Privacy by Design: More Than a Catchy Phrase – IAPP Birmingham KnowledgeNet
“Privacy by design” has been part of the privacy practitioners’ vernacular for well over a decade, but for many the phrase remains vague...
“Privacy by design” has been part of the privacy practitioners’ vernacular for well over a decade, but for many the phrase remains vague...
Insurance companies don't use traffic light analogies for setting insurance rates and neither should you. In this talk, the author of Strategic Privacy by Design will discuss the importance of quantification, the pitfalls of qualitative assessments, the growing regulatory demand for risk assessments and highlight the different focuses of privacy versus security risks.
Struggling with getting started with privacy by design or taking privacy by design to the next level? If so join this lunchtime discussion with Jason Cronk, author of the IAPP's CIPT textbook "Strategic Privacy By Design". Learn key strategies for advising on and implementing privacy by design.
“Privacy by design” has been part of the privacy practitioners’ vernacular for well over a decade, but for many the phrase remains vague. In this talk, the author of the IAPP CIPT textbook, Strategic Privacy by Design, will walk through the development of a hypothetical smart thermostat following the recently released Design Process Standard from the Institute of Operational Privacy Design. For many participants this will open up a new avenue of thinking about privacy beyond the laws, principles and programmatic elements they are most familiar with and provide a level of concreteness to the concept beyond the broad to “build privacy in.”
“Privacy by design” has been part of the privacy practitioners’ vernacular for well over a decade, but for many the phrase remains vague. In this talk, the author of the IAPP CIPT textbook, Strategic Privacy by Design, will walk through the development of a hypothetical smart thermostat following the recently released Design Process Standard from the Institute of Operational Privacy Design. For many participants this will open up a new avenue of thinking about privacy beyond the laws, principles and programmatic elements they are most familiar with and provide a level of concreteness to the concept beyond the broad to “build privacy in.”
“Privacy by design” has been part of the privacy practitioners’ vernacular for well over a decade, but for many the phrase remains vague. In this talk, the author of the IAPP CIPT textbook, Strategic Privacy by Design, will walk through the development of a hypothetical smart thermostat following the recently released Design Process Standard from the Institute of Operational Privacy Design. For many participants this will open up a new avenue of thinking about privacy beyond the laws, principles and programmatic elements they are most familiar with and provide a level of concreteness to the concept beyond the broad to “build privacy in.”
📢 R Jason Cronk is keynoting at PEP23! Join us at this year's Workshop on Privacy Engineering in Practice (PEP '23): Beyond Checkbox Compliance for discussion on solving current privacy engineering challenges.
Sunday, August 6th, 2023 | 2:30-6PM | In-person attendance The Workshop on Privacy Threat Modeling brings together researchers, practitioners, government representatives, and industry specialists to collaborate on the topic of privacy threats. While aspects of privacy risk modeling are relatively well-developed, such as constructions of privacy harms (Solove’s Taxonomy of Privacy and Calo’s subjective/objective privacy […]
Confirmation bias is a cognitive bias whereby people consume information in a way that reinforces their previously held beliefs. Many users and implementers of the NIST Privacy Framework do just that, diverting their attention away from many of the important and central concepts in the framework.