1 of 34

Slide Notes

DownloadGo Live

Privacy by design - from a coders perspective

Published on Jan 28, 2016

No Description

PRESENTATION OUTLINE

Privacy by design

FROM A CODERS PERSPECTIVE
Photo by "lapolab"

A Guide for Start-ups

FROM A CODERS PERSPECTIVE
Photo by marksweb

PRIVACY

Photo by arnoKath

Privacy partially overlaps with security (confidentiality) but may also take the form of bodily integrity (inviolability of the physical body).

Photo by Yu. Samoilov

THE GOOD
THE BAD
THE UGLY

Photo by csullens

the BAD

AIL statistics 2015

the good

Photo by black.zack00

General Data Protection Regulation

  • Europe wide harmonisation
  • stronger responsibility & DPIA
  • administrative sanctions
  • right to be forgotton
  • data portability
  • privacy by desgin/default

the ugly

Photo by Pedro Vezini

Untitled Slide

DESIGN

Photo by <Fernando>

Creation of a plan for the construction of a system, considering the aesthetic, functional, economic and sociopolitical dimensions

Real-life privacy

GOES BEYOND
Photo by paul bica

Forget about law
privacy is too important to keep it to lawyers ;)

secure coding

applied to privacy concerns
Photo by ruiwen

Phases

  • Architecture
  • Design
  • Implementation
  • Operation
  • Testing
  • Maintenance
  • Evaluation
Photo by SivamDesign

architecture

Privacy relevant principles
Photo by Thristian

KEY decisions

  • Program organisation (modules)
  • Major data structures
  • Key algorithms
  • Error processing
  • Active or passive privacy
  • Fault tolerance
Photo by garrettc

PRINCIPLES

  • "working backwards"
  • know your ennemy
  • chain of trust
  • Auth/Aut/Acc/Aud
  • Res/Recog/Recov
  • Fail/degrade safely
Photo by vintagedept

principles (2)

  • event repeatability
  • multi-layer defense
  • KISS (modularise)
  • Seek statelessness
  • Reuse code
  • Address "weak links"
Photo by vintagedept

DESIGN

PRIVACY RELEVANT PRINCIPLES

principles

  • DPIA
  • Compartmentalization
Photo by vintagedept

IMPLEMENTATION

PRIVACY RELEVANT PRINCIPLES

PRINCIPLES

  • Handle data with care
  • Thoroughly review
  • Use checklists
  • Create maintainable code
  • Reuse code
Photo by adactio

OPERATIONS

PRIVACY RELEVANT PRINCIPLES
Photo by jonasginter

PRINCIPLES

  • Harden network / connections
  • Secure OS
  • Deploy carefully
  • Sound operation practices
Photo by psd

Phases

  • Architecture
  • Design
  • Implementation
  • Operation
  • Testing
  • Maintenance
  • Evaluation
Photo by SivamDesign

Untitled Slide

Resources

Photo by RichGrundy

OECD Privacy Guidelines

  • Collection Limitation Principle
  • Data Quality Principle
  • Purpose Specification Principle
  • Use Limitation Principle
  • Security Safeguards Principle
  • Openness Principle
  • Individual Participation Principle
  • Accountability Principle

Untitled Slide

Untitled Slide

Thank YOU

Pascal Steichen