Table 4.
Privacy principles | Mechanisms and associated technologies | |||||
---|---|---|---|---|---|---|
Access control mechanisms (ACM) |
Device and storage security (DSs) | Blockchain (B) |
Encryption (E) |
Anonymisation and pseudo-anonymisation mechanisms (A) | System programs (SPr) |
|
Accessibility of data (P1) | ● | ● | ● | ● | ||
Anonymity (P2) | ● | |||||
Confidentiality (P3) | ● | ● | ● | ● | ● | |
Data control (P4) | ● | ● | ● | ● | ||
Data quality (P5) | ● | |||||
Data security (P6) | ● | ● | ● | ● | ||
Data use (P7) | ● | ● | ||||
Disclosure risks (P8) | ● | ● | ● | |||
Encryption (P9) | ● | ● | ||||
Information misuse/abuse(P10) | ● | ● | ● | |||
Invisibility (P11) | ● | |||||
Profiling (P12) | ● | |||||
Storage limitation (P13) | ● | |||||
Sharing of data (P14) | ● | ● | ● | ● | ||
Surveillance (P15) | ● | ● | ||||
Volume of data collected (P16) | ● | |||||
Continuous monitoring (P17) | ● | |||||
Choice and consent (P18) | ● | |||||
Collection limitation (P19) | ● | |||||
Accountability (P20) | ● | ● | ● | ● | ||
Notice (P21) | ● | |||||
Device visibility (P22) | ● |