SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Downloaden Sie, um offline zu lesen
Privacy by Design
CONSIDERATIONS UNDER PRIVACY LAW (& GDPR!)
1
Who are you?
Austin Chambers
 Attorney at Lewis, Bess, Williams & Weese
 CIPP/US, CIPP/E, CIPP/C
 Data Privacy, Security and Intellectual Property
 Practice focused on US and international
privacy issues, and technology transactions.
 GDPR & International privacy;
 Privacy Shield certification;
 EU-US and other cross-border data transfer
agreements;
 international and intercompany data licensing;
 website and mobile app agreements;
 marketing, email and advertising compliance;
 information security programs;
 data breach response; software licensing and
development
2
What will we cover?
PbD
Fundamentals
Key legal
considerations
Practical
Application
3
Part I
Privacy by Design Fundamentals
LEGAL FRAMEWORKS AND CONSUMER EXPECTATIONS
4
What is Privacy by Design?
 An approach to systems engineering that accounts for privacy at
each stage of the product and information lifecycle
 System that integrates core privacy considerations into existing
project management and risk management methodologies and
policies.
 Engineering that takes human values into account throughout the
system design process
USER CENTRIC
5
Benefits of Privacy by Design
Key Goals: build trust, mitigate risk, and comply with the law
The UK Information Commissioner’s Office describes the benefits as follows:
 Designing projects, processes, products or systems with privacy in mind
at the outset can lead to benefits which include:
 Potential problems are identified at an early stage, when addressing them
will often be simpler and less costly.
 Increased awareness of privacy and data protection across an
organisation.
 Organisations are more likely to meet their legal obligations and less likely to
breach the data protection law.
 Actions are less likely to be privacy intrusive and have a negative impact
on individuals.
6
https://ico.org.uk/for-organisations/guide-to-data-protection/privacy-by-design/
7 Principles of Privacy by Design
 Proactive, not reactive; preventative, not remedial
 Privacy as default setting
 Privacy embedded into design
 Full functionality (positive sum, not zero sum)
 End-to-end security (full lifecycle protection)
 Visibility and Transparency (keep it open)
 Respect user privacy (keep it user centric)
7
https://www.ipc.on.ca/wp-content/uploads/2013/09/pbd-primer.pdf
Privacy by Design and the
Information lifecycle
 PbD is key in various essential phases of the information lifecycle
 For example, PbD is essential when:
 building new IT systems for storing or accessing personal data;
 developing policies or strategies that have privacy implications;
 embarking on a data sharing initiative; or
 using data for new purposes.
8
Part II
Legal and Practical Considerations
LEGAL FRAMEWORKS AND CONSUMER EXPECTATIONS
9
Collection
Use
Disclosure
Access/
Retention
Destruction
Privacy by Design
requires
contemplating each
phase of the
information lifecycle
Core Principles:
Information Lifecycle
10
Core Principles: PII & Personal Data
 “PII” – A person’s first or last name in combination with another
piece of identifying information, such as an address, driver’s license
number, etc.
 “personal data” (EU) – any information relating to a
identified/identifiable natural person
 “sensitive information” – SSN, PHI, CC#, Financial
 “sensitive information” (EU) – personal data relating to race,
religious/philosophical beliefs, health/sex life, political
affiliation/opinions, union membership
 BUT, most laws usually exclude publically available info, at least to
some degree (CAN/EU = more limits)
11
Core Principles: PII & Personal Data
Any information relating to an
identified/identifiable person
Identifying information relating to private
individual
Unencrypted identifying information re:
private individual
Sensitive information OR 2+ linked elements
of identifying info
12
Core Principles: Overview
 Notice + Consent
 At primary collection
 Legitimizes collection, disclosure
 Establishes purpose of use
 Must be non-deceptive
 Purpose of Use
 legitimate basis/unanticipated
uses
 Unauthorized disclosures
 Automated decision-making
 Contractual (price discrimination)
 Statutory (discrimination against
protected class)
 Individual rights
 Access
 Modification
 Choice
 Retention/Deletion
 Security/Risk Mitigation Measures
 Administrative
 Procedural
 Technical
 Systems design
 Use of Crypto
 Anonymization
13
Core Principles: Notice +
Consent
 Consent is the cornerstone of
privacy law
 US Law/§5
 PIPEDA (CAN)
 GDPR (EU)
