SlideShare ist ein Scribd-Unternehmen logo
1 von 75
What does Privacy by Design look like?
Privacy by Design?
- Internal -
A waste of time ?
- Internal -
Investment in the future
- Internal -
It is a tale of old
- Internal -
Plan
- Internal -
then build
- Internal -
a sustainable house
REMEMBER OUR MISSION STATEMENT
Insert mission statement 
- Internal -
Sustainability includes privacy-by-design
- Internal -
From the start
- Internal -
Multiple iterations
- Internal -
International
1. Proactive not Reactive: Preventative, not Remedial;
2. Privacy as the Default setting;
3. Privacy Embedded into Design;
4. Full Functionality: Positive-Sum, not Zero-Sum;
5. End-to-End Security: Full Lifecycle Protection;
6. Visibility and Transparency: Keep it Open;
7. Respect for User Privacy: Keep it User-Centric
- Internal -
GDPR angle (art. 25 GDPR)
• Principles (art. 5 GDPR)
o fair
o lawful (also art. 6, 9, 10, 44-29 GDPR + other laws)
o transparency (also art. 13-14 GDPR)
o purpose limitation
o data minimisation
o accuracy / data quality
o storage limitation / retention policy
o confidentiality + integrity / avoid data breaches (also art. 32-34 GDPR)
• Rights of the data subjects (art. 12 -23 GDPR)
• Privacy by default (art. 25 GDPR)
- Internal -
Special attention for
 Special categories of data (art. 9 + 10 GDPR)
 Special category of data subjects: children (art. 8 GDPR)
 Third parties (art. 26 + 28 GDPR)
 Third countries (art. 44 e.s. GDPR)
- Internal -
Honor simplicity
- Internal -
Avoid clear design flaws
Purpose
- Internal -
Avoid clear design flaws
Security
- Internal -
Possible supporting framework: RMIAS
- Internal -
Look at the entire data lifecycle
Less people can
reach it  gatekeepers
Data retention forces at work
Can we legitimately collect / create
the data (for that purpose)? (legal
constraints, contractual constraints,…)
Is the storage secure? Which
functions / roles need access?
Everybody else should be
kept out.
Is the integrity guarded?
Is the availability up to standard?
Can we legitimately use the data for
that purpose?
Is everybody with access bound by
confidentiality?
Can we legitimately share the data
(for that purpose)?
Do we want to share that data?
- Internal -
Take different perspectives
- Internal -
Have a “design jam” with the (internal) stakeholders
- Internal -
Don’t trap the customer…
- Internal -
Don’t screw the customer…
- Internal -
Be customer-centric
- Internal -
Eat your own dog food
- Internal -
Be transparent
- Internal -
Special attention for special categories of data
- Internal -
Special attention for cross-border (outside EU)
- Internal -
Know what you protect
• Aggregation
• Anonymisation
- Internal -
Work purpose-bound
- Internal -
Minimize the data
necessary ?
relevant ?
- Internal -
Aim for high data quality
- Internal -
Balance
test
Legal
requirement
Implied
consent
Explicit
consent
Have a clear basis for legitimacy
- Internal -
Consent?
- Internal -
The value of consent?
- Internal -
Make consent really informed (small bites)
- Internal -
Privacy statements
- Internal -
Guide the user
- Internal -
Guide the user
- Internal -
Technical and Organisational Measures
- Internal -
Environment
Physical
Human
Device
Application
Repository
Carrier
Create defense in depth
Risk Assessment
Risk Decision
Controls
Incident
Management
Changes
• In the regulatory environment
• In processes
• In people (JLT)
• In technology
Network
Data
3rd Parties
• 1st line
• 2nd line
• 3rd line
• Impact
• Probability
• Avoid
• Mitigate
• Share
• Accept
Changes
- Internal -
Use layered security measures
- Internal -
Implement a technical solution if possible
- Internal -
Don’t forget human computer interface
- Internal -
Assume breach
- Internal -
Think like an “attacker”
…but also
- Internal -
Segregate data (per data set)
- Internal -
Validate ID and Authenticate
- Internal -
Single sign-on
- Internal -
Encrypt
- Internal -
Encrypt in transit
- Internal -
Separate
- Internal -
Limit number of recipients
- Internal -
Test
- Internal -
Monitor for anomalies
- Internal -
Know how to detect and respond to data leaks
- Internal -
Data breach notification & communication
- Internal -
Get partners to commit on paper
- Internal -
External = three steps
Select
• RFI, RFP, BaFO
• Questionnaires and Questions
Contract
• Negotiations: need-to-have (law) v nice-to-have (practice)
• Risk Acceptance (as the case may be)
• Contract Management: execution retention
Follow-up
• Informal: “wine and dine”, relationship management, …
• Formal: questionnaires, audit, …
• Special: rights of data subjects (e.g. rectification, block)
- Internal -
Build in controls
- Internal -
Limit retention - consider the purpose(s)
- Internal -
Archive asap
- Internal -
Destroy asap
- Internal -
Take rights of data subjects into account
- Internal -
It starts with access…
- Internal -
It starts with access…
- Internal -
Right to be forgotten
- Internal -
Rights of data subjects - response
- Internal -
Have a clear view on the individual “ready”
- Internal -
Build to meet data subject requests
- Internal -
Give the user choices where possible
- Internal -
ARCHITECTURE LIFECYCLE
• Databases
• Links
• Silos v transversal
Informationassetownership
Data governance
- Internal -
Embed in the architecture
Insert architecture 
- Internal -
Check or insert in the data register
- Internal -
High risk data processing operations (> PIA)
That would be GREAT
Soooo… if you could do all that…

