, 266 clearing tools, 21 globalization, 183 My Recent Documents, 66 globally unique identifier (GUID), 9 honeypots, spam, 89 GPMC (Group Policy Management HTTP (HyperText Transfer Console), 55, 231 Protocol), 147 GPO (Group Policy object), 56, 76 GPOE (Group Policy Object I Editor), 231 IAPP (International Association of Group Policy Privacy Professionals), 119 management, 55-56 IBM Tivoli Privacy Manager objects, 56, 76 (TPM), 268 WER, 61-63 identity Group Policy Management Console anonymous e-mail Web sites, 20 (GPMC), 55, 231 JANUS routing, 21 Group Policy Object Editor images, spam, 87 (GPOE), 231 impact of privacy, risk mitigation, groups 302-304 integration of privacy response implementation centers, 133 privacy policies, 116-117 routing (crowds), 21 validation, 188 GUID (globally unique identifier), 9 Information Rights Management (IRM), 37, 73, 298 H infrastructure hashing, 86, 260-261 adherence to, 117 headers lack of, 116 analysis, 87 installation of privacy-aware P3P, 153 applications, 231 Help and Support Center, 56 integration heuristics, spam, 87 development, 187-188 hiding data, 73, 252-253 beta release, 189 hierarchies (privacy), 124 code complete, 189 Cannon_index.qxd 8/24/04 1:15 PM Page 336

336 Index data analysis specifications, P3P, 159 194-195 AT&T Privacy Bird, 166 dependency analysis Avant, 166 specifications, 202 , 160-161 deployment guides, 191 Mozilla, 162-163 design, 186-187 Mozilla Firebird, 165 disclosure plans, 200-202 Netscape, 165 documentation, 182-186 Opera, 162 entity description, 203 privacy settings, 29-33 feature complete, 187 Ximian, 33 phone home disclosure, 202-203 International Association of Privacy privacy response teams, 190 Professionals (IAPP), 119 product release, 190 Internet security analysis specifications, application vulnerabilities, 5, 7 197-198 connections, 202-203 specifications, 192 logging, 4-5 starting, 176-182 PETs testing, 188 anonymizers/pseudonymizers, usage analysis specifications, 19-21 196-197 antispam tools, 22 user access analysis cookie managers, 24 specifications, 199 history clearing tools, 21 user control analysis online privacy protection Web specifications, 198 sites, 25 P3P, 7, 28-29, 234 popup blockers, 22-23 AT&T Privacy Bird, 166 secure file deletion, 25 Avant, 166 spyware, 23 compact policy, 158 tracking, 9-10 Internet Explorer, 160-161 Internet Explorer Mozilla, 162-163 cookie managers, 24 Mozilla Firebird, 165 P3P, 160-161 Netscape, 165 popup blockers, 22-23 Opera, 162 Internet service provider (ISP), 4 policy files, 153-157 inventories, development reference files, 151-153 planning, 178 phases, 302 IP (Internet Protocol) privacy response centers, 133 addresses, 148-149 interfaces GUIDs, 9 cookie managers, 24 IRM (Information Rights Cannon_index.qxd 8/24/04 1:15 PM Page 337