 Data rights established w/ notice
by first party + user consent
 Notice must describe use,
collection, sharing, choices
 Laws/contracts/standards may
require specific degree of consent
14
Core Principles: Notice +
Consent
What is consent?
 Notice + Use
 Consumers must
be notified of
analytics in PP,
but use = agree
 Implied opt-in
 Implied right to
collect/use for
business reasons
 Notice + opt out
 To use email to
send a newsletter,
must give opt-out
choice
 Notice + opt in
 To collect
geolocation,
users must choose
to allow
15
Core Principles: Notice + Consent
GDPR Ar. 13 – Notice
Must provide notice of:
 Categories of data collected
 The purposes of the processing
 The legal (legitimate) basis for
processing
 The recipients or categories of
recipients of the data,
 Int’l transfer and basis
Any automated decision
making or profiling + logic and
significance or consequences
Additional notice obligations if data
provided by third party
Requires improvements in notice
 plain language
 “layered” notice
 “just in time disclosures”
 Standardized icons
16
Core Principles: Notice + Consent
GDPR Ar. 6-7
 Consent generally required, unless
exception:
 Contractual necessity,
 emergencies/vital interests,
 legitimate interest
 legal requirements
 Consent must be:
 Informed
 Freely given
 ”unambiguous” (“explicit” if SI)
 revocable
PIPEDA - Principle 3
 Notice and consent is the
“Cornerstone” of Canadian privacy
law
 Prior express consent preferred, but
sensitivity of info, expectations may
vary
 Must set out purposes
 Consent is only valid if reasonable to
expect the individual would
understand purpose and means
 Consent not required if
use/disclosure if ”reasonable person
would find appropriate in
circumstances”
 Balance! Think about users
17
Core Principles: Notice + Consent
Section 5 – FTC
 Companies encouraged to take “privacy by
design” approach
 Say what you do, do what you say!
 FTC focuses more on “harm” model – similar
to ‘reasonable expectations’
 Certain “commonly accepted” practices
don’t require consent (fulfillment, compliance,
fraud prevention, first party marketing)
 For other requires “informed, meaningful
choices”
 Notice and choice should be:
 Provided in context of decision to agree
 Concise, understandable
 Encourage improving privacy notices
 See “Protecting Consumers in an Era of
Rapid Change”
E-Privacy Regulation
 Users have rights under ePrivacy
Regulation (online communications)
 Right to opt-out of “automated decision-
making” under GDPR
 Opt-in consent required for behavioral
advertising, analytics
 Cookies
 Online ads
 Facebook pixels
 Must be prior to collection!
 Must provide choice (does system
support?)
 UX and documentation challenge
18
Core Principles: Purpose of Use
The purposes you may process information are generally limited
 Scope of notice, consent sets limits right to share, use
 PIPEDA, for example, requires that use/disclosure must be limited to what is
“appropriate in circumstances”
 Consent generally required for uses beyond predictable/transactional use, such as:
 Augmentation/Profiling
 Marketing
 Advertising/behavioral analytics
 New, undisclosed uses
 Consent required to disclose data if not obvious part of initial transaction, e.g. to:
 Service providers
 Marketers
 Partners & co-owners
 Sale of business
19
Core Principles: Purpose of Use
Ar 5 – Processing Principles
Personal Data must be processed :
 Lawfully, Fairly and Transparently
 For specific, explicit, and
legitimate purposes
 Adequate, relevant, limited to
purpose
 “Proportionate”
 Data minimization is key
 Accurate
 Stored for limited time
 Securely
PIPEDA
Principles of PIPEDA :
 Identification of purpose (Prin. 2)
 Identify, document, notify of
changes
 Limiting collection (Prin. 4)
 Collect only what is necessary for
purpose
 Limiting use, disclosure and
retention (Prin. 5)
 Don’t disclose/use in ways not
expected
 Don’t retain data forever
20
Core Principles: Individual Rights
Personal data is about people—they often retain rights in that data
 Access
 PIPEDA principle 9
 Must provide all personal data, account for disclosures, demonstrate compliance with
consent.
 30 days!
 Right Does not exist in US law (but suggested)
 Retention
 Organization, consumer optics, storage cost
 Liability & Litigation
 Cost of Processing and analytics
 Destruction
 Data must be securely destroyed/wiped
21
Core Principles: Individual Rights
Ar. 15-21: Individual’s rights with respect to processing
 Access (right to know all info req’d under notice)
 Rectification (correct inaccuracies)
 Erasure (RTBF -- if irrelevant/dated, consent withdrawn, unlawful,
overriding individual right)
 Limit use (inaccurate, not fit for purpose, unnecessary, overriding
individual right)
 Portability (NEW! – if based on consent or necessity, or if automated
processing, right to receive data in exportable, open format.)
 Object (to direct marketing, “solely automated decision-making
with significant legal effects” unless necessary or consented)
22
Part III
Application
23
Application: Privacy by Design
Article 25: Privacy & Security by Design
 Given state of the art, cost of implementation, and nature, scope,
context, purpose and risks of processing
 Privacy measures to consider:
 Anonymization
 Pseudonoymization
 Data minimization
 Security measures to consider
 Confidentiality & encryption (at rest, in transit)
 Access (Least privilege, need to know)
 Update and vulnerability management
 Balancing security and usability
24
Application: Privacy Impact
Assessment
Article 35: DPIA
 If high risk to rights and freedom, must carry out assessment of impact
on individual privacy
 Required if:
 Systematic and extensive evaluation of personal aspects, e.g. profiling
where decisions produce legal or similar effects
 Large scale processing of sensitive data
 Systematic monitoring of public area (cctv)
 Must produce:
 Description of system and processing ops
 Assessment of necessity and proportionality of processing
 Description of risk mitigation measures
25
Conducting a DPIA
PRODUCT DESIGN
 Notice
 Short form/icons, etc.
 Just in time disclosure
 Unambiguousness/Explicitness
 Third party notice req’s
 Consent
 Language and means
 Business issues
 Data Minimization
SYSTEMS DESIGN
 Managing consents
 documentation
 revocation
 Process limitation
 Fair & lawful
 Restricted to identified purposes
 Ensuring individual rights
 Portability
 Access
 Anonymization
 Retention
26
‘Classic’ Notice and Consent
GOOGLE’S PRIVACY UX DURING ACCOUNT CREATION
ACCOUNTS.GOOGLE.COM/SIGNUP
27
Can’t get acc’t without agreement
(href: summary for each item)
28
Additional info for account
creation data
ACCOUNTS.GOOGLE.COM/SIGNUP
29
30
Summary privacy notice during
account creation
ACCOUNTS.GOOGLE.COM/SIGNUP
31
Makes
method of
consent
clear
Get more info
Can’t agree ‘til you read
Practical, easy-to-read summary
32
Click here =
consent
33
Google’s Full Privacy Notice
GOOGLE.COM/POLICIES/PRIVACY
34
Easy
Navigation
Relevant links
Historical record so you can see
what’s changed (1999 was such
an idealistic time)
35
Notice how you get clarifying
examples when you hover over
sections with dotted lines… This is a
‘layered’ notice
36
‘Supplemental’ Notice and
Consent
SOLVING THE EXISTING USER DILEMMA (WHEN THINGS CHANGE) – AN EXAMPLE OF
GOOGLE’S GDPR EFFORTS
GOOGLE.COM SEARCH QUERY OF THEN-CURRENT IP ADDRESS FROM GERMAN IP
37
GDPR & Google – New Privacy
Notice/Consent
 An example of implementing GDPR notice to existing users
 Notice & consent typically occurs at registration/service activation/initial config etc.
 This creates an issue should data practices and/or legal requirements change
(especially given how many people already use Google)
 The following examples show how Google attempts to address that problem
 Note that this notice:
 Appears ONLY in EU (I accessed Google via VPN using German IP address)
 Is annoyingly placed at the top of search results so that you see it
 Persists until you make it go away
 Recurs if you log out of your account or tell it to go away temporarily
 Is easy to read
 Has handy links throughout
 Not sure, but I’d venture a guess that if you click OK when logged in, Google logs
date/time/IP to prove you agreed
38
39
40
41
42
43
Systems Design Considerations
IOT IMPLEMENTATION
44
Group Problem: IOT
 You’re developing a new home wifi
speaker. You’d like to integrate
voice control, access Spotify, stream
from phone to speaker seamlessly.
 To compete in the saturated market,
marketing is key, especially online
ads
 Botnets are an increasing risk, and
have been known to hijack IOT
devices in attacks
 Consumers increasingly wary of IOT
decisions breaking devices
 Meet someone, talk, ask questions
think through a problem & solution
to one of the following issues:
 Limited UI
 Broad range, ages of users (risk
profile?)
 Diagnostics/QA/QI and broad
definition of personal data
 Marketing information vs device
information
 Security limitations (e.g. updates)
 Access/individual rights requests
 Device ownership concerns
 Third party integrations (e.g. AI)
 Trust & branding
45
“
”
Thanks
everyone!
CONTACT INFO:
Austin T. Chambers
Associate | CIPP/US, CIPP/C, CIPP/E
Lewis, Bess, Williams & Weese, P.C.
O: +1.303.228.2508
achambers@lewisbess.com
46

