skip to main content
10.1145/1029179.1029190acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Specifying privacy policies with P3P and EPAL: lessons learned

Published:28 October 2004Publication History

ABSTRACT

As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that document their information handling and usage practices. Most privacy policies are derived and specified in a somewhat ad-hoc manner, leading to policies that are of limited use to the consumers they are intended to serve. To make privacy policies more readable and enforceable, two privacy policy specification languages have emerged, P3P and EPAL. This paper discusses a case study in which the authors systematically formalized two real and complex, healthcare website privacy statements, and measured the results against well-known requirements engineering criteria.

References

  1. A.I. Antón, J.B. Earp, D. Bolchini, Q. He, C. Jensen and W. Stufflebeam. The Lack of Clarity in Financial Privacy Policies and the Need for Standardization, IEEE Security & Privacy, 2(2), pp. 36--45, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A.I. Antón, J.B. Earp and A. Reese, Goal Mining to Examine Health Care Privacy Policies, NCSU Technical Report TR-2001-10, 6 November 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Ashley, S. Hada, G. Karjoth, C. Powers and M. Schunter. Enterprise Privacy Authorization Language (EPAL 1.1) Specification. IBM Research Report. http://www.zurich.ibm.com/security/enterprise-privacy/epal. 2003.Google ScholarGoogle Scholar
  4. L. Cranor, B. Dobbs, G. Hogben, J. Humphrey, M. Langheinrich, M. Marchiori, M. Presler-Marshall, J. Reagle, M. Schunter, D.A. Stampley, R. Wenning. The Platform for Privacy Preferences 1.1 (P3P1.1) Specification, http://www.w3.org/TR/P3P11. W3C Working Draft 27 April 2004.Google ScholarGoogle Scholar
  5. CIGNA HealthCare. Public Online Privacy Statement. http://www.cigna.com/general/privacy/public.html. Accessed June 2004.Google ScholarGoogle Scholar
  6. CIGNA HealthCare. Notice of Privacy Practices. http://www.cigna.com/general/privacy/healthcare/ standard.html. Accessed June 2004.Google ScholarGoogle Scholar
  7. N. Jain, A.I. Antón, W.H. Stufflebeam and Q. He. Security and Privacy Requirements Analysis Tool (SPRAT) Software Requirements Specification, NCSU CSC Technical Report TR-2004-7, February 24, 2004.Google ScholarGoogle Scholar
  8. S. Robertson and J. Robertson. Mastering the Requirements Process. Addison-Wesley. New York, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. William H. Stufflebeam, Annie I. Antón, Qingfeng He, and Neha Jain. Specifying Privacy Policies with P3P and EPAL: Lessons Learned. NCSU Technical Report #TR-2004-19. June 17, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Specifying privacy policies with P3P and EPAL: lessons learned

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic society
        October 2004
        124 pages
        ISBN:1581139683
        DOI:10.1145/1029179

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 October 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate106of355submissions,30%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader