The Role of Privacy by Design in Protecting Consumer Privacy

CDT1) What is Privacy by Design?

CDT has submitted comments to the Federal Trade Commission for the second in a series of public roundtable discussions the agency is sponsoring exploring the privacy challenges posed by 21st-century technology and business practices that involve the collection and use of consumer data. CDT views these roundtable sessions as a historic opportunity for the FTC to develop and announce a comprehensive privacy protection policy for the next decade.

As new technologies enable the collection of greater amounts of data online, it is essential that companies consider privacy at each stage of product development. “Privacy by Design,” a concept prominently championed by Ontario’s Information and Privacy Commissioner Anne Cavoukian, presents a set of “foundational principles” to guide innovation in a manner that is consistent with Fair Information Practices (FIPs). Privacy by Design offers a roadmap to integrate privacy considerations into business models, product development cycle, and new technologies. We urge the FTC to encourage the integration of Privacy by Design into corporate practices and innovation.

As described by Cavoukian, “Privacy by Design asserts that the future of privacy cannot be assured solely by compliance with regulatory frameworks; rather, privacy assurance must ideally become an organization’s default mode of operation.” Privacy by Design presents a set of “foundational principles” that can help companies innovate in ways that are consistent with FIPs. These seven principles are:

  • Proactive, not Reactive; Preventative, not Remedial
  • Privacy as the Default
  • Privacy Embedded into Design
  • Full Functionality – Positive-Sum, not Zero-Sum
  • End-to-End Lifecycle Protection
  • Visibility and Transparency
  • Respect for User Privacy

Continue reading.

Related Posts

In Networks We Trust European researchers are proposing a paradigm-shifting solution to trusted computing that offers better security and authentication with none of the d...
Proposed guidelines for open government plans Open Source for America (OSFA) represents more than 1,600 businesses, associations, non-governmental organizations, communities, and academic/research...
Anonymity and the Internet Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we ca...
Why Microsoft Suddenly Wanted to Be More Interoperable Guess why Microsoft suddenly decided it wanted to be more interoperable? It's so it can get customers to quit using Linux and switch to Windows & ...
Software sniffs out criminals by the shape of their nose Forget iris and fingerprint scans -- scanning noses could be a quicker and easier way to verify a person's identity, according to scientists at the Un...
Video, Freedom And Mozilla My LCA talk on Friday was about why open video is critically important to free software, and what Mozilla is doing about (plus a discussion of the rel...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*