Weitere ähnliche Inhalte

Was ist angesagt?

Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Designbradley_g
 
Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository XeniT Solutions nv
 
GDPR changes affect direct marketing
GDPR changes affect direct marketingGDPR changes affect direct marketing
GDPR changes affect direct marketingSpotler
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]TrustArc
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR ComplianceDATAVERSITY
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoGiulio Coraggio
 
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignGDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignJohn Eckman
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slidesExponential_e
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...DATUM LLC
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Karina Matos
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideZymplify
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?Frederick Penaud
 

Was ist angesagt? (20)

Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
GDPR changes affect direct marketing
GDPR changes affect direct marketingGDPR changes affect direct marketing
GDPR changes affect direct marketing
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR Compliance
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
 
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignGDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slides
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify Guide
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 

Ähnlich wie Csa privacy by design & gdpr austin chambers 11-4-17

My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRzayadeen2003
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyDMI
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare IndustryEMMAIntl
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the Newaccenture
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
UX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesUX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesUser Vision
 
UX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesUX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesStephen Denning
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Software Integrity Group
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersSpain-Holiday.com
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical OverviewErnest Staats
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
2018 02 20 GDPR SEMINAR - Gemeente Sint-Martens-Latem
2018 02 20 GDPR SEMINAR - Gemeente Sint-Martens-Latem2018 02 20 GDPR SEMINAR - Gemeente Sint-Martens-Latem
2018 02 20 GDPR SEMINAR - Gemeente Sint-Martens-LatemAnn Van den Bunder
 

Ähnlich wie Csa privacy by design & gdpr austin chambers 11-4-17 (20)

My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the New
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
UX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesUX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital Experiences
 
UX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesUX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital Experiences
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
2018 02 20 GDPR SEMINAR - Gemeente Sint-Martens-Latem
2018 02 20 GDPR SEMINAR - Gemeente Sint-Martens-Latem2018 02 20 GDPR SEMINAR - Gemeente Sint-Martens-Latem
2018 02 20 GDPR SEMINAR - Gemeente Sint-Martens-Latem
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 

Mehr von Trish McGinity, CCSK

Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebTrish McGinity, CCSK
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?Trish McGinity, CCSK
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggTrish McGinity, CCSK
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageTrish McGinity, CCSK
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxTrish McGinity, CCSK
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3Trish McGinity, CCSK
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Trish McGinity, CCSK
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionTrish McGinity, CCSK
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsTrish McGinity, CCSK
 

Mehr von Trish McGinity, CCSK (16)

Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure Web
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassage
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghx
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities
 
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
Ed Rios - New ncc brief
Ed Rios - New ncc briefEd Rios - New ncc brief
Ed Rios - New ncc brief
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certs
 
Davitt Potter - CSA Arrow
Davitt Potter - CSA ArrowDavitt Potter - CSA Arrow
Davitt Potter - CSA Arrow
 

Kürzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Kürzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Csa privacy by design & gdpr austin chambers 11-4-17

  • 1. Privacy by Design CONSIDERATIONS UNDER PRIVACY LAW (& GDPR!) 1
  • 2. Who are you? Austin Chambers  Attorney at Lewis, Bess, Williams & Weese  CIPP/US, CIPP/E, CIPP/C  Data Privacy, Security and Intellectual Property  Practice focused on US and international privacy issues, and technology transactions.  GDPR & International privacy;  Privacy Shield certification;  EU-US and other cross-border data transfer agreements;  international and intercompany data licensing;  website and mobile app agreements;  marketing, email and advertising compliance;  information security programs;  data breach response; software licensing and development 2
  • 3. What will we cover? PbD Fundamentals Key legal considerations Practical Application 3
  • 4. Part I Privacy by Design Fundamentals LEGAL FRAMEWORKS AND CONSUMER EXPECTATIONS 4
  • 5. What is Privacy by Design?  An approach to systems engineering that accounts for privacy at each stage of the product and information lifecycle  System that integrates core privacy considerations into existing project management and risk management methodologies and policies.  Engineering that takes human values into account throughout the system design process USER CENTRIC 5
  • 6. Benefits of Privacy by Design Key Goals: build trust, mitigate risk, and comply with the law The UK Information Commissioner’s Office describes the benefits as follows:  Designing projects, processes, products or systems with privacy in mind at the outset can lead to benefits which include:  Potential problems are identified at an early stage, when addressing them will often be simpler and less costly.  Increased awareness of privacy and data protection across an organisation.  Organisations are more likely to meet their legal obligations and less likely to breach the data protection law.  Actions are less likely to be privacy intrusive and have a negative impact on individuals. 6 https://ico.org.uk/for-organisations/guide-to-data-protection/privacy-by-design/
  • 7. 7 Principles of Privacy by Design  Proactive, not reactive; preventative, not remedial  Privacy as default setting  Privacy embedded into design  Full functionality (positive sum, not zero sum)  End-to-end security (full lifecycle protection)  Visibility and Transparency (keep it open)  Respect user privacy (keep it user centric) 7 https://www.ipc.on.ca/wp-content/uploads/2013/09/pbd-primer.pdf
  • 8. Privacy by Design and the Information lifecycle  PbD is key in various essential phases of the information lifecycle  For example, PbD is essential when:  building new IT systems for storing or accessing personal data;  developing policies or strategies that have privacy implications;  embarking on a data sharing initiative; or  using data for new purposes. 8
  • 9. Part II Legal and Practical Considerations LEGAL FRAMEWORKS AND CONSUMER EXPECTATIONS 9
  • 10. Collection Use Disclosure Access/ Retention Destruction Privacy by Design requires contemplating each phase of the information lifecycle Core Principles: Information Lifecycle 10
  • 11. Core Principles: PII & Personal Data  “PII” – A person’s first or last name in combination with another piece of identifying information, such as an address, driver’s license number, etc.  “personal data” (EU) – any information relating to a identified/identifiable natural person  “sensitive information” – SSN, PHI, CC#, Financial  “sensitive information” (EU) – personal data relating to race, religious/philosophical beliefs, health/sex life, political affiliation/opinions, union membership  BUT, most laws usually exclude publically available info, at least to some degree (CAN/EU = more limits) 11
  • 12. Core Principles: PII & Personal Data Any information relating to an identified/identifiable person Identifying information relating to private individual Unencrypted identifying information re: private individual Sensitive information OR 2+ linked elements of identifying info 12
  • 13. Core Principles: Overview  Notice + Consent  At primary collection  Legitimizes collection, disclosure  Establishes purpose of use  Must be non-deceptive  Purpose of Use  legitimate basis/unanticipated uses  Unauthorized disclosures  Automated decision-making  Contractual (price discrimination)  Statutory (discrimination against protected class)  Individual rights  Access  Modification  Choice  Retention/Deletion  Security/Risk Mitigation Measures  Administrative  Procedural  Technical  Systems design  Use of Crypto  Anonymization 13
  • 14. Core Principles: Notice + Consent  Consent is the cornerstone of privacy law  US Law/§5  PIPEDA (CAN)  GDPR (EU)  Data rights established w/ notice by first party + user consent  Notice must describe use, collection, sharing, choices  Laws/contracts/standards may require specific degree of consent 14
