SlideShare a Scribd company logo
What does Privacy by Design look like?
Privacy by Design?
- Internal -
A waste of time ?
- Internal -
Investment in the future
- Internal -
It is a tale of old
- Internal -
Plan
- Internal -
then build
- Internal -
a sustainable house
REMEMBER OUR MISSION STATEMENT
Insert mission statement 
- Internal -
Sustainability includes privacy-by-design
- Internal -
From the start
- Internal -
Multiple iterations
- Internal -
International
1. Proactive not Reactive: Preventative, not Remedial;
2. Privacy as the Default setting;
3. Privacy Embedded into Design;
4. Full Functionality: Positive-Sum, not Zero-Sum;
5. End-to-End Security: Full Lifecycle Protection;
6. Visibility and Transparency: Keep it Open;
7. Respect for User Privacy: Keep it User-Centric
- Internal -
GDPR angle (art. 25 GDPR)
• Principles (art. 5 GDPR)
o fair
o lawful (also art. 6, 9, 10, 44-29 GDPR + other laws)
o transparency (also art. 13-14 GDPR)
o purpose limitation
o data minimisation
o accuracy / data quality
o storage limitation / retention policy
o confidentiality + integrity / avoid data breaches (also art. 32-34 GDPR)
• Rights of the data subjects (art. 12 -23 GDPR)
• Privacy by default (art. 25 GDPR)
- Internal -
Special attention for
 Special categories of data (art. 9 + 10 GDPR)
 Special category of data subjects: children (art. 8 GDPR)
 Third parties (art. 26 + 28 GDPR)
 Third countries (art. 44 e.s. GDPR)
- Internal -
Honor simplicity
- Internal -
Avoid clear design flaws
Purpose
- Internal -
Avoid clear design flaws
Security
- Internal -
Possible supporting framework: RMIAS
- Internal -
Look at the entire data lifecycle
Less people can
reach it  gatekeepers
Data retention forces at work
Can we legitimately collect / create
the data (for that purpose)? (legal
constraints, contractual constraints,…)
Is the storage secure? Which
functions / roles need access?
Everybody else should be
kept out.
Is the integrity guarded?
Is the availability up to standard?
Can we legitimately use the data for
that purpose?
Is everybody with access bound by
confidentiality?
Can we legitimately share the data
(for that purpose)?
Do we want to share that data?
- Internal -
Take different perspectives
- Internal -
Have a “design jam” with the (internal) stakeholders
- Internal -
Don’t trap the customer…
- Internal -
Don’t screw the customer…
- Internal -
Be customer-centric
- Internal -
Eat your own dog food
- Internal -
Be transparent
- Internal -
Special attention for special categories of data
- Internal -
Special attention for cross-border (outside EU)
- Internal -
Know what you protect
• Aggregation
• Anonymisation
- Internal -
Work purpose-bound
- Internal -
Minimize the data
necessary ?
relevant ?
- Internal -
Aim for high data quality
- Internal -
Balance
test
Legal
requirement
Implied
consent
Explicit
consent
Have a clear basis for legitimacy
- Internal -
Consent?
- Internal -
The value of consent?
- Internal -
Make consent really informed (small bites)
- Internal -
Privacy statements
- Internal -
Guide the user
- Internal -
Guide the user
- Internal -
Technical and Organisational Measures
- Internal -
Environment
Physical
Human
Device
Application
Repository
Carrier
Create defense in depth
Risk Assessment
Risk Decision
Controls
Incident
Management
Changes
• In the regulatory environment
• In processes
• In people (JLT)
• In technology
Network
Data
3rd Parties
• 1st line
• 2nd line
• 3rd line
• Impact
• Probability
• Avoid
• Mitigate
• Share
• Accept
Changes
- Internal -
Use layered security measures
- Internal -
Implement a technical solution if possible
- Internal -
Don’t forget human computer interface
- Internal -
Assume breach
- Internal -
Think like an “attacker”
…but also
- Internal -
Segregate data (per data set)
- Internal -
Validate ID and Authenticate
- Internal -
Single sign-on
- Internal -
Encrypt
- Internal -
Encrypt in transit
- Internal -
Separate
- Internal -
Limit number of recipients
- Internal -
Test
- Internal -
Monitor for anomalies
- Internal -
Know how to detect and respond to data leaks
- Internal -
Data breach notification & communication
- Internal -
Get partners to commit on paper
- Internal -
External = three steps
Select
• RFI, RFP, BaFO
• Questionnaires and Questions
Contract
• Negotiations: need-to-have (law) v nice-to-have (practice)
• Risk Acceptance (as the case may be)
• Contract Management: execution retention
Follow-up
• Informal: “wine and dine”, relationship management, …
• Formal: questionnaires, audit, …
• Special: rights of data subjects (e.g. rectification, block)
- Internal -
Build in controls
- Internal -
Limit retention - consider the purpose(s)
- Internal -
Archive asap
- Internal -
Destroy asap
- Internal -
Take rights of data subjects into account
- Internal -
It starts with access…
- Internal -
It starts with access…
- Internal -
Right to be forgotten
- Internal -
Rights of data subjects - response
- Internal -
Have a clear view on the individual “ready”
- Internal -
Build to meet data subject requests
- Internal -
Give the user choices where possible
- Internal -
ARCHITECTURE LIFECYCLE
• Databases
• Links
• Silos v transversal
Informationassetownership
Data governance
- Internal -
Embed in the architecture
Insert architecture 
- Internal -
Check or insert in the data register
- Internal -
High risk data processing operations (> PIA)
That would be GREAT
Soooo… if you could do all that…

