TOTAL: {[ getCartTotalCost() | currencyFilter ]} Update cart for total shopping_basket Checkout

Daily Dashboard | A deep dive into 'strategic privacy by design' Related reading: Major trends in US cybersecurity law and policy

rss_feed

""

"Most current approaches to 'privacy by design' are mere Band-Aids, after-the-fact applications of either security controls or notice/choice controls," writes Enterprivacy's Jason Cronk, CIPP/US, CIPM, CIPT, FIP. "Proper PbD, embodying the principles of 'privacy embedded into design,' 'privacy by default,' and being 'proactive, not reactive,' requires more analysis, substantially more forethought, and design hinged on the privacy risks rather than current practices." Cronk details his strategic approach to PbD, framed in part by thinking of the strategies required in a game of chess, in a new and in-depth white paper, complete with two practical scenarios to demonstrate a strategic approach, housed in the IAPP's Resource Center. 
Full Story

2 Comments

If you want to comment on this post, you need to login.

  • comment Web Hull • Oct 15, 2017
    Great article! Well worth reading for PbD fans.
  • comment Stuart Thomas • Oct 15, 2017
    Thanks for this, this is good, and useful, at a high-level.  I have used privacy misuse cases (privacy threats) and privacy user stories (to mitigate threats), these drive developer and architectural and other requirements - ensuring privacy is embedded at the beginning of projects (drawing on NIST/BS10012 controls and good practices) The NHS in the UK (900,000 users!) worked on some of these issues 14 years ago in digitising privacy laws/requirements, interesting times, again! :-)