Index 337 Management), 37, 73, 298 OECD, 44-45 ISO MPEG REL, 294 PIPEDA, 46 isolation of data, 250-251 privacy-certification programs, 51 ISP (Internet service provider), 4 regulations, 42 Safe Harbor Privacy Principles, J-K 47-49 JANUS routing, 21 spam, 89 JRC (Joint Research Centre), 170 length of encryption keys, 262 Katz v. United States, 110 level 0 application decomposition, 218 keys, encryption, 262 liabilities, 41-43 keyword-searches, spam, 86 CFAA, 50 COPPA, 49-50 L EU directives on data protection, languages 45-46 APPEL, 171-172 GLBA, 50 rights management, 292-296 HIPAA, 51 Lawler, Barbara, 12 OECD, 44-45 leads, creating, 126 PIPEDA, 46 legal liabilities, 41-43 privacy-certification programs, 51 CFAA, 50 regulations, 42 COPPA, 49-50 Safe Harbor Privacy Principles, EU directives on data protection, 47-49 45-46 libraries, CAPICOM, 273, 279 GLBA, 50 lifecyles of data, 130 HIPAA, 51 limitations of queries, 256-257 OECD, 44-45 linking subsidiary databases, 134-135 PIPEDA, 46 Linux-based configuration privacy-certification programs, 51 management, 33 regulations, 42 litigation Safe Harbor Privacy Principles, CPG, 120-123 47-49 CPO, 119 legal view of privacy-invasive devices, privacy-invasive devices, 110-111 110-111 spam, 82 legislation, 41, 43 localization, 183 CAN-SPAM, 89 locations, privacy, 19 CFAA, 50 logging, 4-5 COPPA, 49-50 Logging Properties dialog box, 249 EU directives on data protection, lookups, reverse DNS, 87 45-46 GLBA, 50 HIPAA, 51 Cannon_index.qxd 8/24/04 1:15 PM Page 338

338 Index M privacy reviews, 204-206 management meetings, 207 .adm files, 74-76 scope, 208 Authorization Manager, 279, team members, 206-207 285-287 templates, 208-211 automatic updates, 64-65 spam, 80 centralized privacy settings, 32-33 anti-spam applications, 85-91 cookies, 24, 159-165 bulk e-mail solutions, 94 CPG, 120-123 controlling, 83-84 CPO, 119 cost of, 80-81 databases, 272 e-mail solutions, 93 DRM, 289 litigation, 82 applications, 297-298 server-side anti-spam applications, defending privacy, 290 91-92 development, 298-299 WER, 57-63 DMCA, 290 WMP9, 67-69 languages, 292-296 manual processes, privacy response methods of copyright, 291 centers, 139-141 GPO, 76 MediaPro privacy training, 177 Group Policy, 55-63 meetings, privacy reviews, 207 Help and Support Center, 56 metadata settings, Microsoft IRM, 37 Office 2003, 71 Linux-based configuration, 33 MFC (Microsoft Foundation Class) Microsoft Office 2003, 69-73 applications My Recent Documents, 66 design, 228-230 papers (Microsoft Windows), 54 disclosure, 233-235 policies, 12 encryption, 240-241 privacy hierarchies, 124 files, 231-232 assigning privacy leads, 126 installing, 231 creating privacy councils, 124 privacy settings, 236-238 developing privacy standards, Microsoft Knowledge Base 126-127 Web site, 56 privacy response centers Microsoft Office 2003, management, manual processes, 139-141 69-73 monthly reporting, 142 Microsoft privacy legislation, 43 need for, 132 Microsoft Windows organization of, 133-135 automatic updates, 64-65 resources, 142-143 My Recent Documents, 66 workflow, 135-137 privacy disclosure documents, 53-54 WMP9, 67-69 Cannon_index.qxd 8/24/04 1:15 PM Page 339

Index 339 Microsoft Windows Active Directory O domain, privacy settings, 32 obfuscation, data, 252-253 Microsoft Word 2003, exposure, 6 objects minimization of data, 248-251 creating, 76 mitigation GPO, 56 CPG, 120-123 obtaining RFID tags, 105 CPO, 119 ODRL (Open Digital Rights privacy reviews Language), 294-298 management, 204, 206 OeBF (Open eBook Forum), 294 meetings, 207 OECD (Organization for Economic scope, 208 Co-operation and Development), starting, 204 44-45 team members, 206-207 Office 2003, management, 69-73 templates, 208-211 OMA (Open Mobile Alliance), 295 risks, 302-304 onion routing, 21 mix networks, 20 online Help, 56 monitoring databases online privacy forms, 141 data minimization, 248-251 online privacy protection Web sites, 25 data obfuscation, 252-253 OnStar system, 97 data perturbation, 262-265 Open Digital Rights Language data quantization, 254 (ODRL), 294-298 physical security, 245 Open eBook Forum (OeBF), 294 programmatic security, 246-247 Open Mobile Alliance (OMA), 295 transaction auditing, 247-248 OpenIPMP, 297 monthly reports, privacy response Opera centers, 142 cookie managers, 24 Mozilla, 162-165 P3P, 162 MPEG (Moving Picture Experts Organization for Economic Group), 293 Co-operation and Development My Recent Documents, 66 (OECD), 44-45

