Privacy Compliance and Databases
by David M. Raab
DM Review
June, 2005



Perhaps it’s appropriate that the privacy community seems comprised mostly of people talking to themselves. In one corner are public policy advocates who examine every new technology for privacy risks and inevitably find some. Their usual recommendation is to regulate or prohibit the new technology’s use. Another corner holds academic and industry researchers working to build a detailed conceptual foundation for comprehensive privacy management. Yet another corner is reserved for software vendors offering stand-alone products with specific privacy-related functions. In a final corner, or maybe another room altogether, are corporate technology professionals whose only real goal is to satisfy their compliance departments. The corporate managers rarely interact with the other groups except when searching for vendors to help solve an immediate problem.

Each group performs valuable work. The policy advocates are right: the privacy risks of new technologies do need to be considered. The researchers are also right: reliable privacy can only be provided if it’s built into technology and business infrastructures. But the software vendors are useful too: absent comprehensive infrastructures, their point solutions are better than nothing. And the corporate technology managers really can’t, and probably shouldn’t, do anything more than meet actual business requirements.

Still, the disjointed nature of the privacy discussion has a cost. The policy advocates often seem unconcerned with the practical implications of their suggestions, even though some advocates are themselves quite knowledgeable about business and technology. The researchers’ conceptual frameworks could be very helpful to corporate systems designers, but only if they relate to infrastructures that actually come to exist. The value of the software point solutions is limited when there is no larger standardized framework for them to fit into.

The only place where everything actually comes together is in corporate systems themselves. The privacy components of these systems are driven by compliance requirements, which are determined by a hodgepodge of legal standards and regulations. The details vary with each situation, making a single solution impossible. But the general approaches are similar enough that researchers and vendors can design, and corporate systems staff can look for, technologies that will make all types of compliance easier.

One interesting set of technologies has been developed by IBM researchers under the heading of “Hippocratic Database”. (See www.almaden.ibm.com/software/quest/index.shtml.) Although far from a comprehensive privacy solution, it does illustrate several components worth having. These include:

The Hippocratic Database represents something more than academic research and something less than a commercial software product–although portions are being tested by IBM clients. It doesn’t address major issues such as authentication or data owner access. But it does illustrate how components of a privacy-sensitive system could be deployed to make compliance easier, without waiting for an over-all architecture that may never appear.

*                       *                        *  

Copyright 2005 Raab Associates, Inc. Contact: info@raabassociates.com

backbut.gif - 2.0 K
Back to Search



Raab Associates, Inc.
Copyright ©1998-2005 All Rights Reserved