SlideShare a Scribd company logo
1 of 26
How to Build “Privacy by Design” into Web and Mobile


                                            #privacy360 | @tariktech


#privacy360   |   @tariktech
Privacy by Design




              To build privacy and data protection up front, into the design
              specifications and architecture of information and communication
              systems, technologies and business practices.




#privacy360   |   @tariktech
NOT (Privacy by Design)




#privacy360   |   @tariktech
Why Should You Care?



                                Want to do the right thing

                                Competitive differentiation

                                Anticipate regulation

                                Users will be users




#privacy360   |   @tariktech
Big Data Platform + “Privacy by Design”




                               Small Data Is Better
#privacy360   |   @tariktech
Key Privacy Principles



                                     Transparency

                                     Data portability

                                     Right to be forgotten

                                     Anonymity

                                     Control




#privacy360   |   @tariktech
It Starts with Company Culture



                          Everyone is a Chief Privacy/Security Officer

                          Train key staff

                          Think of your customers as Owners – not users

                          Background checks where appropriate




#privacy360   |   @tariktech
Legal / Policy



                                User-centric legal model – not CYA

                                Owner Data Agreement

                                Always opt-in

                                Mind towards regulation to come




#privacy360   |   @tariktech
Business Partners and Vendors

                         Do not give any 3rd parties access to customer

                         Require HTTPS for login, data exchange and APIs

                         Do not give any 3rd parties access to customer

                         Do not sell customer data

                         Do not co-mingle data between clients

                         Do not provide analytics except as a service to you

                         Do not have any privacy/security incidents

                         Do background checks on employees


#privacy360   |   @tariktech
Marketing



                                Responsible performance tracking

                                Try Open Source

                                Avoid free stuff with strings attached

                                Minimize Owner exposure to 3rd

                                 parties




#privacy360   |   @tariktech
Platform Architecture Considerations
              ‣ Hosting Provider           ‣ Mobile Applications

              ‣ Hardware / Cloud           ‣ APIs

              ‣ Networking                 ‣ Message Queues

              ‣ Security                   ‣ Notifications / Alerts

              ‣ CDNs                       ‣ Search Servers

              ‣ Web Servers                ‣ Logs

              ‣ Reverse Proxies            ‣ Analytics / Reports

              ‣ Caching                    ‣ Exports (Download my data)

              ‣ Database(s)                ‣ Admin accounts (superpowers?)

              ‣ Backups                    ‣ Password Management

              ‣ Languages / Framework(s)   ‣ Session Management


#privacy360    |   @tariktech
Simplified Platform Architecture
                                               Browser                Mobile App


                                                                            HTTPS Encryption




                                  Alerts                  Firewalls



                                  Search        Load Balancers / Proxies



                                  Queue                  Web Servers



                               Cache Servers             App Servers



                                 Backups           Database Servers


#privacy360   |   @tariktech
Potential Data Traps!
                Cache + History + Bookmarks
                                                                                                   Offline
                                                   Browser                Mobile App                Data
                    3rd Party Social Plugins
                      Widgets / Analytics

                                                                                HTTPS Encryption



              Email                                                                                Log
              SMS                      Alerts                 Firewalls



              Index                   Search        Load Balancers / Proxies                       Log




         Messages                     Queue                  Web Servers                           Log




          Server
                                   Cache Servers             App Servers                           Log
          Cache




                                     Backups           Database Servers


#privacy360     |     @tariktech
Don’t Take Candy From Strangers




                          https://www.youtube.com/watch?v=Ouof1OzhL8k




#privacy360   |   @tariktech
…Or At Least Cut The Strings


       <iframe
       src="//www.facebook.com/plugins/like.php?href=http%3A%2F%2Fblog.
       personal.com&amp;send=false&amp;layout=standard&amp;width=450      Phones Home on Load
       &amp;show_faces=false&amp;action=like&amp;colorscheme=light&am
       p;font&amp;height=35" scrolling="no" frameborder="0"
       style="border:none; overflow:hidden; width:450px; height:35px;"
       allowTransparency="true">
       </iframe>