  • 15. Core Principles: Notice + Consent What is consent?  Notice + Use  Consumers must be notified of analytics in PP, but use = agree  Implied opt-in  Implied right to collect/use for business reasons  Notice + opt out  To use email to send a newsletter, must give opt-out choice  Notice + opt in  To collect geolocation, users must choose to allow 15
  • 16. Core Principles: Notice + Consent GDPR Ar. 13 – Notice Must provide notice of:  Categories of data collected  The purposes of the processing  The legal (legitimate) basis for processing  The recipients or categories of recipients of the data,  Int’l transfer and basis Any automated decision making or profiling + logic and significance or consequences Additional notice obligations if data provided by third party Requires improvements in notice  plain language  “layered” notice  “just in time disclosures”  Standardized icons 16
  • 17. Core Principles: Notice + Consent GDPR Ar. 6-7  Consent generally required, unless exception:  Contractual necessity,  emergencies/vital interests,  legitimate interest  legal requirements  Consent must be:  Informed  Freely given  ”unambiguous” (“explicit” if SI)  revocable PIPEDA - Principle 3  Notice and consent is the “Cornerstone” of Canadian privacy law  Prior express consent preferred, but sensitivity of info, expectations may vary  Must set out purposes  Consent is only valid if reasonable to expect the individual would understand purpose and means  Consent not required if use/disclosure if ”reasonable person would find appropriate in circumstances”  Balance! Think about users 17
  • 18. Core Principles: Notice + Consent Section 5 – FTC  Companies encouraged to take “privacy by design” approach  Say what you do, do what you say!  FTC focuses more on “harm” model – similar to ‘reasonable expectations’  Certain “commonly accepted” practices don’t require consent (fulfillment, compliance, fraud prevention, first party marketing)  For other requires “informed, meaningful choices”  Notice and choice should be:  Provided in context of decision to agree  Concise, understandable  Encourage improving privacy notices  See “Protecting Consumers in an Era of Rapid Change” E-Privacy Regulation  Users have rights under ePrivacy Regulation (online communications)  Right to opt-out of “automated decision- making” under GDPR  Opt-in consent required for behavioral advertising, analytics  Cookies  Online ads  Facebook pixels  Must be prior to collection!  Must provide choice (does system support?)  UX and documentation challenge 18
  • 19. Core Principles: Purpose of Use The purposes you may process information are generally limited  Scope of notice, consent sets limits right to share, use  PIPEDA, for example, requires that use/disclosure must be limited to what is “appropriate in circumstances”  Consent generally required for uses beyond predictable/transactional use, such as:  Augmentation/Profiling  Marketing  Advertising/behavioral analytics  New, undisclosed uses  Consent required to disclose data if not obvious part of initial transaction, e.g. to:  Service providers  Marketers  Partners & co-owners  Sale of business 19
  • 20. Core Principles: Purpose of Use Ar 5 – Processing Principles Personal Data must be processed :  Lawfully, Fairly and Transparently  For specific, explicit, and legitimate purposes  Adequate, relevant, limited to purpose  “Proportionate”  Data minimization is key  Accurate  Stored for limited time  Securely PIPEDA Principles of PIPEDA :  Identification of purpose (Prin. 2)  Identify, document, notify of changes  Limiting collection (Prin. 4)  Collect only what is necessary for purpose  Limiting use, disclosure and retention (Prin. 5)  Don’t disclose/use in ways not expected  Don’t retain data forever 20
  • 21. Core Principles: Individual Rights Personal data is about people—they often retain rights in that data  Access  PIPEDA principle 9  Must provide all personal data, account for disclosures, demonstrate compliance with consent.  30 days!  Right Does not exist in US law (but suggested)  Retention  Organization, consumer optics, storage cost  Liability & Litigation  Cost of Processing and analytics  Destruction  Data must be securely destroyed/wiped 21
