Privacy and Data Protection by Design - from policy to engineering

  title={Privacy and Data Protection by Design - from policy to engineering},
  author={George Danezis and Josep Domingo-Ferrer and Marit Hansen and Jaap-Henk Hoepman and Daniel Le M{\'e}tayer and Rodica Tirtea and Stefan Schiffner},
Privacy and data protection constitute core values of individuals and of democratic societies. There have been decades of debate on how those values -and legal obligations- can be embedded into systems, preferably from the very beginning of the design process. One important element in this endeavour are technical mechanisms, known as privacy-enhancing technologies (PETs). Their effectiveness has been demonstrated by researchers and in pilot implementations. However, apart from a few exceptions… 

A Model-based Approach to Realize Privacy and Data Protection by Design

This paper presents a comprehensive approach to support different phases of the design process with special attention to the integration of privacy and data protection principles, a generic model-based approach that can be specialized according to the specifics of different application domains.

Right engineering? The redesign of privacy and personal data protection

This article studies the techno-epistemic network emerging around this idea historically and empirically, and identifies tensions and limits within these design-based approaches, which can offer opportunities for learning lessons to increase the quality of privacy articulations.

Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering

The article presents the empirical findings of a broad consultation with people involved in the making of this network, including policy makers, regulators, entrepreneurs, ICT developers, civil rights associations, and legal practitioners, and outlines how DPbD is subject to differing, sometimes also conflicting or contradictory, expectations and requirements.

Privacy by Design: From Research and Policy to Practice - the Challenge of Multi-disciplinarity

The concept of Privacy by Design (PbD) is a vision for creating data-processing environments in a way that respects privacy and data protection in the design of products and processes from the start.

Privacy by Design Enterprise Architecture Patterns

This proposal aims to use enterprise architecture patterns to integrate regulatory concerns, with special emphasis on the data subject’s rights, to ensure that systems comply with the regulation from the beginning of their definition, in light of Privacy by Design principles.

Rethinking the Proposition of Privacy Engineering

The assumptions that underpin privacy engineering are examined, linking them to shortcomings and open questions, and possible research avenues that may give rise to alternative frameworks are explored.

Privacy by Design to Comply with GDPR: A Review on Third-Party Data Processors

This work conducts the first, rigorous, and systematic literature review of Privacy by Design (PbD), focusing on works that seek implementation of PbD in organizations, located in ecosystems.

Engineering privacy by design: lessons from the design and implementation of an identity wallet platform

The paradigm of Privacy-by-Design (PbD) has become more important nowadays, which has also become a regulatory requirement by the EU General Data Protection Regulation (GDPR), which came into force in May 2018.

Privacy by Design

This project takes a look at this new way of engineering data privacy from the start in a system development life cycle, instead of adding privacy features at the tail end of development, and how it will affect development of technological systems henceforth.



Regulating Privacy by Design

The meaning of privacy by design is clarified and how privacy regulators might develop appropriate incentives to offset the certain economic costs and uncertain privacy benefits of this new approach is suggested.

Designing Privacy-by-Design

The extended definition of Privacy by Design is given and, taking Solove's model for privacy invasions as structuring principle, a tool and method to use that tool to generate trust in systems by citizens is described.

Automated consent through privacy agents: Legal requirements and technical architecture

Engineering Privacy

The paper uses a three-layer model of user privacy concerns to relate them to system operations and examine their effects on user behavior, and develops guidelines for building privacy-friendly systems.

A systematic methodology for privacy impact assessments: a design science approach

It is argued that companies that employ the proposed PIA can achieve ‘privacy-by-design’, which is widely heralded by data protection authorities and ratified by the German Federal Office for Information Security.

Privacy is a process, not a PET: a theory for effective privacy practice

An innovative layered framework - the Privacy Security Trust (PST) Framework - which integrates, in one model, the different activities practitioners must undertake for effective privacy practice, and is presented a proof-of-concept application to an example technology -- electricity smart meters.

Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals

The concept of linkage control as an essence of privacy is introduced and three complementing privacy protection goals – unlinkability, transparency and intervenability – are proposed.

Privacy and contextual integrity: framework and applications

This work formalizes some aspects of contextual integrity in a logical framework for expressing and reasoning about norms of transmission of personal information to capture naturally many notions of privacy found in legislation, including those found in HIPAA, COPPA, and GLBA.

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

This paper presents a comprehensive framework to model privacy threats in software-based systems and provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above.

Making Privacy Impact Assessment More Effective

The DPIA provisions outlined in the new regulation are reviewed, and it is argued that while some organizations may regard a PIA as a hassle, in fact, a Pia offers many benefits, as spotlighted in the article.