Weitere ähnliche Inhalte

Was ist angesagt?

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
Watchful Software
 

Was ist angesagt? (20)

Data protection
Data protectionData protection
Data protection
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Privacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons LearnedPrivacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons Learned
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
GDPR
GDPRGDPR
GDPR
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 

Ähnlich wie Training privacy by design

Ähnlich wie Training privacy by design (20)

Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Tradesecrets
TradesecretsTradesecrets
Tradesecrets
 
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .pptORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
 
Reverse Engineer wipo_iipm_ge_07_www_809561.ppt
Reverse Engineer wipo_iipm_ge_07_www_809561.pptReverse Engineer wipo_iipm_ge_07_www_809561.ppt
Reverse Engineer wipo_iipm_ge_07_www_809561.ppt
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Intellectual Property for Start-Ups and Small Businesses.
Intellectual Property for Start-Ups and Small Businesses. Intellectual Property for Start-Ups and Small Businesses.
Intellectual Property for Start-Ups and Small Businesses.
 
wipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.pptwipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.ppt
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 
ICIC 2014 The Information World Doesn’t Stop at Patents!
ICIC 2014 The Information World Doesn’t Stop at Patents! ICIC 2014 The Information World Doesn’t Stop at Patents!
ICIC 2014 The Information World Doesn’t Stop at Patents!
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislation
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
GDPRforum London
GDPRforum LondonGDPRforum London
GDPRforum London
 
Data Quality-Driven GDPR: Compliance with Confidence
Data Quality-Driven GDPR: Compliance with ConfidenceData Quality-Driven GDPR: Compliance with Confidence
Data Quality-Driven GDPR: Compliance with Confidence
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
 

Mehr von Tommy Vandepitte

Mehr von Tommy Vandepitte (20)

DPIA template
DPIA templateDPIA template
DPIA template
 
Gegevensbescherming-clausule in (overheids)opdracht
Gegevensbescherming-clausule in (overheids)opdrachtGegevensbescherming-clausule in (overheids)opdracht
Gegevensbescherming-clausule in (overheids)opdracht
 
20190131 - Presentation Q&A on legislation's influence (on travel management)
20190131 - Presentation Q&A on legislation's influence (on travel management)20190131 - Presentation Q&A on legislation's influence (on travel management)
20190131 - Presentation Q&A on legislation's influence (on travel management)
 
