SlideShare a Scribd company logo
1 of 48
Download to read offline
Designing for compliance:
why you should care 
Esteban Pérez-Hemminger | Senior Design Lead | IBM Security Design
Agreements are the new login screen
Design for compliance from Day 1
Show usefulness & value
Show why the user should care about data privacy
Nurture long-term partnerships
Ensure biz and user have a two-way engagement
Takeaways
the outline
B A C K S T O R Y
My journey
PR NYC ATX
B A C K S T O R Y
1982 2010 2015
U n d e r g r a d d e g r e e s
F r e e l a n c e w o r k
M u s i c c a r e e r
G r a d s c h o o l
T e a c h i n g a s s i s t a n t
D e s i g n s t u d i o s
P r o d u c t d e s i g n
E n t e r p r i s e s c a l e
C l o u d + s e c u r i t y
B A C K S T O R Y
During the last 4 years at IBM, I’ve led ~5 projects, and it all began in
the Hybrid Cloud organization. Here are some of the Cloud projects.
Security design
a whole new world
Senior Design Lead • project scope, process, team direction & delivery
S I N C E F A L L ‘ 1 8
You don’t have to
be a designer in a
security team to
design with
security in mind.
S E C U R I T Y - D
I had no previous
experience in
security.
S E C U R I T Y - D
Now in Security, I’m involved in two projects: Identity Management and
Data Protection, the latter is where compliance comes in.
S E C U R I T Y - D
Not fancy
Key experiences are secondary to main user tasks
Meta
Comply to help others comply
Awareness gap
Data privacy relates to all designers
Learning curve
what’s unique
S E C U R I T Y - D
Security jargon
for designers
Data
privacy
How that personal
info is collected, used,
shared by companies
Personal
Information (PI)
Info that can be used
to identify, contact or
locate an individual
Compliance
Following the
obligations/rules
specified by a
regulation body
(e.g. GDPR, CCPA, PCI)
S E C U R I T Y - D
The change
why regulations changed us
I didn’t study the law. I work in IT.
I just need to know what to protect and,
more importantly, how. The legislation [GDPR]
doesn’t give a clear path on how a business
is supposed to be compliant.
— J.T., IT Admin
“
T H E C H A N G E
Panic
Are we in trouble?
Confusion
Will it a!ect my biz?
Overwhelmed
Where do I begin the process?
Pain points
what we heard
T H E C H A N G E
Consumers won’t buy
from companies they
don’t trust
75%
Proof of compliance
will be seen by the
public as a positive
di!erentiator
81 %
The stats
the biz perspective
Retailers are ready
for CCPA’s deadline
46%
https://chargebacks911.com/california-consumer-privacy-act/
https://info.trustarc.com/Web-Resource-2019-03-18-CCPA-GDPRComplianceReport_LP.html
https://elitesem.com/blog/ccpa-need-to-know/
T H E C H A N G E
Proof of compliance
will be seen by the
public as a positive
di!erentiator
81 %
The stats
the biz perspective
https://chargebacks911.com/california-consumer-privacy-act/
https://info.trustarc.com/Web-Resource-2019-03-18-CCPA-GDPRComplianceReport_LP.html
https://elitesem.com/blog/ccpa-need-to-know/
T H E C H A N G E
Consumers won’t buy
from companies they
don’t trust
75%
Retailers are ready
for CCPA’s deadline
46%
Here’s where
your design e!ort
should focus on
T H E C H A N G E
00
https://www.varonis.com/blog/ccpa-vs-gdpr/#_
CCPA v GDPR
T H E C H A N G E
CX impact
how compliance a!ects our work
General Data Protection
Regulation (GDPR)
Signed on 2016
In e!ect May 25, 2018        
The California Consumer
Privacy Act (CCPA)
Signed in 2018
In e!ect January 1, 2020    
C X I M P A C T
Compliance
GDPR v CCPA
General Data Protection
Regulation (GDPR)
Signed on 2016
In e!ect May 25, 2018        
https://gdpr-info.eu/
https://eugdpr.org/
https://en.wikipedia.org/wiki/General_Data_Protection_Regulation
GDPR
overview
Protects: Right to Access, to
delete, do not sell data
Parental consent for children
Applies to all organizations
(for- and non-profits)
Fines up to 4% of annual
global turnover or €20M
C X I M P A C T
CCPA
the not so little brother
Set up specific communication
channels for data requests
Expands personal data to
include household
No “right to be forgotten”
No option to opt-out outright
The California Consumer