More Related Content

PPTX
GDPR: Training Materials by Qualsys
PDF
Privacy-ready Data Protection Program Implementation
PPTX
General Data Protection Regulations (GDPR): Do you understand it and are you ...
PPTX
skillcast-gdpr-training-presentation-q320.pptx
PPTX
Data Protection Officer Dashboard | GDPR
PDF
Checklist for SMEs for GDPR compliance
PDF
Data Protection and Privacy
PDF
Everything you Need to Know about The Data Protection Officer Role
GDPR: Training Materials by Qualsys
Privacy-ready Data Protection Program Implementation
General Data Protection Regulations (GDPR): Do you understand it and are you ...
skillcast-gdpr-training-presentation-q320.pptx
Data Protection Officer Dashboard | GDPR
Checklist for SMEs for GDPR compliance
Data Protection and Privacy
Everything you Need to Know about The Data Protection Officer Role

What's hot (20)

PDF
GDPR Overview
PDF
Privacy by Design and by Default + General Data Protection Regulation with Si...
PPTX
GDPR Presentation slides
PPTX
Privacy & Data Protection
PDF
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
PPTX
Privacy by Design - taking in account the state of the art
PDF
GDPR Basics - General Data Protection Regulation
PPTX
Privacy by Design: legal perspective
PDF
Privacy by design
PPTX
Legal obligations and responsibilities of data processors and controllers und...
PPTX
Gdpr presentation
PPTX
Data Loss Prevention
PPTX
General Data Protection Regulation
PDF
Overview of Data Loss Prevention (DLP) Technology
PDF
Introducing Data Loss Prevention 14
PDF
Common Practice in Data Privacy Program Management
PPTX
Data Privacy Introduction
PDF
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
PPTX
Advanced Data Protection training for volunteers
GDPR Overview
Privacy by Design and by Default + General Data Protection Regulation with Si...
GDPR Presentation slides
Privacy & Data Protection
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Privacy by Design - taking in account the state of the art
GDPR Basics - General Data Protection Regulation
Privacy by Design: legal perspective
Privacy by design
Legal obligations and responsibilities of data processors and controllers und...
Gdpr presentation
Data Loss Prevention
General Data Protection Regulation
Overview of Data Loss Prevention (DLP) Technology
Introducing Data Loss Prevention 14
Common Practice in Data Privacy Program Management
Data Privacy Introduction
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Advanced Data Protection training for volunteers
Ad

Similar to Training privacy by design (20)

PPTX
Privacy Secrets Your Systems May Be Telling
PPTX
Privacy Secrets Your Systems May Be Telling
PDF
TLabs - deutsche telekom
PPTX
Privacy by Design or Privacy by Re-engineering
PPT
Data Privacy - What the CIO and CISO know
PDF
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
PPTX
Privacy experience in Plone and other open source CMS
PDF
GDPR for Things - ThingsCon Amsterdam 2017
PDF
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
PDF
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
PPTX
Privacy by design
PDF
Toreon adding privacy by design in secure application development oss18 v20...
PPTX
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
PDF
The Rise of Data Ethics and Security - AIDI Webinar
PDF
Data Privacy: A runbook for engineers 1st Edition Nishant Bhajaria
PPTX
Gdpr brief and controls ver2.0
PDF
How to Build a Privacy Program
PDF
apidays LIVE Paris 2021 - Privacy Engineering by Ian Oliver, Nokia Bell Labs
PPT
GDPR: Into Practice
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
TLabs - deutsche telekom
Privacy by Design or Privacy by Re-engineering
Data Privacy - What the CIO and CISO know
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Privacy experience in Plone and other open source CMS
GDPR for Things - ThingsCon Amsterdam 2017
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
Privacy by design
Toreon adding privacy by design in secure application development oss18 v20...
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
The Rise of Data Ethics and Security - AIDI Webinar
Data Privacy: A runbook for engineers 1st Edition Nishant Bhajaria
Gdpr brief and controls ver2.0
How to Build a Privacy Program
apidays LIVE Paris 2021 - Privacy Engineering by Ian Oliver, Nokia Bell Labs
GDPR: Into Practice
Ad

