SlideShare a Scribd company logo
1 of 14
Privacy by Design (PbD)
Connecting the dots between legal and technology
by Advocate Alon Saposhnik and Initech Software Services Ltd,
January, 2017
Main players
● “Data Subject” -An Individual who is the subject of personal data.
● “Personal data” - any information relating to an identified or identifiable natural person
● “Sensitive data” (according to the Israeli Privacy Laws) - includes “details concerning an
individual’s personality, intimate relations, health condition, financial condition, opinions
and religious belief”.
● “Controller” - is the one that is responsible for the compliance with the data protection
regulations.
● “Processor” - is the one that is only responsible for processing personal data and is
acting on behalf of the controller and according to its instructors.
● “Regulator” - Data Protection Authority (e.g, ILITA, information commissioner office
etc.)
Guiding principles of PBD (Privacy by Design)
1. Proactive not reactive ; Preventative not remedial
2. Privacy as the Default
3. Privacy Embedded into Design.
4. Full Functionality; Positive-Sum not Zero-Sum.
5. End-to-End Lifecycle Protection.
6. Visibility and Transparency.
7. Respect for User Privacy
Who’s affected?
● Developers
● Companies using third party apps / software / hosting as a part of their
product / service
● Data Controllers
● Data Processors
● Others?
Implementation - legal considerations
1. Infrastructure providers located outside of the EU territory - do they comply
with privacy regulations or do they offer to sign on Model Clause (or Data
Processing Addendum)?
2. Service providers located outside of the EU (Marketing, R&D) - sign on Model
Clause when transferring data abroad
3. NDA agreements with workers and service providers to assure privacy
compliance.
4. Information security - get ISO certificate for working with global companies
Case studies of privacy lawsuits - in Israel
● Local Israeli App (Sync.Me): was ordered by the regulator to erase all
personal data that were illegally collected on users. Activity in Israel has been
stopped.
● Data Rings (seller of databases): was ordered by court to erase all personal
data that was collected on individuals. Clients of the company who gained
access to the data were ordered to do the same.
● Israeli company (undisclosed) was fined 177,000 NIS for illegal commercial
use of personal data that as collected on individuals.
Case studies of privacy lawsuits - abroad
● The Hamburg regulator has ordered Facebook to halt its unlawful collection and storage of data belonging to 35
million German WhatsApp users. The Commissioner has also ordered that Facebook delete any data that they have
already collected from WhatsApp.
● £40,000 fine for healthcare organization that failed to protect patient's personal data: a general practitioner clinic that
revealed confidential details about a woman and her family to her estranged ex-partner was fined £40,000 by the
Information Commissioner.
● An EU lawmaker is calling for the European Commission to investigate dating app Tinder for potential breaches of
European data protection rules, because it uses personal data without explicit consent.
● The CNIL has issued an order giving Microsoft three months to make changes to its operating system in line with
French data protection law. According to the CNIL, Windows Store collects user data on all downloaded applications
without user consent or even awareness, monitoring the time spent on each app. Windows 10 also automatically
installs an advertising identifier, enabling Microsoft to monitor users' browsing to offer targeted ads. The CNIL will
only consider fining the company if it fails to make changes.
● Intelligent Lending, trading as Ocean Finance, was fined by the UK regulator after it sent seven million texts offering
a new credit card powered by a major lender.
Implementation - applicative considerations
1. Privacy Policies - Organizational practices and procedures
2. Israeli Privacy Law requires registration of certain databases with the Database
Registrar
3. Data Protection Certification - for demonstrating compliance with Data Protection
Regulation by controllers and processors
4. Conduct Privacy Impact Assessment
5. Internal Training Programs
6. Presence of Privacy Specialist in early stages of product development
Typical privacy issues in mobile / web applications
Collecting unnecessary sensitive data during sign-up
Failure to get approval for TOS / receiving emails during sign-up (Privacy and
Anti-Spam Laws)
Blind selection of data center in USA
Unintentional exposure of sensitive data when using 3rd party integrations (i.e.,
using Messenger to collect personal data exposes it to Facebook)
Typical privacy issues in mobile / web applications
Unintentional exposure of sensitive data belonging to other users due to bugs in
code
Development / testing environments are replicated from production data without
obfuscating personal data
Access of personnel to the sensitive data through direct access to database
Production data compromised through unrestricted access to backups
● Privacy policy + confirmation for designated actions (account creation, etc.)
● Newsletters / promotion correspondence establishes an opt-in mechanism according to
Privacy law and the Anti-Spam Law requirements
● Infrastructure for personal data retrieval and erasure (blacklisting erased data to be
filtered out during recovery from backups)
● Back office with multiple levels of access to Personal data of Users (each role has
Implementation - examples
Implementation - examples
● Hosting location selection - EU or approved location by EU (Israel is approved)
● Managing the list of 3rd parties that receive access to User’s personal data (including
appropriate permissions model)
● Implement contractual mechanisms with 3rd parties (e.g., Data Processing agreement)
● Data Access Layer middleware should restrict selection of data to session / user
context
Implementation - takeouts and challenges for PBD
Big advantage for EU / Israel-based providers
High risk of working with providers based outside of the EU and in such places
as East-Europe / Asia (Belarus, Ukraine, India, China, Russia) where EU
privacy regulations does not apply and thus impossible to enforce
Questions to answer when starting a project:
Which criteria should we implement as a minimum default privacy by design?
At what stage should we involve a privacy specialist?
Thank you for listening!
For technical questions: contact@initech.co.il
For legal questions: alon.saposhnik@sr-lawoffice.co.il