Privacy Act (CCPA)
Signed in 2018
In e!ect January 1, 2020    
https://en.wikipedia.org/wiki/California_Consumer_Privacy_Act
https://www.tripwire.com/state-of-security/security-data-protection/a-practical-guide-to-ccpa-for-u-s-businesses/
https://elitesem.com/blog/ccpa-need-to-know/
C X I M P A C T
The CCPA impact
how biz is a!ected
For-profit businesses
Any business that operates in California
Any company that does biz with consumers in California
Up to $7,500 per infraction
C X I M P A C T
Legal Tech Personal
C X I M P A C T
Legal Tech Personal
C X I M P A C T
User Experience
C X I M P A C T
In these gaps
designers can
become the
translators
C X I M P A C T
Acquire consent
Enable removal
Pass data control
Biz obligations
Transparency
Trust
Ownership
User rights
C X I M P A C T
Compliance UX
design moments
UnsubscribeIf a subscriber wants o! your list, you have 10 days to do it. (Spam Act 2003)
C O M P L I A N C E U X
https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-business
https://en.wikipedia.org/wiki/CAN-SPAM_Act_of_2003
Whose info
What type of info
Where is it stored
Why do you need it
How can I get it
C O M P L I A N C E U X
User lifecylce
milestones
Updates Customization O!boardingOnboarding
D A Y 1 D A Y 1 0 D A Y 3 0 D A Y 3 0 0
C O M P L I A N C E U X
C O M P L I A N C E U X
Day 1
Onboarding Updates Customization O!boarding
No guesswork: don’t
put the onus on users
to be and stay secure
Onboarding Updates Customization O!boarding
C O M P L I A N C E U X
Day 1
More is better: the
highest privacy must
be the default setting
Onboarding Updates Customization O!boarding
Day 10
C O M P L I A N C E U X
Don’t hide: don’t
make finding updates
an easter egg hunt
Onboarding Updates Customization O!boarding
Day 10
C O M P L I A N C E U X
Be proactive: show
impacts to privacy
and guide to update
Day 30
Onboarding Updates Customization O!boarding
C O M P L I A N C E U X
Don’t be an obstacle:
remove hurdles that
impede any editing
Day 30
Onboarding Updates Customization O!boarding
C O M P L I A N C E U X
Minds change: let
users change their
preferences anytime
Day 300
Onboarding Updates Customization O!boarding
C O M P L I A N C E U X
Don’t be a bad ex:
don’t hold people
hostage to the app
Day 300
Onboarding Updates Customization O!boarding
C O M P L I A N C E U X
Hand o! control:
make retrieval and
opt-out painless
Recap
practices and takeaways
Agreements are the new login screen
Design for compliance from Day 1
Show usefulness & value
Show why the user should care about data privacy
Nurture long-term partnerships
Ensure biz and user have a two-way engagement
Takeaways
one more time
R E C A P
01
Agreements are the new login screen
(Max) Privacy must be the default
Acknowledge the user’s apprehension
Identify privacy moments across flows
R E C A P
02
Show usefulness & value
Present content in a consumable way
Show why the user should care
Give them control of their data
R E C A P
03
Nurture long-term partnerships
Be open when mistakes happen
Communicate any data or policy changes
Foster a two-way dialog between biz and user
R E C A P
Bonus!
build for flexibility
Allow users to change their mind
Give them control
Follow the unsubscribe model
R E C A P
Be open with users
and they’ll become
advocates of your
company, product
or brand.
R E C A P
Thanks
for
listening!
Sources
additional things I referenced
https://en.wikipedia.org/wiki/California_Consumer_Privacy_Act
https://www.tripwire.com/state-of-security/security-data-protection/a-practical-guide-to-ccpa-for-u-s-businesses/
https://elitesem.com/blog/ccpa-need-to-know/
https://termly.io/resources/articles/privacy-by-design-best-practices/
https://www.bbb.org/greater-san-francisco/for-businesses/understanding-privacy-policy/
https://eugdpr.org/
https://ec.europa.eu/
https://uxdesign.cc/what-does-gdpr-mean-for-ux-9b5ecbc51a43
https://www.perkinscoie.com/en/news-insights/ccpa-vs-gdpr-know-the-differences.html
https://elitesem.com/blog/ccpa-need-to-know/
https://iapp.org/resources/article/cacpa-what-to-disclose-and-where-to-disclose-it/
https://www.securitynow.com/author.asp?section_id=706&doc_id=744859