More from Tommy Vandepitte (20)

DOCX
DPIA template
DOCX
Gegevensbescherming-clausule in (overheids)opdracht
PPTX
20190131 - Presentation Q&A on legislation's influence (on travel management)
PPTX
GDPR toegepast op huur-verhuur (Dutch)
PPTX
Controller-to-processor agreements
PPTX
Gegevensbescherming makelaars
PPTX
EEAS - Cultivate your data protection
PPTX
Presentation for the LSEC GDPR event - 20171130
PPTX
GDPR voor steden en gemeenten (Dutch)
PPTX
GDPR project board deck (example)
PPTX
IS/DPP for staff #8 - Monitoring
PPTX
IS/DPP for staff #7 - Incidents
PPTX
IS/DPP for staff #6 - Acceptable use
PPTX
IS/DPP for staff #5b - Passwords
PPTX
IS/DPP for staff #5a - Access
PPTX
IS/DPP for staff #3b - Data Classification
PPTX
IS/DPP for staff #3a - Data
PPTX
IS/DPP for staff #2 - Why?
PPTX
IS/DPP for staff #1 - intro
PPTX
Training Procurement
DPIA template
Gegevensbescherming-clausule in (overheids)opdracht
20190131 - Presentation Q&A on legislation's influence (on travel management)
GDPR toegepast op huur-verhuur (Dutch)
Controller-to-processor agreements
Gegevensbescherming makelaars
EEAS - Cultivate your data protection
Presentation for the LSEC GDPR event - 20171130
GDPR voor steden en gemeenten (Dutch)
GDPR project board deck (example)
IS/DPP for staff #8 - Monitoring
IS/DPP for staff #7 - Incidents
IS/DPP for staff #6 - Acceptable use
IS/DPP for staff #5b - Passwords
IS/DPP for staff #5a - Access
IS/DPP for staff #3b - Data Classification
IS/DPP for staff #3a - Data
IS/DPP for staff #2 - Why?
IS/DPP for staff #1 - intro
Training Procurement

Recently uploaded (20)

PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Pre independence Education in Inndia.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
RMMM.pdf make it easy to upload and study
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Business Ethics Teaching Materials for college
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
VCE English Exam - Section C Student Revision Booklet
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Module 4: Burden of Disease Tutorial Slides S2 2025
Supply Chain Operations Speaking Notes -ICLT Program
Pre independence Education in Inndia.pdf
01-Introduction-to-Information-Management.pdf
Microbial disease of the cardiovascular and lymphatic systems
Week 4 Term 3 Study Techniques revisited.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharma ospi slides which help in ospi learning
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Final Presentation General Medicine 03-08-2024.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
RMMM.pdf make it easy to upload and study
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Business Ethics Teaching Materials for college
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Complications of Minimal Access Surgery at WLH
Basic Mud Logging Guide for educational purpose
PPH.pptx obstetrics and gynecology in nursing
VCE English Exam - Section C Student Revision Booklet

Training privacy by design

Editor's Notes

  • #30: Determined purpose Explicited purpose Legitimate purpose Only collect data that is adequate, relevant and not excessive (necessary) for the determined purpose. Different purpose determines different data set. Consequence: meet the requirements per data set.
  • #33: the data subject has unambiguously given his consent; or processing is necessary in order to take steps at the request of the data subject prior to entering into a contract; or processing is necessary for the performance of a contract to which the data subject is party; or E.g. when a data subject requests a credit, it is legitimate to request, receive and process some personal data on that data subject, to determine whether or not it is opportune to grant a credit or not. processing is necessary for compliance with a legal obligation to which the controller is subject; or Note: generally only national legislation is considered as a source of legitimacy under this provision. E.g. the collection of personal data as imposed by AML regulation (Know-Your-Customer), collection of personal data as imposed by MiFID regulation (Know-Your-Customer: appropriateness / suitability), transferring data to (tax or supervisory) authorities which act under legal investigation powers, … processing is necessary in order to protect the vital interests of the data subject; or processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller or in a third party to whom the data are disclosed; or processing is necessary for the purposes of the legitimate interests pursued by the controller or by the third party or parties to whom the data are disclosed, except where such interests are overridden by the interests for fundamental rights and freedoms of the data subject, and in particular their right to privacy with respect to the processing of personal data. E.g. processing medical data of a patient in coma to ensure that the necessary treatment is provided.