The Role of Privacy by Design in Protecting Consumer Privacy

CDT1) What is Privacy by Design?

CDT has submitted comments to the Federal Trade Commission for the second in a series of public roundtable discussions the agency is sponsoring exploring the privacy challenges posed by 21st-century technology and business practices that involve the collection and use of consumer data. CDT views these roundtable sessions as a historic opportunity for the FTC to develop and announce a comprehensive privacy protection policy for the next decade.

As new technologies enable the collection of greater amounts of data online, it is essential that companies consider privacy at each stage of product development. “Privacy by Design,” a concept prominently championed by Ontario’s Information and Privacy Commissioner Anne Cavoukian, presents a set of “foundational principles” to guide innovation in a manner that is consistent with Fair Information Practices (FIPs). Privacy by Design offers a roadmap to integrate privacy considerations into business models, product development cycle, and new technologies. We urge the FTC to encourage the integration of Privacy by Design into corporate practices and innovation.

As described by Cavoukian, “Privacy by Design asserts that the future of privacy cannot be assured solely by compliance with regulatory frameworks; rather, privacy assurance must ideally become an organization’s default mode of operation.” Privacy by Design presents a set of “foundational principles” that can help companies innovate in ways that are consistent with FIPs. These seven principles are:

  • Proactive, not Reactive; Preventative, not Remedial
  • Privacy as the Default
  • Privacy Embedded into Design
  • Full Functionality – Positive-Sum, not Zero-Sum
  • End-to-End Lifecycle Protection
  • Visibility and Transparency
  • Respect for User Privacy

Continue reading.

Related Posts

Good Artists Copy, Great Artists Steal In 2003, after I unveiled a prototype Linux desktop called Project Looking Glass*, Steve called my office to let me know the graphical effects were “s...
On Selling Exceptions to the GNU GPL When I co-signed the letter objecting to Oracle's planned purchase of MySQL 1 (along with the rest of Sun), some free software supporters were surpris...
Help EFF Research Web Browser Tracking What fingerprints does your browser leave behind as you surf the web? Traditionally, people assume they can prevent a website from identifying them...
Privacy Risks from Geographic Information In today's world more geographic information is being collected about us, such as where we live, where the clinic we visited is located, and where we ...
Privacy Isn’t Dead – It’s Not Even Sleeping It’s become something of a predictable phenomenon: an article, op-ed, or blog post will surface with an incendiary quote indicating that privacy is de...
Web 2.0 versus Control 2.0 The fight for free access to information is being played out to an ever greater extent on the Internet. The emerging general trend is that a growing n...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*