RESOURCE ARTICLE

Check or Mate? Strategic Privacy by Design

This white paper provides a strategic approach to PbD, with practical scenarios to demonstrate a strategic approach.


Published: 12 Oct. 2017

View PDF

This IAPP white paper by Enterprivacy Consulting Group's Jason Cronk, CIPP/US, CIPM, CIPT, FIP, details his strategic approach to PbD, framed in part by thinking of the strategies required in a game of chess, complete with two practical scenarios to demonstrate a strategic approach.

"Proper PbD, embodying the principles of 'privacy embedded into design,' 'privacy by default,' and being 'proactive, not reactive,' requires more analysis, substantially more forethought, and design hinged on the privacy risks rather than current practices."


CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

R. Jason Cronk

President, Institute of Operational Privacy Design

CIPP/US, CIPM, CIPT, FIP


Tags:

Program managementPrivacy
RESOURCE ARTICLE

Check or Mate? Strategic Privacy by Design

This white paper provides a strategic approach to PbD, with practical scenarios to demonstrate a strategic approach.

Published: 12 Oct. 2017

View PDF

Contributors:

R. Jason Cronk

President, Institute of Operational Privacy Design

CIPP/US, CIPM, CIPT, FIP


This IAPP white paper by Enterprivacy Consulting Group's Jason Cronk, CIPP/US, CIPM, CIPT, FIP, details his strategic approach to PbD, framed in part by thinking of the strategies required in a game of chess, complete with two practical scenarios to demonstrate a strategic approach.

"Proper PbD, embodying the principles of 'privacy embedded into design,' 'privacy by default,' and being 'proactive, not reactive,' requires more analysis, substantially more forethought, and design hinged on the privacy risks rather than current practices."


CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Program managementPrivacy

Related resources