N P Netscape P3P (Platform for Privacy Preferences cookie managers, 24 Project), 7 P3P, 165 APPEL, 171-172 networks, mix, 20 compact policy, 158, 186 nodes, destinations, 20 deploying, 150-151 Nokia, 298 integration, 28-29, 234 nTag smart ID badges, 107 interfaces, 159 Cannon_index.qxd 8/24/04 1:15 PM Page 340

340 Index AT&T Privacy Bird, 166 personally identifiable information Avant, 166 (PII), 302 Internet Explorer, 160-161 personnel, privacy response centers, Mozilla, 162-163 142-143 Mozilla Firebird, 165 perturbation, data, 262-263, 265 Netscape, 165 PETs (privacy enhancing Opera, 162 technologies), 17 Policy Editor, 185 anonymizers/pseudonymizers, policy files, 153-157, 186 19, 21 reference files, 151-153, 185 antispam tools, 22 tools, 167 cookie managers, 24 JRC, 170 goal of, 18 P3PEdit, 169-170 history clearing tools, 21 Policy Editor, 168 online privacy protection Validator, 169 Web sites, 25 Passive Millimeter Wave overview of, 19 (PMMW), 109 popup blockers, 22-23 Patriot Act, 266 secure file deletion, 25 PATs (privacy aware technologies), 17 spyware, 23 access control, 36 phases documentation of privacy-related data analysis, 194-195 data, 36 dependency analysis, 202 encryption, 36-37 development, 187-188 features, 27 beta release, 189 files, 35 code complete, 189 goal of, 18 deployment guides, 191 overview of, 25-27 design, 186-187 P3P integration, 28-29 documentation, 182-186 privacy settings, 29-33 feature complete, 187 privacy statements, 28 privacy response teams, 190 unscribing, 36 product release, 190 Windows Error Report, 33 starting, 176-182 payment at risk, spam, 88 testing, 188 permissions, legal liabilities, 41 disclosure plans, 200-202 personal information entity description, 203 clearing, 35 integration, 302 collection of, 148-149 phone home disclosure, 202-203 Personal Information Protection security analysis, 197-198 and Electronic Documents (PIPEDA), 46 Cannon_index.qxd 8/24/04 1:15 PM Page 341

Index 341 usage analysis, 196-197 anti-spam, 84 user access analysis, 199 compact (P3P), 158, 186 user control analysis, 198 CPG, 120-123 philosophy of privacy standards, 315 CPO, 119 phishing, 82 data retention, 249 physical security of computers, 245 files (P3P), 153-157,186 PII (personally identifiable Group Policy, 55-56 information), 302 retention, 317 PIPEDA (Personal Information statements, 153-157 Protection and Electronic WER, 61-63 Documents), 46 popup blockers, 22-23 planning privacy compliance, 178 need for, 10-11 disclosure, 180, 200, 202 value of, 13 Platform for Privacy Preferences Privacy Council, The, 177 Project (P3P) privacy councils, creating, 124 APPEL, 171-172 privacy disclosure document, 53-54 compact policy, 158, 186 privacy leads, 126 deploying, 150-151 privacy policies integration, 28-29, 234 adherence to, 117 interfaces, 159 CPG, 120-123 AT&T Privacy Bird, 166 CPO, 119 Avant, 166 lack of, 116 Internet Explorer, 160-161 privacy response centers Mozilla, 162-163 customer service, 129-132 Mozilla Firebird, 165 manual processes, 139-141 Netscape, 165 monthly reporting, 142 Opera, 162 need for, 132 Policy Editor, 185 organization of, 133-135 policy files, 153-157, 186 resources, 142-143 reference files, 151-153, 185 workflow, 135-137 tools, 167 privacy response teams, 190. See also JRC, 170 development P3PEdit, 169-170 privacy reviews, 186 Policy Editor, 168 management, 204-206 Validator, 169 meetings, 207 PMW (Passive Millimeter Wave), 109 scope, 208 policies team members, 206-207 adherence to, 117 templates, 208-211 Cannon_index.qxd 8/24/04 1:15 PM Page 342

