Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

GDPR: Privacy by Design
You are here: Home \ Compliance \ GDPR: Privacy by Design
GDPR Privacy by Design
Posted on Tuesday, June 5th, 2018 by

GDPR: What is Privacy by Design?

Privacy by Design is a concept which can be found at article 25 GDPR and was created in the 1990s by Dr. Ann Cavoukian, former Information and Privacy Commissioner for the Province of Ontario, Canada.

The concept is known to refer to 7 foundational principles:

  1. Be proactive, not reactive
  2. Privacy as the default setting
  3. Privacy embedded into design
  4. Full functionality: positive sum, not zero-sum
  5. End to end security
  6. Visibility and transparency
  7. Respect for user privacy; keeping it user-centric

Related article: GDPR FAQ

Disclaimer: This blog article was written by our compliance experts for general information and does not claim to provide legal advice. To understand the full context of your organization, please consult with a privacy compliance and/or legal professional.

 

The GDPR imposes Privacy by Design and privacy as the default setting to all controllers.

This does not translate in a to do list for the controller. Instead, the controller is expected to implement “appropriate” technical and organizational measures that are designed to implement data protection principles in an effective manner and to ensure that, by default, only personal data is processed that is necessary for each specific purpose of the processing . This, of course, applies to the amount of personal data collected, the extent of the processing, the period of the storage and accessibility.

 

How are controllers supposed to determine what is appropriate?

The GDPR does not give a clear answer. It states that the decision must depend on the state of the art, the cost of implementation, the nature, scope, context and purposes of processing, all of which must be balanced against the risks of varying likelihood and severity for rights and freedoms of natural persons posed by processing. This risk analysis must occur at two moments: (1) at the time of determining the means of processing, and (2) at the time of processing.

 

Software Design and Privacy

In the case of software design, for instance, this translates into 5 phases:

  1. Planning
  2. Encoding
  3. Testing
  4. Deployment
  5. Management

During the planning phase, developers are expected to plan for organizational and security measures that will allow the software to present an acceptable risk level for the rights and freedoms of data subjects.

Then, in the testing phase, developers are expected to conduct technical testing such as vulnerability assessment and penetration testing to ensure that the initially agreed upon measures continue to be sufficient and that there is no change.

Even after deployment, at the management phase, software must be audited and tested to guarantee that the risk level has not changed, for example by new vectors of attacks that may emerge as technology evolves.

It’s not enough to say “my software is compliant” and then sit back and relax. You will have to do a compliance audit every year – sometimes more often depending on whether it is high-risk processing or not. You will have to continue testing, auditing and ensuring that the risk level has not changed because the threat landscape will evolve.

In any case, you should be able to do web application testing or software testing with a GDPR flavor.

Privacy by Design is just one of the many aspect of GDPR that requires compliance officers to conduct a risk assessment prior to taking decisions on privacy.

 

Situations where entities are required to make contextual decisions based on the GDPR risk model

The whole GDPR takes a risk-based approach. All parts of GDPR compliance also require considering the risk to the rights and freedom to individuals, so you should start by mitigating the risk for projects which you consider to be of highest risk. GDPR refers to appropriate technical and organizational measures, but what is appropriate will largely depend on the size of the organization, the type of data that is processed and the purpose of data processing.

For example, a manufacturing company has mainly HR-based apps and some data of visitors who are physically accessing its premises. This, of course, has a different risk level than a medical services company that is mainly dealing with patient data.

The manufacturer will likely focus on the compliance processing of their HR data, and make sure that employees can verify their data, maybe consult with unions and employee representation. The medical services company, in turn, will need to focus on their patients because the data is much riskier.

 

GDPR is a risk model

If we were to work with a client one day who wakes up the next morning and says “prior to doing this, let me see what would be the risk to data privacy”, we would have accomplished a huge change in mindset by thinking about data privacy at the beginning rather than at the end of the process. It’s certainly a mindset to integrate privacy as a component of everything you’re doing.

Once you start doing this, it’s all about documenting. You will find yourself able to meet other requirements quite easily.

In the context of GDPR, an unacceptable risk is one that results in a threat to or loss of rights and freedoms for the individuals, which cannot be mitigated through the implementation of effective controls and/or that is unreasonable in relation to the intended benefits.

 

New call-to-action

Vanessa Henri
About author:
Vanessa is an academic and legal expert on data protection laws, as well as a certified data protection officer. Currently, Vanessa is Hitachi Systems Security’s Director of Legal and Compliance as well as Data Protection Officer. She oversees the performance of privacy advisory services by Hitachi Systems Security to its clientele, including services such as GDPR Posture Assessments. She advises boards of directors at the macro-strategic level on the implementation of privacy obligations through efficient reporting systems. She has published a variety of data privacy-related materials and has contributed as a speaker to various conferences about data protection laws, such as Code Blue, in Tokyo. Vanessa is a member of the Quebec Bar Association, and holds a master’s in laws from McGill University. She also teaches corporate cybersecurity practices at St Thomas University, in Miami, Florida. She is a certified Data Protection Officer.

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now