SlideShare a Scribd company logo
Data Privacy
Implementation for
Startups
Privacy-By-Design
Nov 2020
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved
1
Tanya Yankelevich
+972-54-2468156
Tanya@privacyroad.co
Why to implement Privacy?
❖ Global focus:
GDPR, CCPA, LGPD, HIPAA, Israel Privacy law
and more
❖ Non-compliance - risk to business:
↓ Legal - risk of suit
↓ Financial Consequences - fines
↓ Loss of business opportunities
↓ Critical factor for investment
↓ Late ad-hoc rework – multiplied cost
↓ Loss of Market Reputation
11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 2
Common Mistakes in Startups approach
It is relevant only for large companies
it is all or nothing - if not everything, no point to do at all
We’ll worry about it later when we go to market
Information Security = Privacy Protection
We can copy what was done by another company
All regulations the same – one is done, all covered
Covering only part of the data used, e.g. ignoring HR data
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 3
Result
Start-up hits the wall at market entry, closing
deals, investments
Ad-hoc late reworks that disrupt the product,
cause waste of budget and time
What is Personal Data
Any data related to an identified or identifiable person
Examples:
11/20/2020
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 4
Name, ID, address, phone numbers, drivers license
Gender, date of birth, family status
Financial info, tax records
Private life data: photos, videos, geo-tracking, shopping history
Technical identifications: IP address, device type, cookies
Special Categories: health, religion, biometric, genetic, children’s data
🧑‍🤝‍🧑
🧑‍🤝‍🧑
🧑‍🤝‍🧑
🧑‍🤝‍🧑
🧑‍🤝‍🧑
🧑‍🤝‍🧑
Data Ownership models
5Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved
B2C
• Ownership of Data (Controller)
• Full responsibility
• Direct relationship with Data Subjects
B2B2C
• Processing for Controller (Processor responsibility)
• Data use also for own purposes (Processor and
Controller)
• Software vendor, no processing – Solutions should be
based on Privacy by Design
B2B
• Limited use of personal data – users, customers,
partners, vendors, employees
InternalData
Privacy program
Privacy By Design and By Default
11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 6
• Product Strategy & Roadmap
• Architecture, Design
• QA & Validation
• Product Marketing
Product
• Privacy Policy
• Risk Assessments - DPIA, PIA
• Auditing, Reporting, documentation
• Legal: Supplier engagement, customer contracts, etc.
• HR & Finance
Operations
• Security Policy
• IT policies
• IT Vendors, Cloud providers, etc.
IT & Security
It’s a journey -
not a one-time event
Privacy by Design and by Default
Key for Privacy support
GDPR Art. 25
Data protection by design and by default
“the controller shall … implement appropriate technical and
organisational measures … in an effective manner and to integrate the
necessary safeguards into the processing in order to meet the
requirements of this Regulation and protect the rights of data subjects”
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 7
Privacy by Design
Privacy support is imbedded in the Product
functionality and organizational processes
Privacy by Default
Privacy is the default set-up - No special action
required from user to achieve privacy
Privacy Compliance program
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 8
Discovery: Data mapping, Regulations, Risks
Baseline Program Plan & Execution
Awareness, Training; Compliance Documentation
Privacy Governance, Sustaining Compliance
Continual Evolution, DPIAs, Reviews & Audits
Efficient program is critical for Start-ups - No time or budget for trial-and-error
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 9
PrivacyRoad Services
Benefits of Compliance:
√ Competitive business
advantage
√ Removing obstacle for
business and investments
√ Minimization of potential
Data breach damages
and costs
√ Better utilization of data
Discovery:
Map & Analyze
Design &
Planning
Privacy
Program
support
Compliance
Documentation
Awareness &
Training
Follow-up
consulting &
support
Guiding Start-ups and Software companies on Privacy Compliance and Privacy-by-
Design implementation in practical and efficient way
About me…
❖ 30 years of experience in leadership roles
of Software Product Development and
Delivery – from start-ups to large
enterprises
❖ Data Privacy knowledge & certifications
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 10
Tanya@privacyroad.co
+972-54-2468156
Linkedin: Tanya Yankelevich
Leveraging the combined experience to
guide Start-ups in Privacy-by-design
implementation though products and
processes
For more information – please contact:
Tanya Yankelevich
Founder, PrivacyRoad
11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved
Some Quotes about Privacy…..
Privacy is the new competitive battleground
“…. By not only meeting the demands of these new regulations but
exceeding them, companies have an opportunity to differentiate
themselves from competitors to grow their bottom line, thanks to new
technologies that put data privacy in the hands of consumers.”
Alex Andrade-Walz, Techcrunch, December 16, 2020
”Without privacy, there was no point in being an individual.” – Jonathan
Franzen
“Data is Old; Humans Are the New Oil”, Joseph Carson, Chief Security
Scientist at Thycotic
11