342 Index starting, 204 code complete, 189 templates, 305 design, 186-187 validation, 188 feature complete, 187 privacy settings, 29-33, 236-238 phases, 181-186 privacy specifications, 192 privacy response teams, 190 data analysis, 194-195 product release, 190 dependency analysis, 202 testing, 188 disclosure plans, 200-202 product groups, integration of privacy entity description, 203 response centers, 133 phone home disclosure, 202-203 product plans, assigning privacy security analysis, 197-198 leads, 126 usage analysis, 196-197 product release phase, 190. See also user access analysis, 199 development user control analysis, 198 program files, databases, 274-275 privacy standards, creating, 126-127 programmatic security, 246-247 privacy statements, 7-8, 185, 309 programs. See applications Microsoft Windows, 54 protection PATs, 28 databases privacy-aware applications data minimization, 248-251 design, 228-230 data obfuscation, 252-253 disclosure, 233-235 data perturbation, 262-265 encryption, 240-241 data quantization, 254 files, 231-232 physical security, 245 installing, 231 programmatic security, 246-247 privacy settings, 236-238 transaction auditing, 247-248 privacy-aware technologies. See PATs translucent databases, 252 privacy-certification programs, 51 protocols privacy-enhancing technologies. HTTP, 147 See PETs TCP/IP, 147 privacy-invasive devices, 97 PSample program, 228-230 legal view of, 110-111 pseudonymity, 18 nTag smart ID badges, 107 pseudonymizers, 19-21 RFID tags, 98-105 smart dust, 108-109 Q-R Spotme conferencing devices, quantization, data, 254 106-107 query-type limitations, 258 under clothing, 109-110 Quicken 2003, 6 privacy-process flowcharts, 178-180 Radar-Based Through-the-Wall product development Surveillance System, 106 beta release, 189 Cannon_index.qxd 8/24/04 1:15 PM Page 343

Index 343 radio frequency identification (RFID) Rights Meta Data for Open Archiving tags, 98-105 (RoMEO), 295 RealNetworks, privacy legislation, 42 risks, 301-304 RealOne Player, exposure, 6 RMS (Windows Rights Management recording, privacy issues, 139-141 Services), 297-299 Red Carpet Enterprise, 33 rollup, decomposition, 221-222, 225 reduction, data, 249 RoMEO (Rights Meta Data for Open reference files (P3P), 151-153, 185 Archiving), 295 regulations (privacy legislation), 42 routing relationships, creating, 11-12 groups (crowds), 21 releases, deployment guides, 191. See JANUS, 21 also development onion, 21 Remove Hidden Data Tool (Microsoft rows. See also databases Office), 73 categorization, 272 reports security, 247 Group Policy Management console, 77 S privacy response centers, 142 SADP (simple additive data WER, 57-63 perturbation), 265 requests, crowds, 21 Safe Harbor Privacy Principles, 47-49, resources, 142-143, 319-326 311-313 restrictions. See also security sample applications, 228-230. See also database access, 247 applications queries, 256-257 Sarbanes Oxley Act, 266 result-set limitations, queries, 257 scope of privacy reviews, 208 retention SDKs (software development kits), data policies, 249 298-299 privacy policies, 117 searching .adm files, 74-76 retention policies, 317 secure file deletion, 25 reverse DNS lookups, spam, 87 Secure Sockets Layer (SSL), 37 reviews, 186 security management, 204-206 analysis, 197-198 meetings, 207 connections, 301 scope, 208 databases team members, 206-207 data minimization, 248-251 templates, 208-211 data obfuscation, 252-253 starting, 204 data perturbation, 262-265 validation, 188 data quantization, 254 RFID (radio frequency identification) encryption, 258-262 tags, 98-105 hippocratic, 266-268 Cannon_index.qxd 8/24/04 1:15 PM Page 344

