Privacy as an archival problem and a solution

被引:10
作者
Henttonen P. [1 ]
机构
[1] Information Studies and Interactive Media, Faculty of Communication Sciences, University of Tampere, Pinni B 2098 A, Tampere
关键词
Data protection; Privacy; Records management;
D O I
10.1007/s10502-017-9277-0
中图分类号
学科分类号
摘要
People feel that their privacy is violated when information about them is passed inappropriately from one context or social sphere to another. This makes records and archives management a focal point of privacy issues, because its goal is to transfer information from one context, place, and point in time to other contexts, places, and points in time. Society has a number of mechanisms (“strategies”) for protecting the privacy of people. The article examines five of them (purpose limitation, privacy self-management and right to be forgotten, destruction, anonymization, and information safe haven approach) and the limits they set to the contextual transfer of information. If the strategies are implemented in society without regard for archival needs, archives have difficulties in fulfilling their functions in society. Therefore, records professionals should make their point of view known when privacy issues are discussed. Records professionals also should be aware of the mutability of the category of personally identifiable information and the changing nature of privacy issues in the digital environment. © 2017, Springer Science+Business Media B.V.
引用
收藏
页码:285 / 303
页数:18
相关论文
共 55 条
[1]  
An X., An integrated approach to records management, Inf Manag J, 37, 4, pp. 24-30, (2003)
[2]  
Selvitys henkilörekistereihin sisältyvien tietojen säilyttämisestä ja poistamisesta [Report about destruction and preservation of personal data], Dnro AL/17052/07.01.01, 2009, (2009)
[3]  
Ausloos J., The “right to be forgotten”—Worth remembering?, Comput Law Secur Rev, 28, 2, pp. 143-152, (2012)
[4]  
Barth-Jones D., The “re-identification” of Governer William Weld’s medical information, A critical re-examination of health data identification risks and privacy protections, then an now, (2012)
[5]  
Barth-Jones D., Re-identification risks and myths, superusers and super stories (part I: risks and myths, (2016)
[6]  
Barth-Jones D., Re-identification risks and myths, superusers and super stories (part II: superusers and super stories, (2016)
[7]  
Bingo S., Of provenance and privacy. Using contextual integrity to define third-party privacy, Am Arch, 74, pp. 506-521, (2011)
[8]  
Brennen S., Kreiss D., Digitalization and digitization, (2014)
[9]  
Cook T., The archival appraisal of records containing personal information: a RAMP study with guidelines, (1991)
[10]  
Danielson E.S., The ethical archivist, (2010)