SlideShare a Scribd company logo
1 of 11
Download to read offline
Data Privacy
Implementation for
Startups
Privacy-By-Design
Nov 2020
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved
1
Tanya Yankelevich
+972-54-2468156
Tanya@privacyroad.co
Why to implement Privacy?
❖ Global focus:
GDPR, CCPA, LGPD, HIPAA, Israel Privacy law
and more
❖ Non-compliance - risk to business:
↓ Legal - risk of suit
↓ Financial Consequences - fines
↓ Loss of business opportunities
↓ Critical factor for investment
↓ Late ad-hoc rework – multiplied cost
↓ Loss of Market Reputation
11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 2
Common Mistakes in Startups approach
It is relevant only for large companies
it is all or nothing - if not everything, no point to do at all
We’ll worry about it later when we go to market
Information Security = Privacy Protection
We can copy what was done by another company
All regulations the same – one is done, all covered
Covering only part of the data used, e.g. ignoring HR data
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 3
Result
Start-up hits the wall at market entry, closing
deals, investments
Ad-hoc late reworks that disrupt the product,
cause waste of budget and time
What is Personal Data
Any data related to an identified or identifiable person
Examples:
11/20/2020
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 4
Name, ID, address, phone numbers, drivers license
Gender, date of birth, family status
Financial info, tax records
Private life data: photos, videos, geo-tracking, shopping history
Technical identifications: IP address, device type, cookies
Special Categories: health, religion, biometric, genetic, children’s data
🧑‍🤝‍🧑
🧑‍🤝‍🧑
🧑‍🤝‍🧑
🧑‍🤝‍🧑
🧑‍🤝‍🧑
🧑‍🤝‍🧑
Data Ownership models
5Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved
B2C
• Ownership of Data (Controller)
• Full responsibility
• Direct relationship with Data Subjects
B2B2C
• Processing for Controller (Processor responsibility)
• Data use also for own purposes (Processor and
Controller)
• Software vendor, no processing – Solutions should be
based on Privacy by Design
B2B
• Limited use of personal data – users, customers,
partners, vendors, employees
InternalData
Privacy program
Privacy By Design and By Default
11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 6
• Product Strategy & Roadmap
• Architecture, Design
• QA & Validation
• Product Marketing
Product
• Privacy Policy
• Risk Assessments - DPIA, PIA
• Auditing, Reporting, documentation
• Legal: Supplier engagement, customer contracts, etc.
• HR & Finance
Operations
• Security Policy
• IT policies
• IT Vendors, Cloud providers, etc.
IT & Security
It’s a journey -
not a one-time event
Privacy by Design and by Default
Key for Privacy support
GDPR Art. 25
Data protection by design and by default
“the controller shall … implement appropriate technical and
organisational measures … in an effective manner and to integrate the
necessary safeguards into the processing in order to meet the
requirements of this Regulation and protect the rights of data subjects”
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 7
Privacy by Design
Privacy support is imbedded in the Product
functionality and organizational processes
Privacy by Default
Privacy is the default set-up - No special action
required from user to achieve privacy
Privacy Compliance program
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 8
Discovery: Data mapping, Regulations, Risks
Baseline Program Plan & Execution
Awareness, Training; Compliance Documentation
Privacy Governance, Sustaining Compliance
Continual Evolution, DPIAs, Reviews & Audits
Efficient program is critical for Start-ups - No time or budget for trial-and-error
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 9
PrivacyRoad Services
Benefits of Compliance:
√ Competitive business
advantage
√ Removing obstacle for
business and investments
√ Minimization of potential
Data breach damages
and costs
√ Better utilization of data
Discovery:
Map & Analyze
Design &
Planning
Privacy
Program
support
Compliance
Documentation
Awareness &
Training
Follow-up
consulting &
support
Guiding Start-ups and Software companies on Privacy Compliance and Privacy-by-
Design implementation in practical and efficient way
About me…
❖ 30 years of experience in leadership roles
of Software Product Development and
Delivery – from start-ups to large
enterprises
❖ Data Privacy knowledge & certifications
Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 10
Tanya@privacyroad.co
+972-54-2468156
Linkedin: Tanya Yankelevich
Leveraging the combined experience to
guide Start-ups in Privacy-by-design
implementation though products and
processes
For more information – please contact:
Tanya Yankelevich
Founder, PrivacyRoad
11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved
Some Quotes about Privacy…..
Privacy is the new competitive battleground
“…. By not only meeting the demands of these new regulations but
exceeding them, companies have an opportunity to differentiate
themselves from competitors to grow their bottom line, thanks to new
technologies that put data privacy in the hands of consumers.”
Alex Andrade-Walz, Techcrunch, December 16, 2020
”Without privacy, there was no point in being an individual.” – Jonathan
Franzen
“Data is Old; Humans Are the New Oil”, Joseph Carson, Chief Security
Scientist at Thycotic
11

More Related Content

What's hot

Vulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security ControlsVulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security ControlsTripwire
 
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]TrustArc
 
Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?PECB
 
Data1 qbit investor presentation v1.3
Data1 qbit investor presentation v1.3Data1 qbit investor presentation v1.3
Data1 qbit investor presentation v1.3d1qb
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Sagara Gunathunga
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...TrustArc
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artJames Mulhern
 
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...TrustArc
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension Inc.
 
