49
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      How to Make Privacy Policies both GDPR-Compliant and Usable

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          It is important for organisations to ensure that their privacy policies are General Data Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline. However, it is also important for these policies to be designed with the needs of the human recipient in mind. We carried out an investigation to find out how best to achieve this. We commenced by synthesising the GDPR requirements into a checklist-type format. We then derived a list of usability design guidelines for privacy notifications from the research literature. We augmented the recommendations with other findings reported in the research literature, in order to confirm the guidelines. We conclude by providing a usable and GDPR-compliant privacy policy template for the benefit of policy writers.

          Related collections

          Most cited references24

          • Record: found
          • Abstract: not found
          • Article: not found

          Beyond concern—a privacy-trust-behavioral intention model of electronic commerce

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            The effect of online privacy policy on consumer privacy concern and trust

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures

                Bookmark

                Author and article information

                Journal
                18 June 2018
                Article
                1806.06670
                d79135de-9e8d-4934-a7d4-03f784e279e2

                http://creativecommons.org/licenses/by-nc-sa/4.0/

                History
                Custom metadata
                8 pages, 3 figures. Accepted in IEEE CyberSA 2018 Proceedings
                cs.HC cs.CR

                Security & Cryptology,Human-computer-interaction
                Security & Cryptology, Human-computer-interaction

                Comments

                Comment on this article