  • 22. Core Principles: Individual Rights Ar. 15-21: Individual’s rights with respect to processing  Access (right to know all info req’d under notice)  Rectification (correct inaccuracies)  Erasure (RTBF -- if irrelevant/dated, consent withdrawn, unlawful, overriding individual right)  Limit use (inaccurate, not fit for purpose, unnecessary, overriding individual right)  Portability (NEW! – if based on consent or necessity, or if automated processing, right to receive data in exportable, open format.)  Object (to direct marketing, “solely automated decision-making with significant legal effects” unless necessary or consented) 22
  • 24. Application: Privacy by Design Article 25: Privacy & Security by Design  Given state of the art, cost of implementation, and nature, scope, context, purpose and risks of processing  Privacy measures to consider:  Anonymization  Pseudonoymization  Data minimization  Security measures to consider  Confidentiality & encryption (at rest, in transit)  Access (Least privilege, need to know)  Update and vulnerability management  Balancing security and usability 24
  • 25. Application: Privacy Impact Assessment Article 35: DPIA  If high risk to rights and freedom, must carry out assessment of impact on individual privacy  Required if:  Systematic and extensive evaluation of personal aspects, e.g. profiling where decisions produce legal or similar effects  Large scale processing of sensitive data  Systematic monitoring of public area (cctv)  Must produce:  Description of system and processing ops  Assessment of necessity and proportionality of processing  Description of risk mitigation measures 25
  • 26. Conducting a DPIA PRODUCT DESIGN  Notice  Short form/icons, etc.  Just in time disclosure  Unambiguousness/Explicitness  Third party notice req’s  Consent  Language and means  Business issues  Data Minimization SYSTEMS DESIGN  Managing consents  documentation  revocation  Process limitation  Fair & lawful  Restricted to identified purposes  Ensuring individual rights  Portability  Access  Anonymization  Retention 26
  • 27. ‘Classic’ Notice and Consent GOOGLE’S PRIVACY UX DURING ACCOUNT CREATION ACCOUNTS.GOOGLE.COM/SIGNUP 27
  • 28. Can’t get acc’t without agreement (href: summary for each item) 28
  • 29. Additional info for account creation data ACCOUNTS.GOOGLE.COM/SIGNUP 29
  • 30. 30
  • 31. Summary privacy notice during account creation ACCOUNTS.GOOGLE.COM/SIGNUP 31
  • 32. Makes method of consent clear Get more info Can’t agree ‘til you read Practical, easy-to-read summary 32
  • 34. Google’s Full Privacy Notice GOOGLE.COM/POLICIES/PRIVACY 34
  • 35. Easy Navigation Relevant links Historical record so you can see what’s changed (1999 was such an idealistic time) 35
  • 36. Notice how you get clarifying examples when you hover over sections with dotted lines… This is a ‘layered’ notice 36
  • 37. ‘Supplemental’ Notice and Consent SOLVING THE EXISTING USER DILEMMA (WHEN THINGS CHANGE) – AN EXAMPLE OF GOOGLE’S GDPR EFFORTS GOOGLE.COM SEARCH QUERY OF THEN-CURRENT IP ADDRESS FROM GERMAN IP 37
  • 38. GDPR & Google – New Privacy Notice/Consent  An example of implementing GDPR notice to existing users  Notice & consent typically occurs at registration/service activation/initial config etc.  This creates an issue should data practices and/or legal requirements change (especially given how many people already use Google)  The following examples show how Google attempts to address that problem  Note that this notice:  Appears ONLY in EU (I accessed Google via VPN using German IP address)  Is annoyingly placed at the top of search results so that you see it  Persists until you make it go away  Recurs if you log out of your account or tell it to go away temporarily  Is easy to read  Has handy links throughout  Not sure, but I’d venture a guess that if you click OK when logged in, Google logs date/time/IP to prove you agreed 38
  • 39. 39
  • 40. 40
  • 41. 41
  • 42. 42
  • 43. 43
  • 45. Group Problem: IOT  You’re developing a new home wifi speaker. You’d like to integrate voice control, access Spotify, stream from phone to speaker seamlessly.  To compete in the saturated market, marketing is key, especially online ads  Botnets are an increasing risk, and have been known to hijack IOT devices in attacks  Consumers increasingly wary of IOT decisions breaking devices  Meet someone, talk, ask questions think through a problem & solution to one of the following issues:  Limited UI  Broad range, ages of users (risk profile?)  Diagnostics/QA/QI and broad definition of personal data  Marketing information vs device information  Security limitations (e.g. updates)  Access/individual rights requests  Device ownership concerns  Third party integrations (e.g. AI)  Trust & branding 45
  • 46. “ ” Thanks everyone! CONTACT INFO: Austin T. Chambers Associate | CIPP/US, CIPP/C, CIPP/E Lewis, Bess, Williams & Weese, P.C. O: +1.303.228.2508 achambers@lewisbess.com 46