344 Index management, 272 smart dust, 108-109 physical security, 245 smart tags, 98-105 programmatic security, 246-247 software development kits (SDKs), queries, 256-257 298-299 suppression, 258 sound, WMP9, 67-69 transaction auditing, 247-248 spam translucent databases, 252 anti-spam selection of rights expression applications, 85-92 languages, 295 tools, 22 sending anonymous messages, 20. See bulk e-mail solutions, 94 also email controlling, 83-84 sensitive information, transmission of, costs, 80-81 302 e-mail solutions, 93 server-side antispam solutions, 91-92 litigation, 82 servers, Web, 21 management, 80 service quality monitoring (SQM) SpamCon Foundation, 94 files, 36 specifications, 184, 192 services data analysis, 194-195 anonymous e-mail Web sites, 20 dependency analysis, 202 checklists, 311-313 disclosure plans, 200-202 development, 187-188 entity description, 203 beta release, 189 phone home disclosure, 202-203 code complete, 189 security analysis, 197-198 deployment guides, 191 usage analysis, 196-197 design, 186-187 user access analysis, 199 feature complete, 187 user control analysis, 198 phases, 181-186 Spotme conferencing devices, 106-107 privacy response teams, 190 spreadsheets, data analysis templates, product release, 190 307. See also databases testing, 188 spyware, 23 onion routing, 21 SQM (service quality monitoring) privacy statements, 309 files, 36 standards, 315-317 SSL (Secure Sockets Layer), 37 sharing data standards, 126-127, 315-317 control of, 316 Start menu privacy policies, 117 Customize Start Menu dialog sharing information, 302 box, 66 Silverman v. United States, 110 Help and Support command, 56 simple additive data perturbation (SADP), 265 Cannon_index.qxd 8/24/04 1:15 PM Page 345

Index 345 starting text, 185. See also documentation; development, 176-182 privacy statements privacy reviews, 204 Tivoli Privacy Manager (TPM), 268 statements tools PATs, 28 anti-spam, 22, 85-92 privacy, 7-8, 185, 309 clearing histories, 21 statistical databases, 254 Clip Art, 6 storage, control of, 316 cookie managers, 24 subdermal RFID tags, 100 P3P, 167 subsidiaries, privacy response centers, JRC, 170 134-135 P3PEdit, 169-170 suppression, 258 Policy Editor, 168 surveillance, 148-149 Validator, 169 symmetric encryption, 260 popup blockers, 22-23 Remove Hidden Data, 73 T TPM (Tivoli Privacy Manager), 268 tables. See also databases tracking, 4-5 categorization, 272 access data categorization, 251 data minimization, 248-251 encryption, 258-262 data obfuscation, 252-253 hippocratic, 266, 268 data perturbation, 262-265 management, 272 data quantization, 254 query limitations, 256-257 physical security, 245 row-level security, 247 programmatic security, 246-247 suppression, 258 transaction auditing, 247-248 TCP/IP (Transport Control defining, 9-10 Protocol/Internet Protocol), 147 privacy issues, 139-141 teams RFID tags, 98-105 component (privacy hierarchies), Web sites, 148-149 124-127 training, 122 privacy responses, 190 customer service personnel, 129-132 privacy reviews, 206-207 programs, 177 templates transactions, auditing, 247-248 data analysis, 307 translucent databases, 252 privacy review, 305 transmissions, 302 privacy reviews, 208-211 Transport Control Protocol/Internet testing Protocol (TCP/IP), 147 Authorization Manager, 285-287 trend analysis, 139-141 databases, 280-287 Cannon_index.qxd 8/24/04 1:15 PM Page 346