                                  <a
                                  href="https://www.facebook.com/sharer.php?u=http%3A%2F%2F
     No Strings Attached
                                  blog.personal.com">
                                  <img src="/pathtoimage/facebook.gif">
                                  </a>




#privacy360   |   @tariktech
Data-driven Platform

                                   Browser                Mobile App


                                                                HTTPS Encryption




                                              Firewalls



                                    Load Balancers / Proxies
                    Email
                    SMS

                                             Web Servers



                   Alerts                    App Servers                           Log




#privacy360   |   @tariktech
Supporting True Portability and Deletion

              A InstanceNameAlreadyExistsException occurred in info#create:


               * URL     : https://www.personal.com/owner/info
               * IP address: 127.0.0.1
               * Parameters: {"authenticity_token"=>"43w3oYPUAOU4eFhUdCHV1obgIaeSIO1Yk68ajcR1TOE=",
              "template_id"=>"0040", "card_nickname”"[FILTERED]", "card_type”"[FILTERED]",
              "card_type_otherP3”"[FILTERED]", "card_network”"[FILTERED]", "credit_name_on_card”,
              "credit_card_number”"[FILTERED]", "expiration_date”"[FILTERED]", "security_code”,
              "credit_website_address”"[FILTERED]", "card_contact_number”"[FILTERED]",
              "credit_card_auto_pay”"[FILTERED]",
              "credit_card_account_debited_during_auto_pay”"[FILTERED]", "credit_notes”"[FILTERED]",
              "password”"[FILTERED]", "owner_id"=>"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"}


              • data: {:session_id=>"c3c5c361c1e89…[omitted]", :_csrf_token=>"43w3oYPUAOU4…[omitted]",
                :expires_at=>Mon Jan 02 14:46:56 -0500 2012}




#privacy360     |   @tariktech
What About Mobile?



                                Secure API (HTTPS only)

                                Don’t take data without the Owner’s consent

                                Understand offline data storage/encryption options

                                Understand platform leakage potential




#privacy360   |   @tariktech
Mobile Pitfalls




#privacy360   |   @tariktech
Mobile Pitfalls




#privacy360   |   @tariktech
Mobile Pitfalls




#privacy360   |   @tariktech
Mobile Pitfalls
                                                 Image Cache




#privacy360   |   @tariktech
Mobile Pitfalls




#privacy360   |   @tariktech
Mobile Pitfalls




#privacy360   |   @tariktech
Mobile Pitfalls
                                                 Image Cache




#privacy360   |   @tariktech
Thank You.
                               Please send questions or comments to @TarikTech