More Related Content

Similar to Esteban Pérez-Hemminger: Designing for compliance: why you should care

4 Reasons Accounting Firms Should Migrate To The Cloud
4 Reasons Accounting Firms Should Migrate To The Cloud4 Reasons Accounting Firms Should Migrate To The Cloud
4 Reasons Accounting Firms Should Migrate To The CloudAvni Rajput
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategyMaarten BOONEN
 
Welike Project Presentation Sanket on some Videos from Management Institute
Welike Project Presentation Sanket on some Videos from Management InstituteWelike Project Presentation Sanket on some Videos from Management Institute
Welike Project Presentation Sanket on some Videos from Management InstituteSanket Dhumal
 
Welikeshow 150426060140-conversion-gate02
Welikeshow 150426060140-conversion-gate02Welikeshow 150426060140-conversion-gate02
Welikeshow 150426060140-conversion-gate02dipesh parekh
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)Peter Bihr
 
Asia Start-Up InsurTech Award 2017 - Aligned Business
Asia Start-Up InsurTech Award 2017 - Aligned BusinessAsia Start-Up InsurTech Award 2017 - Aligned Business
Asia Start-Up InsurTech Award 2017 - Aligned BusinessThe Digital Insurer
 
The People Pillar of Cloud Adoption: Developing Your Workforce & Building Dig...
The People Pillar of Cloud Adoption: Developing Your Workforce & Building Dig...The People Pillar of Cloud Adoption: Developing Your Workforce & Building Dig...
The People Pillar of Cloud Adoption: Developing Your Workforce & Building Dig...Amazon Web Services
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxSymptai Consulting Limited
 
Why Outsource Data Entry Services?
Why Outsource Data Entry Services?Why Outsource Data Entry Services?
Why Outsource Data Entry Services?Cogneesol
 
Transform with Cloud to drive your future
Transform with Cloud to drive your futureTransform with Cloud to drive your future
Transform with Cloud to drive your futureAmazon Web Services
 
Big Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewBig Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewPietro Leo
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)Peter Bihr
 
CWIN17 New-York / Navigating the age of digital disruption
CWIN17 New-York / Navigating the age of digital disruptionCWIN17 New-York / Navigating the age of digital disruption
CWIN17 New-York / Navigating the age of digital disruptionCapgemini
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?The Digital Insurer
 
The opportunities of digital transformation
The opportunities of digital transformationThe opportunities of digital transformation
The opportunities of digital transformationPMOfficers PMOAcademy
 
NYAI #13: "AI and Business Transformation" - Josh Sutton
NYAI #13: "AI and Business Transformation" - Josh SuttonNYAI #13: "AI and Business Transformation" - Josh Sutton
NYAI #13: "AI and Business Transformation" - Josh SuttonMaryam Farooq
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)Peter Bihr
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Peter Bihr
 

Similar to Esteban Pérez-Hemminger: Designing for compliance: why you should care (20)

4 Reasons Accounting Firms Should Migrate To The Cloud
4 Reasons Accounting Firms Should Migrate To The Cloud4 Reasons Accounting Firms Should Migrate To The Cloud
4 Reasons Accounting Firms Should Migrate To The Cloud
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy
 
Welike Project Presentation Sanket on some Videos from Management Institute
Welike Project Presentation Sanket on some Videos from Management InstituteWelike Project Presentation Sanket on some Videos from Management Institute
Welike Project Presentation Sanket on some Videos from Management Institute
 
Welikeshow 150426060140-conversion-gate02
Welikeshow 150426060140-conversion-gate02Welikeshow 150426060140-conversion-gate02
Welikeshow 150426060140-conversion-gate02
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
Asia Start-Up InsurTech Award 2017 - Aligned Business
Asia Start-Up InsurTech Award 2017 - Aligned BusinessAsia Start-Up InsurTech Award 2017 - Aligned Business
Asia Start-Up InsurTech Award 2017 - Aligned Business
 
The People Pillar of Cloud Adoption: Developing Your Workforce & Building Dig...
The People Pillar of Cloud Adoption: Developing Your Workforce & Building Dig...The People Pillar of Cloud Adoption: Developing Your Workforce & Building Dig...
The People Pillar of Cloud Adoption: Developing Your Workforce & Building Dig...
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
Why Outsource Data Entry Services?
Why Outsource Data Entry Services?Why Outsource Data Entry Services?
Why Outsource Data Entry Services?
 
Transform with Cloud to drive your future
Transform with Cloud to drive your futureTransform with Cloud to drive your future
Transform with Cloud to drive your future
 
Big Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewBig Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of View
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
 
CWIN17 New-York / Navigating the age of digital disruption
CWIN17 New-York / Navigating the age of digital disruptionCWIN17 New-York / Navigating the age of digital disruption
CWIN17 New-York / Navigating the age of digital disruption
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?
 