More Related Content

What's hot

Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Designbradley_g
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Dr. Ann Cavoukian
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10Ulf Mattsson
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Khaled El Emam
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research dataTomppa Järvinen
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignGDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignJohn Eckman
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014kevintsmith
 

What's hot (20)

Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignGDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 

Similar to Privacy by design for peerlyst meetup

Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Board Priorities for GDPR Implementation
Board Priorities for GDPR ImplementationBoard Priorities for GDPR Implementation
Board Priorities for GDPR ImplementationJoseph V. Moreno
 
Prep your app for gdpr compliance
Prep your app for gdpr compliancePrep your app for gdpr compliance
Prep your app for gdpr complianceAsanka Nissanka
 
GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization  GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization Vishnuvarthanan Moorthy
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)BenjaminShalevSalovi
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare IndustryEMMAIntl
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Dione McBride, CISSP, CIPP/E
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
Explain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprExplain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprPierre Feillet
 

Similar to Privacy by design for peerlyst meetup (20)

Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Board Priorities for GDPR Implementation
Board Priorities for GDPR ImplementationBoard Priorities for GDPR Implementation
Board Priorities for GDPR Implementation
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Prep your app for gdpr compliance
Prep your app for gdpr compliancePrep your app for gdpr compliance
Prep your app for gdpr compliance
 
GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization  GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Explain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprExplain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdpr
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 

More from Ishay Tentser

CV Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)
CV  Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)CV  Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)
CV Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)Ishay Tentser
 
Landing your dream hi tech job in post-covid israel
Landing your dream hi tech job in post-covid israelLanding your dream hi tech job in post-covid israel
Landing your dream hi tech job in post-covid israelIshay Tentser
 
Timelines ai transparency for remote business communication with customers ...
Timelines ai   transparency for remote business communication with customers ...Timelines ai   transparency for remote business communication with customers ...
Timelines ai transparency for remote business communication with customers ...Ishay Tentser
 
Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Ishay Tentser
 
Template of questionnaire for horizon 2020 companies
Template of questionnaire for horizon 2020 companiesTemplate of questionnaire for horizon 2020 companies
Template of questionnaire for horizon 2020 companiesIshay Tentser
 
Digital innovation crash course
Digital innovation crash courseDigital innovation crash course
Digital innovation crash courseIshay Tentser
 
Horizon 2020 coaching plan for startups phase A
Horizon 2020 coaching plan for startups phase AHorizon 2020 coaching plan for startups phase A
Horizon 2020 coaching plan for startups phase AIshay Tentser
 
Crypto and blockchain crash course
Crypto and blockchain crash courseCrypto and blockchain crash course
Crypto and blockchain crash courseIshay Tentser
 
Cashless economy(Mobile payments,digital coin,blockchain)
Cashless economy(Mobile payments,digital coin,blockchain)Cashless economy(Mobile payments,digital coin,blockchain)
Cashless economy(Mobile payments,digital coin,blockchain)Ishay Tentser
 
How augmented reality is reshaping advertising
How augmented reality is reshaping advertisingHow augmented reality is reshaping advertising
How augmented reality is reshaping advertisingIshay Tentser
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Ishay Tentser
 
Welcome to the VR revolution
Welcome to the VR revolutionWelcome to the VR revolution
Welcome to the VR revolutionIshay Tentser
 
Onboarding Israeli startup ecosystem
Onboarding Israeli  startup ecosystemOnboarding Israeli  startup ecosystem
Onboarding Israeli startup ecosystemIshay Tentser
 
Organizational messenger solution
Organizational messenger solutionOrganizational messenger solution
Organizational messenger solutionIshay Tentser
 
Presentation product development and R&D for digital healthcare
Presentation product development and R&D for digital healthcarePresentation product development and R&D for digital healthcare
Presentation product development and R&D for digital healthcareIshay Tentser
 