More Related Content

PDF
MMV Webinar 1. GDPR Perspectives. November 2017
PPTX
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
PDF
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
PDF
Whos role is it anyway
PPTX
BigID GDPR Compliance Automation Webinar Slides
PPTX
Vulnerability Voodoo and the Convergence of Foundational Security Controls
PPTX
Data1 qbit investor presentation v1.3
PPTX
Privacy by Design as a system design strategy - EIC 2019
MMV Webinar 1. GDPR Perspectives. November 2017
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Whos role is it anyway
BigID GDPR Compliance Automation Webinar Slides
Vulnerability Voodoo and the Convergence of Foundational Security Controls
Data1 qbit investor presentation v1.3
Privacy by Design as a system design strategy - EIC 2019

What's hot (8)

PPTX
Privacy by Design - taking in account the state of the art
PPTX
Next Dimension: How to create a Cybersecurity Strategy
PPTX
The 3 Phased Approach to Data Leakage Prevention (DLP)
PDF
How privacy by design can be the key of your success at the time of the digit...
PDF
What is an IANS Connector Event? - Factor 3
PPTX
Data Privacy: What you need to know about privacy, from compliance to ethics
PDF
GDPR - no beginning no end
PDF
Splunk: How Machine Data Supports GDPR Compliance
Privacy by Design - taking in account the state of the art
Next Dimension: How to create a Cybersecurity Strategy
The 3 Phased Approach to Data Leakage Prevention (DLP)
How privacy by design can be the key of your success at the time of the digit...
What is an IANS Connector Event? - Factor 3
Data Privacy: What you need to know about privacy, from compliance to ethics
GDPR - no beginning no end
Splunk: How Machine Data Supports GDPR Compliance
Ad

Similar to Privacy-by-design for Startups - why, what and how (20)

PPTX
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
PDF
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
PPTX
20250424 - CWF - GDPR - Data protection notice v2.pptx
PDF
Marketing Program Overview_Sal A _2012 v2.1
PDF
TrustArc Webinar - Data Privacy: The Hidden Beast within Mergers & Acquisitions
PPTX
PrivIQ Product Overview Plataforma de Compliance LGPD
PPTX
Data protection: Steps Organisations can take to ensure compliance
PDF
What is a data protection impact assessment? what are the essential stages to...
PDF
What is a data protection impact assessment?
PPTX
Privacy by Design: White Papaer
PPTX
Challenges & Opportunities the Data Privacy Act Brings
PDF
Cybersecurity: How To Protect Your Law Firm Data
PDF
Common Practice in Data Privacy Program Management
PPTX
Ciso round table on effective implementation of dlp & data security
PDF
05.05.2021-webinar-presentation-experts-series-How-to-Switch-to-a-Better-DLP.pdf
PDF
TLabs - deutsche telekom
PDF
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
PDF
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
PPT
Meeting the cyber risk challenge
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
20250424 - CWF - GDPR - Data protection notice v2.pptx
Marketing Program Overview_Sal A _2012 v2.1
TrustArc Webinar - Data Privacy: The Hidden Beast within Mergers & Acquisitions
PrivIQ Product Overview Plataforma de Compliance LGPD
Data protection: Steps Organisations can take to ensure compliance
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment?
Privacy by Design: White Papaer
Challenges & Opportunities the Data Privacy Act Brings
Cybersecurity: How To Protect Your Law Firm Data
Common Practice in Data Privacy Program Management
Ciso round table on effective implementation of dlp & data security
05.05.2021-webinar-presentation-experts-series-How-to-Switch-to-a-Better-DLP.pdf
TLabs - deutsche telekom
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Meeting the cyber risk challenge
BSIDES DETROIT 2015: Data breaches cost of doing business
Ad

Recently uploaded (20)

PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Cost to Outsource Software Development in 2025
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
history of c programming in notes for students .pptx
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
AutoCAD Professional Crack 2025 With License Key
PDF
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
CHAPTER 2 - PM Management and IT Context
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Wondershare Filmora 15 Crack With Activation Key [2025
Reimagine Home Health with the Power of Agentic AI​
Cost to Outsource Software Development in 2025
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
history of c programming in notes for students .pptx
Design an Analysis of Algorithms I-SECS-1021-03
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Patient Appointment Booking in Odoo with online payment
AutoCAD Professional Crack 2025 With License Key
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Monitoring Stack: Grafana, Loki & Promtail
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
Computer Software and OS of computer science of grade 11.pptx
CHAPTER 2 - PM Management and IT Context
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf

Privacy-by-design for Startups - why, what and how

  • 1. Data Privacy Implementation for Startups Privacy-By-Design Nov 2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 1 Tanya Yankelevich +972-54-2468156 Tanya@privacyroad.co
  • 2. Why to implement Privacy? ❖ Global focus: GDPR, CCPA, LGPD, HIPAA, Israel Privacy law and more ❖ Non-compliance - risk to business: ↓ Legal - risk of suit ↓ Financial Consequences - fines ↓ Loss of business opportunities ↓ Critical factor for investment ↓ Late ad-hoc rework – multiplied cost ↓ Loss of Market Reputation 11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 2
  • 3. Common Mistakes in Startups approach It is relevant only for large companies it is all or nothing - if not everything, no point to do at all We’ll worry about it later when we go to market Information Security = Privacy Protection We can copy what was done by another company All regulations the same – one is done, all covered Covering only part of the data used, e.g. ignoring HR data Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 3 Result Start-up hits the wall at market entry, closing deals, investments Ad-hoc late reworks that disrupt the product, cause waste of budget and time
  • 4. What is Personal Data Any data related to an identified or identifiable person Examples: 11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 4 Name, ID, address, phone numbers, drivers license Gender, date of birth, family status Financial info, tax records Private life data: photos, videos, geo-tracking, shopping history Technical identifications: IP address, device type, cookies Special Categories: health, religion, biometric, genetic, children’s data 🧑‍🤝‍🧑 🧑‍🤝‍🧑 🧑‍🤝‍🧑 🧑‍🤝‍🧑 🧑‍🤝‍🧑 🧑‍🤝‍🧑
  • 5. Data Ownership models 5Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved B2C • Ownership of Data (Controller) • Full responsibility • Direct relationship with Data Subjects B2B2C • Processing for Controller (Processor responsibility) • Data use also for own purposes (Processor and Controller) • Software vendor, no processing – Solutions should be based on Privacy by Design B2B • Limited use of personal data – users, customers, partners, vendors, employees InternalData
  • 6. Privacy program Privacy By Design and By Default 11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 6 • Product Strategy & Roadmap • Architecture, Design • QA & Validation • Product Marketing Product • Privacy Policy • Risk Assessments - DPIA, PIA • Auditing, Reporting, documentation • Legal: Supplier engagement, customer contracts, etc. • HR & Finance Operations • Security Policy • IT policies • IT Vendors, Cloud providers, etc. IT & Security It’s a journey - not a one-time event
  • 7. Privacy by Design and by Default Key for Privacy support GDPR Art. 25 Data protection by design and by default “the controller shall … implement appropriate technical and organisational measures … in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects” Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 7 Privacy by Design Privacy support is imbedded in the Product functionality and organizational processes Privacy by Default Privacy is the default set-up - No special action required from user to achieve privacy
  • 8. Privacy Compliance program Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 8 Discovery: Data mapping, Regulations, Risks Baseline Program Plan & Execution Awareness, Training; Compliance Documentation Privacy Governance, Sustaining Compliance Continual Evolution, DPIAs, Reviews & Audits Efficient program is critical for Start-ups - No time or budget for trial-and-error
  • 9. Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 9 PrivacyRoad Services Benefits of Compliance: √ Competitive business advantage √ Removing obstacle for business and investments √ Minimization of potential Data breach damages and costs √ Better utilization of data Discovery: Map & Analyze Design & Planning Privacy Program support Compliance Documentation Awareness & Training Follow-up consulting & support Guiding Start-ups and Software companies on Privacy Compliance and Privacy-by- Design implementation in practical and efficient way
  • 10. About me… ❖ 30 years of experience in leadership roles of Software Product Development and Delivery – from start-ups to large enterprises ❖ Data Privacy knowledge & certifications Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 10 Tanya@privacyroad.co +972-54-2468156 Linkedin: Tanya Yankelevich Leveraging the combined experience to guide Start-ups in Privacy-by-design implementation though products and processes For more information – please contact: Tanya Yankelevich Founder, PrivacyRoad
  • 11. 11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved Some Quotes about Privacy….. Privacy is the new competitive battleground “…. By not only meeting the demands of these new regulations but exceeding them, companies have an opportunity to differentiate themselves from competitors to grow their bottom line, thanks to new technologies that put data privacy in the hands of consumers.” Alex Andrade-Walz, Techcrunch, December 16, 2020 ”Without privacy, there was no point in being an individual.” – Jonathan Franzen “Data is Old; Humans Are the New Oil”, Joseph Carson, Chief Security Scientist at Thycotic 11