text
stringclasses
22 values
<Chapter>: chapter 2
<Section Text>: foundational concepts and frameworks from within the secret court of mens hearts, tom was a dead man the minute mayella ewell opened her mouth and screamed. harper lee, to kill a mockingbird, 1960 we cannot escape the secret courts within the hearts of men. opinions, impressions, judgments and preju...
<Chapter>: chapter 3
<Section Text>: data and privacy governance concepts computers are magnificent tools for the realization of our dreams, but no machine can replace the human spark of spirit, compassion, love, and understanding. louis gerstner this chapter will look at the relationship among privacy frameworks and data management, da...
<Chapter>: chapter 4
<Section Text>: developing privacy policies if at first the idea is not absurd then there is no hope for it. albert einstein dont skip this chapter because the information presented seems obvious or is something you might feel you want to pass off to your legal team. the search for solid engineering requirements star...
<Chapter>: chapter 5
<Section Text>: developing privacy engineering requirements the expectations of life depend upon diligence; the mechanic that would perfect his work must first sharpen his tools. confucius i should live my life on bended knee; if i cant control my destiny. youve gotta have a scheme; youve gotta have a plan.in the worl...
<Chapter>: chapter 6
<Section Text>: a privacy engineering lifecycle methodology they always say time changes, but you actually have to change them yourself. andy warhol this chapter discusses a systems engineering methodology that can be adapted to privacy engineering. the methodology presented should be followed throughout development...
<Chapter>: chapter 7
<Section Text>: the privacy component app this chapter describes a primary tool in the privacy engineers toolkit, the privacy component, originally introduced in chapter 5. the privacy component is a self-contained, reusable software building block module developed to satisfy the privacy requirements derived from th...
<Chapter>: chapter 8
<Section Text>: a runners mobile app im an instant star. just add water. david bowie this chapter describes the process of designing a small mobile app using privacy engineering methodology. this example scenario shows how these methods can be used for small apps and systems. the runners mobile app began, as discuss...
<Chapter>: chapter 9
<Section Text>: vacation planner application the patterns are simple, but followed together, they make for a whole that is wiser than the sum of its parts, where good ideas come from: the natural history of innovation steven johnson this chapter presents a vacation planner application that utilizes a privacy component...
<Chapter>: chapter 11
<Section Text>: engineering your organization to be privacy ready action springs not from thought, but from a readiness for responsibility. g. m. trevelyan this chapter provides a methodology for assessing and implementing privacy awareness and readiness in the enterprise as a whole. it also discusses the privacy r...
<Chapter>: chapter 12
<Section Text>: organizational design and alignment my model for business is the beatles. they were four guys who kept each others kind of negative tendencies in check. they balanced each other, and the total was greater than the sum of the parts. thats how i see business: great things in business are never done by...
<Chapter>: chapter 14
<Section Text>: a vision of the future: the privacy engineers manifesto there is one thing stronger than all the armies in the world, and that is an idea whose time has come. victor hugo in this final chapter, we propose that this beginning framework for privacy engineering should become amplified like the open mouth...