Chat bots for foodtech initech english
Chat bots  for foodtech   initech englishChat bots  for foodtech   initech english
Chat bots for foodtech initech englishIshay Tentser
 
ChatBots solutions for smart cities
ChatBots solutions for smart citiesChatBots solutions for smart cities
ChatBots solutions for smart citiesIshay Tentser
 
Frankfurt accelerator Cyber & FinTech
Frankfurt accelerator Cyber & FinTechFrankfurt accelerator Cyber & FinTech
Frankfurt accelerator Cyber & FinTechIshay Tentser
 

More from Ishay Tentser (20)

CV Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)
CV  Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)CV  Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)
CV Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)
 
Landing your dream hi tech job in post-covid israel
Landing your dream hi tech job in post-covid israelLanding your dream hi tech job in post-covid israel
Landing your dream hi tech job in post-covid israel
 
Timelines ai transparency for remote business communication with customers ...
Timelines ai   transparency for remote business communication with customers ...Timelines ai   transparency for remote business communication with customers ...
Timelines ai transparency for remote business communication with customers ...
 
Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)
 
Template of questionnaire for horizon 2020 companies
Template of questionnaire for horizon 2020 companiesTemplate of questionnaire for horizon 2020 companies
Template of questionnaire for horizon 2020 companies
 
Digital innovation crash course
Digital innovation crash courseDigital innovation crash course
Digital innovation crash course
 
Horizon 2020 coaching plan for startups phase A
Horizon 2020 coaching plan for startups phase AHorizon 2020 coaching plan for startups phase A
Horizon 2020 coaching plan for startups phase A
 
Crypto and blockchain crash course
Crypto and blockchain crash courseCrypto and blockchain crash course
Crypto and blockchain crash course
 
Cashless economy(Mobile payments,digital coin,blockchain)
Cashless economy(Mobile payments,digital coin,blockchain)Cashless economy(Mobile payments,digital coin,blockchain)
Cashless economy(Mobile payments,digital coin,blockchain)
 
How augmented reality is reshaping advertising
How augmented reality is reshaping advertisingHow augmented reality is reshaping advertising
How augmented reality is reshaping advertising
 
V - Commerce
V - CommerceV - Commerce
V - Commerce
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0
 
Welcome to the VR revolution
Welcome to the VR revolutionWelcome to the VR revolution
Welcome to the VR revolution
 
Onboarding Israeli startup ecosystem
Onboarding Israeli  startup ecosystemOnboarding Israeli  startup ecosystem
Onboarding Israeli startup ecosystem
 
Organizational messenger solution
Organizational messenger solutionOrganizational messenger solution
Organizational messenger solution
 
React native
React nativeReact native
React native
 
Presentation product development and R&D for digital healthcare
Presentation product development and R&D for digital healthcarePresentation product development and R&D for digital healthcare
Presentation product development and R&D for digital healthcare
 
Chat bots for foodtech initech english
Chat bots  for foodtech   initech englishChat bots  for foodtech   initech english
Chat bots for foodtech initech english
 
ChatBots solutions for smart cities
ChatBots solutions for smart citiesChatBots solutions for smart cities
ChatBots solutions for smart cities
 
Frankfurt accelerator Cyber & FinTech
Frankfurt accelerator Cyber & FinTechFrankfurt accelerator Cyber & FinTech
Frankfurt accelerator Cyber & FinTech
 

Recently uploaded

why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 

Recently uploaded (20)