GDPR toegepast op huur-verhuur (Dutch)
GDPR toegepast op huur-verhuur (Dutch)GDPR toegepast op huur-verhuur (Dutch)
GDPR toegepast op huur-verhuur (Dutch)
 
Controller-to-processor agreements
Controller-to-processor agreementsController-to-processor agreements
Controller-to-processor agreements
 
Gegevensbescherming makelaars
Gegevensbescherming makelaarsGegevensbescherming makelaars
Gegevensbescherming makelaars
 
EEAS - Cultivate your data protection
EEAS - Cultivate your data protectionEEAS - Cultivate your data protection
EEAS - Cultivate your data protection
 
Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130
 
GDPR voor steden en gemeenten (Dutch)
GDPR voor steden en gemeenten (Dutch)GDPR voor steden en gemeenten (Dutch)
GDPR voor steden en gemeenten (Dutch)
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)
 
IS/DPP for staff #8 - Monitoring
IS/DPP for staff #8 - MonitoringIS/DPP for staff #8 - Monitoring
IS/DPP for staff #8 - Monitoring
 
IS/DPP for staff #7 - Incidents
IS/DPP for staff #7 - IncidentsIS/DPP for staff #7 - Incidents
IS/DPP for staff #7 - Incidents
 
IS/DPP for staff #6 - Acceptable use
IS/DPP for staff #6 - Acceptable useIS/DPP for staff #6 - Acceptable use
IS/DPP for staff #6 - Acceptable use
 
IS/DPP for staff #5b - Passwords
IS/DPP for staff #5b - PasswordsIS/DPP for staff #5b - Passwords
IS/DPP for staff #5b - Passwords
 
IS/DPP for staff #5a - Access
IS/DPP for staff #5a - AccessIS/DPP for staff #5a - Access
IS/DPP for staff #5a - Access
 
IS/DPP for staff #3b - Data Classification
IS/DPP for staff #3b - Data ClassificationIS/DPP for staff #3b - Data Classification
IS/DPP for staff #3b - Data Classification
 
IS/DPP for staff #3a - Data
IS/DPP for staff #3a - DataIS/DPP for staff #3a - Data
IS/DPP for staff #3a - Data
 
IS/DPP for staff #2 - Why?
IS/DPP for staff #2 - Why?IS/DPP for staff #2 - Why?
IS/DPP for staff #2 - Why?
 
IS/DPP for staff #1 - intro
IS/DPP for staff #1 - introIS/DPP for staff #1 - intro
IS/DPP for staff #1 - intro
 
Training Procurement
Training ProcurementTraining Procurement
Training Procurement
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Kürzlich hochgeladen (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Training privacy by design

Hinweis der Redaktion

  1. Determined purpose Explicited purpose Legitimate purpose Only collect data that is adequate, relevant and not excessive (necessary) for the determined purpose. Different purpose determines different data set. Consequence: meet the requirements per data set.
  2. the data subject has unambiguously given his consent; or processing is necessary in order to take steps at the request of the data subject prior to entering into a contract; or processing is necessary for the performance of a contract to which the data subject is party; or E.g. when a data subject requests a credit, it is legitimate to request, receive and process some personal data on that data subject, to determine whether or not it is opportune to grant a credit or not. processing is necessary for compliance with a legal obligation to which the controller is subject; or Note: generally only national legislation is considered as a source of legitimacy under this provision. E.g. the collection of personal data as imposed by AML regulation (Know-Your-Customer), collection of personal data as imposed by MiFID regulation (Know-Your-Customer: appropriateness / suitability), transferring data to (tax or supervisory) authorities which act under legal investigation powers, … processing is necessary in order to protect the vital interests of the data subject; or processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller or in a third party to whom the data are disclosed; or processing is necessary for the purposes of the legitimate interests pursued by the controller or by the third party or parties to whom the data are disclosed, except where such interests are overridden by the interests for fundamental rights and freedoms of the data subject, and in particular their right to privacy with respect to the processing of personal data. E.g. processing medical data of a patient in coma to ensure that the necessary treatment is provided.