Quiet Friday question.
A great deal of the debate about Privacy and Data Protection centres
security, with privacy at the periphery. For a graphical example of
this see Figure 1 in the ICO's research document "The Privacy
Dividend"
http://www.ico.gov.uk/about_us/research/data_protection.aspx
Viewing the debate from a purely individual perspective that
conceptual view is reversed, creating a dichotomous state.
The software development arena appears to try to adopt both views,
with the rationale for each perspective dependent upon the eventual
customer base, or the need for personal privacy/commercial secrecy.
Both perspectives create their own visible personas as it were, or is
that a property of culture...
What problems arise in those areas solely subscribing to the fig. 1
perspective?
Ian W
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|