why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 

Privacy by design for peerlyst meetup

  • 1. Privacy by Design (PbD) Connecting the dots between legal and technology by Advocate Alon Saposhnik and Initech Software Services Ltd, January, 2017
  • 2. Main players ● “Data Subject” -An Individual who is the subject of personal data. ● “Personal data” - any information relating to an identified or identifiable natural person ● “Sensitive data” (according to the Israeli Privacy Laws) - includes “details concerning an individual’s personality, intimate relations, health condition, financial condition, opinions and religious belief”. ● “Controller” - is the one that is responsible for the compliance with the data protection regulations. ● “Processor” - is the one that is only responsible for processing personal data and is acting on behalf of the controller and according to its instructors. ● “Regulator” - Data Protection Authority (e.g, ILITA, information commissioner office etc.)
  • 3. Guiding principles of PBD (Privacy by Design) 1. Proactive not reactive ; Preventative not remedial 2. Privacy as the Default 3. Privacy Embedded into Design. 4. Full Functionality; Positive-Sum not Zero-Sum. 5. End-to-End Lifecycle Protection. 6. Visibility and Transparency. 7. Respect for User Privacy
  • 4. Who’s affected? ● Developers ● Companies using third party apps / software / hosting as a part of their product / service ● Data Controllers ● Data Processors ● Others?
  • 5. Implementation - legal considerations 1. Infrastructure providers located outside of the EU territory - do they comply with privacy regulations or do they offer to sign on Model Clause (or Data Processing Addendum)? 2. Service providers located outside of the EU (Marketing, R&D) - sign on Model Clause when transferring data abroad 3. NDA agreements with workers and service providers to assure privacy compliance. 4. Information security - get ISO certificate for working with global companies
  • 6. Case studies of privacy lawsuits - in Israel ● Local Israeli App (Sync.Me): was ordered by the regulator to erase all personal data that were illegally collected on users. Activity in Israel has been stopped. ● Data Rings (seller of databases): was ordered by court to erase all personal data that was collected on individuals. Clients of the company who gained access to the data were ordered to do the same. ● Israeli company (undisclosed) was fined 177,000 NIS for illegal commercial use of personal data that as collected on individuals.
  • 7. Case studies of privacy lawsuits - abroad ● The Hamburg regulator has ordered Facebook to halt its unlawful collection and storage of data belonging to 35 million German WhatsApp users. The Commissioner has also ordered that Facebook delete any data that they have already collected from WhatsApp. ● £40,000 fine for healthcare organization that failed to protect patient's personal data: a general practitioner clinic that revealed confidential details about a woman and her family to her estranged ex-partner was fined £40,000 by the Information Commissioner. ● An EU lawmaker is calling for the European Commission to investigate dating app Tinder for potential breaches of European data protection rules, because it uses personal data without explicit consent. ● The CNIL has issued an order giving Microsoft three months to make changes to its operating system in line with French data protection law. According to the CNIL, Windows Store collects user data on all downloaded applications without user consent or even awareness, monitoring the time spent on each app. Windows 10 also automatically installs an advertising identifier, enabling Microsoft to monitor users' browsing to offer targeted ads. The CNIL will only consider fining the company if it fails to make changes. ● Intelligent Lending, trading as Ocean Finance, was fined by the UK regulator after it sent seven million texts offering a new credit card powered by a major lender.
  • 8. Implementation - applicative considerations 1. Privacy Policies - Organizational practices and procedures 2. Israeli Privacy Law requires registration of certain databases with the Database Registrar 3. Data Protection Certification - for demonstrating compliance with Data Protection Regulation by controllers and processors 4. Conduct Privacy Impact Assessment 5. Internal Training Programs 6. Presence of Privacy Specialist in early stages of product development
  • 9. Typical privacy issues in mobile / web applications Collecting unnecessary sensitive data during sign-up Failure to get approval for TOS / receiving emails during sign-up (Privacy and Anti-Spam Laws) Blind selection of data center in USA Unintentional exposure of sensitive data when using 3rd party integrations (i.e., using Messenger to collect personal data exposes it to Facebook)
  • 10. Typical privacy issues in mobile / web applications Unintentional exposure of sensitive data belonging to other users due to bugs in code Development / testing environments are replicated from production data without obfuscating personal data Access of personnel to the sensitive data through direct access to database Production data compromised through unrestricted access to backups
  • 11. ● Privacy policy + confirmation for designated actions (account creation, etc.) ● Newsletters / promotion correspondence establishes an opt-in mechanism according to Privacy law and the Anti-Spam Law requirements ● Infrastructure for personal data retrieval and erasure (blacklisting erased data to be filtered out during recovery from backups) ● Back office with multiple levels of access to Personal data of Users (each role has Implementation - examples
  • 12. Implementation - examples ● Hosting location selection - EU or approved location by EU (Israel is approved) ● Managing the list of 3rd parties that receive access to User’s personal data (including appropriate permissions model) ● Implement contractual mechanisms with 3rd parties (e.g., Data Processing agreement) ● Data Access Layer middleware should restrict selection of data to session / user context
  • 13. Implementation - takeouts and challenges for PBD Big advantage for EU / Israel-based providers High risk of working with providers based outside of the EU and in such places as East-Europe / Asia (Belarus, Ukraine, India, China, Russia) where EU privacy regulations does not apply and thus impossible to enforce Questions to answer when starting a project: Which criteria should we implement as a minimum default privacy by design? At what stage should we involve a privacy specialist?
  • 14. Thank you for listening! For technical questions: contact@initech.co.il For legal questions: alon.saposhnik@sr-lawoffice.co.il

Editor's Notes

  1. Target group: digital health,FinTech,Telecom,HR startups. Round A funds Audience: CEO/CTO/Co-founder
  2. Example: HR database which includes data such as employee’s salary, benefits, bank accounts is considered to be a Sensitive Data. The holder/owner of a database which contain Sensitive Data, must register the database at the local regulator.