346 Index troubleshooting V databases, 280-287 validation of implementation, 188 Group Policy, 61-63 Validator (P3P), 169 online Help, 56 value of privacy, 13 spam, 85-92 values WER, 57-61 PATs, 27 trustworthiness, creating, 11-12 quantization, 254 TV-Anytime, 294 VeriChip, 100. See also RFID tags type A bias, 263 viewing P3P, 8, 153 type B bias, 263 Visual Studio (MFC applications) type C bias, 263 design, 228, 230 type D bias, 263 disclosure, 233-235 encryption, 240-241 U files, 231-232 U.S. Department of Commerce, 47-49 installing, 231 United States v. Karo, 111 privacy settings, 236-238 unlinkability, 18 vocabulary, P3P privacy, 186 unservability, 18 vulnerabilities of Internet unsolicited e-mail, 9. See also applications, 5-7 anti-spam; spam unsubscribing, 36 W updates, automatic, 64-65 Watchdog fields, 139 URLs (Uniform Resource Locators), 21 Web beacons, 148-149 usage analysis, 196-197 Web files, configuring, 276-278 user access analysis, 199 Web servers, crowds, 21 user control analysis, 198 Web services utilities components, 304 anti-spam, 22, 85-92 spam, 84 clearing histories, 21 Web sites cookie managers, 24 anonymous e-mail, 20 P3P, 167 checklists, 311-313 JRC, 170 data captured by, 147 P3PEdit, 169-170 development, 187-188 Policy Editor, 168 beta release, 189 Validator, 169 code complete, 189 popup blockers, 22-23 deployment guides, 191 Remove Hidden data, 73 design, 186-187 feature complete, 187 phases, 181-186 Cannon_index.qxd 8/24/04 1:15 PM Page 347

Index 347 privacy response teams, 190 WER (Windows Error Reporting), 33, product release, 190 57-63 testing, 188 Windows encryption, 37 automatic updates, 64-65 IP addresses, 148-149 My Recent Documents, 66 JANUS routing, 21 privacy disclosure documents, 53-54 Microsoft Knowledge Base, 56 WMP9, 67-69 P3P, 7, 147, 150-151 Windows Error Report, 33 APPEL, 171-172 Windows Error Reporting (WER), 33, AT&T Privacy Bird, 166 57-63 Avant, 166 Player privacy compact policy, 158 settings, 32 interfaces, 159 Windows Media Player 8, exposure, 5 Internet Explorer, 160-161 Windows Media Player 9, exposure, 6, JRC, 170 67-69 Mozilla, 162-163 Windows Rights Management Services Mozilla Firebird, 165 (RMS), 297-299 Netscape, 165 Windows Server 2003, exposure, 5 Opera, 162 Windows XP, exposure, 5 P3PEdit, 169-170 Windows-based privacy setting Policy Editor, 168 management, 32 policy files, 153-157 workflow, privacy response centers, reference files, 151-153 135-137 tools, 167 Validator, 169 X-Z PETs Ximian, 33 anonymizers/pseudonymizers, XML (eXtensible Markup 19-21 Language), 185 antispam tools, 22 XrML (eXtensible Rights Markup cookie managers, 24 Language), 292 history clearing tools, 21 online privacy protection, 25 popup blockers, 22-23 secure file deletion, 25 spyware, 23 policies, 12 privacy content, 309 resources, 319-326