The opportunities of digital transformation
The opportunities of digital transformationThe opportunities of digital transformation
The opportunities of digital transformation
 
NYAI #13: "AI and Business Transformation" - Josh Sutton
NYAI #13: "AI and Business Transformation" - Josh SuttonNYAI #13: "AI and Business Transformation" - Josh Sutton
NYAI #13: "AI and Business Transformation" - Josh Sutton
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Esteban Pérez-Hemminger: Designing for compliance: why you should care

  • 1. Designing for compliance: why you should care  Esteban Pérez-Hemminger | Senior Design Lead | IBM Security Design
  • 2. Agreements are the new login screen Design for compliance from Day 1 Show usefulness & value Show why the user should care about data privacy Nurture long-term partnerships Ensure biz and user have a two-way engagement Takeaways the outline B A C K S T O R Y
  • 3. My journey PR NYC ATX B A C K S T O R Y 1982 2010 2015 U n d e r g r a d d e g r e e s F r e e l a n c e w o r k M u s i c c a r e e r G r a d s c h o o l T e a c h i n g a s s i s t a n t D e s i g n s t u d i o s P r o d u c t d e s i g n E n t e r p r i s e s c a l e C l o u d + s e c u r i t y
  • 4. B A C K S T O R Y During the last 4 years at IBM, I’ve led ~5 projects, and it all began in the Hybrid Cloud organization. Here are some of the Cloud projects.
  • 5. Security design a whole new world Senior Design Lead • project scope, process, team direction & delivery S I N C E F A L L ‘ 1 8
  • 6. You don’t have to be a designer in a security team to design with security in mind. S E C U R I T Y - D
  • 7. I had no previous experience in security. S E C U R I T Y - D
  • 8. Now in Security, I’m involved in two projects: Identity Management and Data Protection, the latter is where compliance comes in. S E C U R I T Y - D
  • 9. Not fancy Key experiences are secondary to main user tasks Meta Comply to help others comply Awareness gap Data privacy relates to all designers Learning curve what’s unique S E C U R I T Y - D
  • 10. Security jargon for designers Data privacy How that personal info is collected, used, shared by companies Personal Information (PI) Info that can be used to identify, contact or locate an individual Compliance Following the obligations/rules specified by a regulation body (e.g. GDPR, CCPA, PCI) S E C U R I T Y - D
  • 12. I didn’t study the law. I work in IT. I just need to know what to protect and, more importantly, how. The legislation [GDPR] doesn’t give a clear path on how a business is supposed to be compliant. — J.T., IT Admin “ T H E C H A N G E
  • 13. Panic Are we in trouble? Confusion Will it a!ect my biz? Overwhelmed Where do I begin the process? Pain points what we heard T H E C H A N G E
  • 14. Consumers won’t buy from companies they don’t trust 75% Proof of compliance will be seen by the public as a positive di!erentiator 81 % The stats the biz perspective Retailers are ready for CCPA’s deadline 46% https://chargebacks911.com/california-consumer-privacy-act/ https://info.trustarc.com/Web-Resource-2019-03-18-CCPA-GDPRComplianceReport_LP.html https://elitesem.com/blog/ccpa-need-to-know/ T H E C H A N G E
  • 15. Proof of compliance will be seen by the public as a positive di!erentiator 81 % The stats the biz perspective https://chargebacks911.com/california-consumer-privacy-act/ https://info.trustarc.com/Web-Resource-2019-03-18-CCPA-GDPRComplianceReport_LP.html https://elitesem.com/blog/ccpa-need-to-know/ T H E C H A N G E Consumers won’t buy from companies they don’t trust 75% Retailers are ready for CCPA’s deadline 46%
  • 16. Here’s where your design e!ort should focus on T H E C H A N G E
  • 18. CX impact how compliance a!ects our work
  • 19. General Data Protection Regulation (GDPR) Signed on 2016 In e!ect May 25, 2018         The California Consumer Privacy Act (CCPA) Signed in 2018 In e!ect January 1, 2020     C X I M P A C T Compliance GDPR v CCPA
  • 20. General Data Protection Regulation (GDPR) Signed on 2016 In e!ect May 25, 2018         https://gdpr-info.eu/ https://eugdpr.org/ https://en.wikipedia.org/wiki/General_Data_Protection_Regulation GDPR overview Protects: Right to Access, to delete, do not sell data Parental consent for children Applies to all organizations (for- and non-profits) Fines up to 4% of annual global turnover or €20M C X I M P A C T
