For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask cus- tomers, employees, and business partner to provide rel- evance data including sensitive personal information. However, transparent information bring the infringement of privacy and threats of living security to the data providers. Recently, enterprises have su®ered from the loss of ... [Show full abstract] potential customers and benefits because of the rise of privacy protection consciousness. Therefore, this arti- cle researches in the solutions of data privacy protection in enterprises, and classifies into three categories, "Role- based", "Purpose-based", and "Extension". Furthermore, we define three criterions which should be achieved when an enterprise wants to implement a data access system with privacy protection mechanism. We hope it is helpful for enterprises to strengthen privacy protection depend- ing on their own characteristics and requirements.