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...PECB
 
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]TrustArc
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]TrustArc
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]TrustArc
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
 
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]TrustArc
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3IANS
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
GDPR - no beginning no end
GDPR - no beginning no endGDPR - no beginning no end
GDPR - no beginning no endExove
 

What's hot (20)

Vulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security ControlsVulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security Controls
 
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
 
Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?
 
Data1 qbit investor presentation v1.3
Data1 qbit investor presentation v1.3Data1 qbit investor presentation v1.3
Data1 qbit investor presentation v1.3
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity Strategy
 
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
 
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
GDPR - no beginning no end
GDPR - no beginning no endGDPR - no beginning no end
GDPR - no beginning no end
 

Similar to Privacy-by-design for Startups - why, what and how

Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptxData Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptxFinTech Belgium
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceEquiGov Institute
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...Infinity Legal Solutions
 
What is a data protection impact assessment?
What is a data protection impact assessment?What is a data protection impact assessment?
What is a data protection impact assessment?Infinity Legal Solutions
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Cybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataRocket Matter, LLC
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementEryk Budi Pratama
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekomChristina Azzam
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsEnterprise Management Associates
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challengeFERMA
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxHillaryObomighie
 

Similar to Privacy-by-design for Startups - why, what and how (20)

Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptxData Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure compliance
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...
 
What is a data protection impact assessment?
What is a data protection impact assessment?What is a data protection impact assessment?
What is a data protection impact assessment?
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Cybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm Data
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
 

Recently uploaded

Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...Abortion Clinic
 
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024SimonedeGijt
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...naitiksharma1124
 
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptxFrom Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptxNeo4j
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Eraconfluent
 
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Andreas Granig
 
Software Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements EngineeringSoftware Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements EngineeringPrakhyath Rai
 
Transformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksTransformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksJinanKordab
 
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...Lisi Hocke
 
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with GraphGraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with GraphNeo4j
 
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypseTomasz Kowalczewski
 
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...Neo4j
 
The Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationThe Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationElement34
 
UNI DI NAPOLI FEDERICO II - Il ruolo dei grafi nell'AI Conversazionale Ibrida
UNI DI NAPOLI FEDERICO II - Il ruolo dei grafi nell'AI Conversazionale IbridaUNI DI NAPOLI FEDERICO II - Il ruolo dei grafi nell'AI Conversazionale Ibrida
UNI DI NAPOLI FEDERICO II - Il ruolo dei grafi nell'AI Conversazionale IbridaNeo4j
 
Weeding your micro service landscape.pdf
Weeding your micro service landscape.pdfWeeding your micro service landscape.pdf
Weeding your micro service landscape.pdftimtebeek1
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAShane Coughlan
 

Recently uploaded (20)

Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
 
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
 
Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...
Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...
Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...
 
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptxFrom Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Era
 
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
 
Software Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements EngineeringSoftware Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements Engineering
 
Transformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksTransformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with Links
 
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
 
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
 
Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...
Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...
Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...
 
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with GraphGraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
 
Abortion Pill Prices Turfloop ](+27832195400*)[ 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Turfloop ](+27832195400*)[ 🏥 Women's Abortion Clinic in ...Abortion Pill Prices Turfloop ](+27832195400*)[ 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Turfloop ](+27832195400*)[ 🏥 Women's Abortion Clinic in ...
 