  • 21. CCPA the not so little brother Set up specific communication channels for data requests Expands personal data to include household No “right to be forgotten” No option to opt-out outright The California Consumer Privacy Act (CCPA) Signed in 2018 In e!ect January 1, 2020     https://en.wikipedia.org/wiki/California_Consumer_Privacy_Act https://www.tripwire.com/state-of-security/security-data-protection/a-practical-guide-to-ccpa-for-u-s-businesses/ https://elitesem.com/blog/ccpa-need-to-know/ C X I M P A C T
  • 22. The CCPA impact how biz is a!ected For-profit businesses Any business that operates in California Any company that does biz with consumers in California Up to $7,500 per infraction C X I M P A C T
  • 23. Legal Tech Personal C X I M P A C T
  • 24. Legal Tech Personal C X I M P A C T
  • 25. User Experience C X I M P A C T
  • 26. In these gaps designers can become the translators C X I M P A C T
  • 27. Acquire consent Enable removal Pass data control Biz obligations Transparency Trust Ownership User rights C X I M P A C T
  • 29. UnsubscribeIf a subscriber wants o! your list, you have 10 days to do it. (Spam Act 2003) C O M P L I A N C E U X https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-business https://en.wikipedia.org/wiki/CAN-SPAM_Act_of_2003
  • 30. Whose info What type of info Where is it stored Why do you need it How can I get it C O M P L I A N C E U X
  • 31. User lifecylce milestones Updates Customization O!boardingOnboarding D A Y 1 D A Y 1 0 D A Y 3 0 D A Y 3 0 0 C O M P L I A N C E U X
  • 32. C O M P L I A N C E U X Day 1 Onboarding Updates Customization O!boarding No guesswork: don’t put the onus on users to be and stay secure
  • 33. Onboarding Updates Customization O!boarding C O M P L I A N C E U X Day 1 More is better: the highest privacy must be the default setting
  • 34. Onboarding Updates Customization O!boarding Day 10 C O M P L I A N C E U X Don’t hide: don’t make finding updates an easter egg hunt
  • 35. Onboarding Updates Customization O!boarding Day 10 C O M P L I A N C E U X Be proactive: show impacts to privacy and guide to update
  • 36. Day 30 Onboarding Updates Customization O!boarding C O M P L I A N C E U X Don’t be an obstacle: remove hurdles that impede any editing
  • 37. Day 30 Onboarding Updates Customization O!boarding C O M P L I A N C E U X Minds change: let users change their preferences anytime
  • 38. Day 300 Onboarding Updates Customization O!boarding C O M P L I A N C E U X Don’t be a bad ex: don’t hold people hostage to the app
  • 39. Day 300 Onboarding Updates Customization O!boarding C O M P L I A N C E U X Hand o! control: make retrieval and opt-out painless
  • 41. Agreements are the new login screen Design for compliance from Day 1 Show usefulness & value Show why the user should care about data privacy Nurture long-term partnerships Ensure biz and user have a two-way engagement Takeaways one more time R E C A P
  • 42. 01 Agreements are the new login screen (Max) Privacy must be the default Acknowledge the user’s apprehension Identify privacy moments across flows R E C A P
  • 43. 02 Show usefulness & value Present content in a consumable way Show why the user should care Give them control of their data R E C A P
  • 44. 03 Nurture long-term partnerships Be open when mistakes happen Communicate any data or policy changes Foster a two-way dialog between biz and user R E C A P
  • 45. Bonus! build for flexibility Allow users to change their mind Give them control Follow the unsubscribe model R E C A P
  • 46. Be open with users and they’ll become advocates of your company, product or brand. R E C A P
  • 48. Sources additional things I referenced https://en.wikipedia.org/wiki/California_Consumer_Privacy_Act https://www.tripwire.com/state-of-security/security-data-protection/a-practical-guide-to-ccpa-for-u-s-businesses/ https://elitesem.com/blog/ccpa-need-to-know/ https://termly.io/resources/articles/privacy-by-design-best-practices/ https://www.bbb.org/greater-san-francisco/for-businesses/understanding-privacy-policy/ https://eugdpr.org/ https://ec.europa.eu/ https://uxdesign.cc/what-does-gdpr-mean-for-ux-9b5ecbc51a43 https://www.perkinscoie.com/en/news-insights/ccpa-vs-gdpr-know-the-differences.html https://elitesem.com/blog/ccpa-need-to-know/ https://iapp.org/resources/article/cacpa-what-to-disclose-and-where-to-disclose-it/ https://www.securitynow.com/author.asp?section_id=706&doc_id=744859