PLS 7 Flashcards
Privacy by Design (PbD)
Privacy by design houdt in dat u als organisatie al tijdens de ontwikkeling van producten en diensten (zoals informatiesystemen) ten eerste aandacht besteedt aan privacyverhogende maatregelen, ook wel privacy enhancing technologies (PET) genoemd.
Privacy By Design Principles
- Minimize Data Acquisition, minimize number of data sources, minimize raw data intake
- Minimize knowledge discovery
- Minimize data storage
- Minimize data retention period
5.routing - Data anonymization
- Encrypted data communication, data processing and data storage
8.Reduce data granularity - Query answering, Repeated query blocking
- Distributed data processing, Distributed data storage
- Knowledge discovery based aggregation, Geography based aggregation, Chain aggregation,
Category based aggregation - Information Disclosure
- Control, Logging
Privacy By Design Life Cycle
Privacy By Design Life Cycle
Consent and Data Acquisition [CDA]
Data Preprocessing [DPP]
Data Processing and Analysis [DPA]
Data Storage [DS]
Data Dissemination [DD]
Two major privacy threats
1.Secondary usage (⊗) Secondary usage can lead to privacy violations
2.Unauthorized access (⊖)Unauthorized access is when someone gains access to data without proper authorization during any phase of the data life cycle
Privacy By Design Principles Explained
- Minimize data acquisition
- minimizing data types
- minimum duration
- minimum frequency - Minimize number of data sources
- Any piece of data that is not required to perform a certain task should be deleted. - Minimize raw data intake
- IoT applications should reduce the amount of raw data acquired by the system. Raw data could lead to secondary usage and privacy violation. - Minimize knowledge discovery
- minimize the amount of knowledge discovered within an IoT application. IoT applications should only discover the knowledge necessary to achieve their primary objectives. - Hidden data routing at IoT applications should support and employ anonymous routing mechanisms (e.g., Tor).
- Data anonymization move personally identifiable information before the data gets used by the IoT application so that the people described by the data remain anonymous.
- Encrypted data communication different components in an IoT application should consider encrypted data communication wherever possible
- Encrypted data processing process data while encrypted.
Encrypted data storageapplications should store data in encrypted form process data while encrypted. - Repeated query blocking When answering queries, IoT applications need to make sure that they block any malicious attempts to discover knowledge that violates user privacy through repeated queries
- Distributed data processing process data in a distributed manner.
- Distributed data storage storing data in a distributed manner
- Knowledge discovery based aggregation Discover knowledge though aggregation and re- place raw data with discovered new knowledge.
- Geography based aggregation Aggregate data using geographical boundaries
14.Chain aggregation Perform aggregation on-the-go while moving data from one node to another. - Category based aggregation Categorisation based aggregation approaches can be used to reduce the granularity of the raw data
- Information Disclosure Data subjects should be adequately informed whenever data they own is acquired, processed, and disseminated.
- Control Providing privacy control mechanisms for data subjects
- Logging Log events during all phases
It allows both internal and external parties to examine what has happened in the past to make sure a given system has performed as promised.