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
 
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
 
The Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationThe Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test Automation
 
UNI DI NAPOLI FEDERICO II - Il ruolo dei grafi nell'AI Conversazionale Ibrida
UNI DI NAPOLI FEDERICO II - Il ruolo dei grafi nell'AI Conversazionale IbridaUNI DI NAPOLI FEDERICO II - Il ruolo dei grafi nell'AI Conversazionale Ibrida
UNI DI NAPOLI FEDERICO II - Il ruolo dei grafi nell'AI Conversazionale Ibrida
 
Weeding your micro service landscape.pdf
Weeding your micro service landscape.pdfWeeding your micro service landscape.pdf
Weeding your micro service landscape.pdf
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
 

Privacy-by-design for Startups - why, what and how

  • 1. Data Privacy Implementation for Startups Privacy-By-Design Nov 2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 1 Tanya Yankelevich +972-54-2468156 Tanya@privacyroad.co
  • 2. Why to implement Privacy? ❖ Global focus: GDPR, CCPA, LGPD, HIPAA, Israel Privacy law and more ❖ Non-compliance - risk to business: ↓ Legal - risk of suit ↓ Financial Consequences - fines ↓ Loss of business opportunities ↓ Critical factor for investment ↓ Late ad-hoc rework – multiplied cost ↓ Loss of Market Reputation 11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 2
  • 3. Common Mistakes in Startups approach It is relevant only for large companies it is all or nothing - if not everything, no point to do at all We’ll worry about it later when we go to market Information Security = Privacy Protection We can copy what was done by another company All regulations the same – one is done, all covered Covering only part of the data used, e.g. ignoring HR data Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 3 Result Start-up hits the wall at market entry, closing deals, investments Ad-hoc late reworks that disrupt the product, cause waste of budget and time
  • 4. What is Personal Data Any data related to an identified or identifiable person Examples: 11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 4 Name, ID, address, phone numbers, drivers license Gender, date of birth, family status Financial info, tax records Private life data: photos, videos, geo-tracking, shopping history Technical identifications: IP address, device type, cookies Special Categories: health, religion, biometric, genetic, children’s data 🧑‍🤝‍🧑 🧑‍🤝‍🧑 🧑‍🤝‍🧑 🧑‍🤝‍🧑 🧑‍🤝‍🧑 🧑‍🤝‍🧑
  • 5. Data Ownership models 5Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved B2C • Ownership of Data (Controller) • Full responsibility • Direct relationship with Data Subjects B2B2C • Processing for Controller (Processor responsibility) • Data use also for own purposes (Processor and Controller) • Software vendor, no processing – Solutions should be based on Privacy by Design B2B • Limited use of personal data – users, customers, partners, vendors, employees InternalData
  • 6. Privacy program Privacy By Design and By Default 11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 6 • Product Strategy & Roadmap • Architecture, Design • QA & Validation • Product Marketing Product • Privacy Policy • Risk Assessments - DPIA, PIA • Auditing, Reporting, documentation • Legal: Supplier engagement, customer contracts, etc. • HR & Finance Operations • Security Policy • IT policies • IT Vendors, Cloud providers, etc. IT & Security It’s a journey - not a one-time event
  • 7. Privacy by Design and by Default Key for Privacy support GDPR Art. 25 Data protection by design and by default “the controller shall … implement appropriate technical and organisational measures … in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects” Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 7 Privacy by Design Privacy support is imbedded in the Product functionality and organizational processes Privacy by Default Privacy is the default set-up - No special action required from user to achieve privacy
  • 8. Privacy Compliance program Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 8 Discovery: Data mapping, Regulations, Risks Baseline Program Plan & Execution Awareness, Training; Compliance Documentation Privacy Governance, Sustaining Compliance Continual Evolution, DPIAs, Reviews & Audits Efficient program is critical for Start-ups - No time or budget for trial-and-error
  • 9. Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 9 PrivacyRoad Services Benefits of Compliance: √ Competitive business advantage √ Removing obstacle for business and investments √ Minimization of potential Data breach damages and costs √ Better utilization of data Discovery: Map & Analyze Design & Planning Privacy Program support Compliance Documentation Awareness & Training Follow-up consulting & support Guiding Start-ups and Software companies on Privacy Compliance and Privacy-by- Design implementation in practical and efficient way
  • 10. About me… ❖ 30 years of experience in leadership roles of Software Product Development and Delivery – from start-ups to large enterprises ❖ Data Privacy knowledge & certifications Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved 10 Tanya@privacyroad.co +972-54-2468156 Linkedin: Tanya Yankelevich Leveraging the combined experience to guide Start-ups in Privacy-by-design implementation though products and processes For more information – please contact: Tanya Yankelevich Founder, PrivacyRoad
  • 11. 11/20/2020 Presentation created by Tanya Yankelevich, PrivacyRoad. All Rights Reserved Some Quotes about Privacy….. Privacy is the new competitive battleground “…. By not only meeting the demands of these new regulations but exceeding them, companies have an opportunity to differentiate themselves from competitors to grow their bottom line, thanks to new technologies that put data privacy in the hands of consumers.” Alex Andrade-Walz, Techcrunch, December 16, 2020 ”Without privacy, there was no point in being an individual.” – Jonathan Franzen “Data is Old; Humans Are the New Oil”, Joseph Carson, Chief Security Scientist at Thycotic 11