#privacy360   |   @tariktech

More Related Content

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

How to Build Privacy By Design into Web and Mobile

  • 1. How to Build “Privacy by Design” into Web and Mobile #privacy360 | @tariktech #privacy360 | @tariktech
  • 2. Privacy by Design To build privacy and data protection up front, into the design specifications and architecture of information and communication systems, technologies and business practices. #privacy360 | @tariktech
  • 3. NOT (Privacy by Design) #privacy360 | @tariktech
  • 4. Why Should You Care?  Want to do the right thing  Competitive differentiation  Anticipate regulation  Users will be users #privacy360 | @tariktech
  • 5. Big Data Platform + “Privacy by Design” Small Data Is Better #privacy360 | @tariktech
  • 6. Key Privacy Principles  Transparency  Data portability  Right to be forgotten  Anonymity  Control #privacy360 | @tariktech
  • 7. It Starts with Company Culture  Everyone is a Chief Privacy/Security Officer  Train key staff  Think of your customers as Owners – not users  Background checks where appropriate #privacy360 | @tariktech
  • 8. Legal / Policy  User-centric legal model – not CYA  Owner Data Agreement  Always opt-in  Mind towards regulation to come #privacy360 | @tariktech
  • 9. Business Partners and Vendors  Do not give any 3rd parties access to customer  Require HTTPS for login, data exchange and APIs  Do not give any 3rd parties access to customer  Do not sell customer data  Do not co-mingle data between clients  Do not provide analytics except as a service to you  Do not have any privacy/security incidents  Do background checks on employees #privacy360 | @tariktech
  • 10. Marketing  Responsible performance tracking  Try Open Source  Avoid free stuff with strings attached  Minimize Owner exposure to 3rd parties #privacy360 | @tariktech
  • 11. Platform Architecture Considerations ‣ Hosting Provider ‣ Mobile Applications ‣ Hardware / Cloud ‣ APIs ‣ Networking ‣ Message Queues ‣ Security ‣ Notifications / Alerts ‣ CDNs ‣ Search Servers ‣ Web Servers ‣ Logs ‣ Reverse Proxies ‣ Analytics / Reports ‣ Caching ‣ Exports (Download my data) ‣ Database(s) ‣ Admin accounts (superpowers?) ‣ Backups ‣ Password Management ‣ Languages / Framework(s) ‣ Session Management #privacy360 | @tariktech
  • 12. Simplified Platform Architecture Browser Mobile App HTTPS Encryption Alerts Firewalls Search Load Balancers / Proxies Queue Web Servers Cache Servers App Servers Backups Database Servers #privacy360 | @tariktech
  • 13. Potential Data Traps! Cache + History + Bookmarks Offline Browser Mobile App Data 3rd Party Social Plugins Widgets / Analytics HTTPS Encryption Email Log SMS Alerts Firewalls Index Search Load Balancers / Proxies Log Messages Queue Web Servers Log Server Cache Servers App Servers Log Cache Backups Database Servers #privacy360 | @tariktech
  • 14. Don’t Take Candy From Strangers https://www.youtube.com/watch?v=Ouof1OzhL8k #privacy360 | @tariktech
  • 15. …Or At Least Cut The Strings <iframe src="//www.facebook.com/plugins/like.php?href=http%3A%2F%2Fblog. personal.com&amp;send=false&amp;layout=standard&amp;width=450 Phones Home on Load &amp;show_faces=false&amp;action=like&amp;colorscheme=light&am p;font&amp;height=35" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:450px; height:35px;" allowTransparency="true"> </iframe> <a href="https://www.facebook.com/sharer.php?u=http%3A%2F%2F No Strings Attached blog.personal.com"> <img src="/pathtoimage/facebook.gif"> </a> #privacy360 | @tariktech
  • 16. Data-driven Platform Browser Mobile App HTTPS Encryption Firewalls Load Balancers / Proxies Email SMS Web Servers Alerts App Servers Log #privacy360 | @tariktech
  • 17. Supporting True Portability and Deletion A InstanceNameAlreadyExistsException occurred in info#create: * URL : https://www.personal.com/owner/info * IP address: 127.0.0.1 * Parameters: {"authenticity_token"=>"43w3oYPUAOU4eFhUdCHV1obgIaeSIO1Yk68ajcR1TOE=", "template_id"=>"0040", "card_nickname”"[FILTERED]", "card_type”"[FILTERED]", "card_type_otherP3”"[FILTERED]", "card_network”"[FILTERED]", "credit_name_on_card”, "credit_card_number”"[FILTERED]", "expiration_date”"[FILTERED]", "security_code”, "credit_website_address”"[FILTERED]", "card_contact_number”"[FILTERED]", "credit_card_auto_pay”"[FILTERED]", "credit_card_account_debited_during_auto_pay”"[FILTERED]", "credit_notes”"[FILTERED]", "password”"[FILTERED]", "owner_id"=>"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"} • data: {:session_id=>"c3c5c361c1e89…[omitted]", :_csrf_token=>"43w3oYPUAOU4…[omitted]", :expires_at=>Mon Jan 02 14:46:56 -0500 2012} #privacy360 | @tariktech
  • 18. What About Mobile?  Secure API (HTTPS only)  Don’t take data without the Owner’s consent  Understand offline data storage/encryption options  Understand platform leakage potential #privacy360 | @tariktech
  • 22. Mobile Pitfalls Image Cache #privacy360 | @tariktech
  • 25. Mobile Pitfalls Image Cache #privacy360 | @tariktech
  • 26. Thank You. Please send questions or comments to @TarikTech #privacy360 | @tariktech