Privacy Policies Are Not Enough: We Need Software Transparency

Information and communications technologies (ICTs) intermediate our transactions and lives. How are we to trust the many devices, sensors, operating systems, apps, modules, APIs, platforms, ecosystems, clouds and other networks that surround us and collect, process, share and retain so much personal data?

As we become enmeshed in the Internet of Things, surrounded by cloud computing and big data, transparency and accountability issues have risen to public prominence. Organizations of all kinds are increasingly required to show that they are keeping privacy promises and avoiding privacy harms.

It is difficult for anyone to validate the privacy claims made by technology developers and service providers. A privacy policy or transparency statement is a good starting point but, by itself, only expresses aspirations and intentions. It stands to reason that documented and independently verifiable privacy claims should enhance compliance, credibility and trust goals. To achieve this, we need standardized methods and tools.

Transparency and Accountability Foster Confidence and Trust

In 1999, Lawrence Lessig wrote in Code and Other Laws of Cyberspace that value, interests and policy decisions are embedded in software code, which in turn shapes users in profound ways. The significance of Lessig’s observations are more urgent than ever before, especially as software “code” is so much more complex and opaque today, relying on user confidence for adoption.

“Code” needs to be more transparent and accountable in order to be trusted.

The OASIS Privacy by Design for Software Engineers (PbD-SE) Technical Committee has developed a draft specification to help document software engineering privacy decisions that are consistent with Privacy by Design (PbD) and the Fair Information Practice Principles (FIPPs).

Since the 1990s, there have been many efforts worldwide in developing standardized methods to design and evaluate the privacy properties of technologies that embody privacy interests. Those efforts have expanded, along with technological developments and the rise of privacy professionals as a distinct, multidisciplinary practice.

Notable examples of third-party evaluation and certification programs for software include the Federal Information Processing Standard Publication 140-2 for cryptographic modules, the Office of the National Coordinator for Health Information Technology Certification Program for electronic health record technologies and the European Privacy Seal (EuroPrise) for IT products and IT-based services.

Ideally, privacy should have its own globally-recognized trustmark.

Transparency and Accountability Are for Everyone

Transparency and accountability must be demonstrable to an increasing range of interested stakeholders, not just consumers/citizens and marketplace regulators but also to internal project participants and shareholders, business partners, industry groups, attentive civil and consumer rights groups and to the public at large.

In the information-security domain, evaluation, audit and certification standards for organizations have matured rapidly, especially since the advent of breach disclosure requirements. The general trend emphasizes transparency and accountability of whole operations, enterprises, even ecosystems. Security is becoming a property that can be measured and maximized. Now privacy must catch up.

Privacy by Design Offers a Framework for Best in Class

Developed over the past decade and a half, in response to an evolving world, and unanimously approved in 2010 as an international standard by the International Assembly of Privacy and Data Protection Authorities, the seven foundational principles of PbD build upon the FIPPs but go beyond them to prescribe the highest possible standard of privacy protection.

Since PbD principles are universal in scope, the main challenge since 2010 has been to operationalize the PbD framework in specific domains, much like the ISO 17799 security framework is operationalized by the 27000 series of controls.

Created in late 2012, the OASIS PbD Documentation for Software Engineers Technical Committee has developed a draft specification of a methodology to help engineers model and document PbD requirements, translate the PbD principles to conformance requirements within software engineering tasks and produce artifacts as evidence of compliance.

The intended audience is primarily software engineers tasked with implementing and documenting functional privacy requirements to show compliance to PbD principles. However, as software engineers operate in larger contexts, this specification should also be of interest to their project managers, business managers and executives, privacy policymakers, privacy and security consultants, auditors, regulators, IT systems architects and analysts and other designers of systems that collect, store, process, use, share transport across borders, exchange, secure, retain or destroy personal information. We believe it will have a wide reach.

Written By

Ann Cavoukian

Written By

Dawn Jutla


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

NEW! Raise Staff Awareness

Equip all your data-handling staff to reduce privacy risk, with Privacy Core™ e-learning essentials.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

NEW! FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Schooled in Privacy

Looking to get some higher-ed in privacy? Check out these schools that include data privacy courses in their curricula.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

NEW! Raise Staff Awareness

Equip all your data-handling staff to reduce privacy risk, with Privacy Core™ e-learning essentials.

The Industry of Privacy

Take stock, compare your practices to those of other organizations, and get budget with these studies on the industry of privacy.

More Resources »

P.S.R.—One Powerhouse Program

The program is too good to miss. The speakers are world-renowned. P.S.R. brings you the best of the best in privacy and security. Don't wait: Register now!

Speak at the Intensive!

The call for proposals for our London event, the Data Protection Intensive, is now open! Submit your session idea today.

Time to Get to Work at the Congress

Thought leadership, a thriving community and unrivaled education...the Congress prepares you for the challenges ahead. Register today.

GDPR Comprehensive London: Last Chance!

The IAPP GDPR Comprehensive heads to London this fall. This is your last chance at this popular program this year!

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»