1
Thank You for Joining Us.
“Privacy Enhancing Technologies: Exploring the Benefits
and Recommendations ”
● We will be starting a couple minutes after the hour
● This webinar will be recorded and the recording and slides will be sent out later
today
● Please use the GoToWebinar control panel on the right hand side to submit any
questions for the speakers
2
© 2023 TrustArc Inc. Proprietary and Confidential Information.
Privacy Enhancing Technologies: Exploring the Benefits
and Recommendations
3
Speakers
Martin Gomberg
Senior Privacy Consultant,
TrustArc
Ralph T O'Brien
Principal Consultant, Europe,
TrustArc
4
Legal Disclaimer
The information provided during this webinar does not,
and is not intended to, constitute legal advice.
Instead, all information, content, and materials presented
during this webinar are for general informational purposes only.
5
Agenda
▪ An overview of Privacy Enhancing Technologies (PETs)
▪ The benefits of PETs for privacy protection and data-driven business
decisions
▪ PETs and Privacy Principles
▪ TrustArc's recommendations for PETs and how they can help your
organization achieve its privacy goals
▪ Q&A
6
Privacy Technology vs Privacy Laws!
Proactive Functional Design vs Reactive Documentation Compliance
● New ICO guide to “high tech” PETS
○ https://ico.org.uk/about-the-ico/media-centre/news-and-blo
gs/2023/06/ico-urges-organisations-to-harness-the-power-of
-data-safely-by-using-privacy-enhancing-technologies/
● Legal compliance is the old way
○ for low maturity companies
○ Reactive
○ Cost
● Technological design features
○ Empower individuals to manage the data
○ Proactive
○ Benefit
7
What are PETS?
● Normal Tech with a fancy name!
● Security
○ C I A
● Data Management tools
● User data control functions
● Rights Requests
8
How to fit PETs into a Privacy Strategy
PROCESS ORIENTED STRATEGY?
● Inform
● Control
● Demonstrate
● Enforce
DATA ORIENTED STRATEGY?
● Minimise
● Separate
● Hide
● Aggregate
9
PET as Privacy By Design Principles
● Proactive not reactive; preventive not
remedial
● Privacy as the default setting
● Privacy embedded into design
● Full functionality – positive-sum, not
zero-sum
● End-to-end security – full lifecycle protection
● Visibility and transparency – keep it open
● Respect for user privacy – keep it
user-centric
10
PETs into Operational Processes
● People
○ Commitment
○ Training
○ Buy in
● Process
○ SLDC
○ Security
○ Project management
○ Vendor management
● Technology
○ New systems
○ Legacy systems
11
11
Q&A

TrustArc Webinar - Privacy Enhancing Technologies: Exploring the Benefits and Recommendations

  • 1.
    1 Thank You forJoining Us. “Privacy Enhancing Technologies: Exploring the Benefits and Recommendations ” ● We will be starting a couple minutes after the hour ● This webinar will be recorded and the recording and slides will be sent out later today ● Please use the GoToWebinar control panel on the right hand side to submit any questions for the speakers
  • 2.
    2 © 2023 TrustArcInc. Proprietary and Confidential Information. Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
  • 3.
    3 Speakers Martin Gomberg Senior PrivacyConsultant, TrustArc Ralph T O'Brien Principal Consultant, Europe, TrustArc
  • 4.
    4 Legal Disclaimer The informationprovided during this webinar does not, and is not intended to, constitute legal advice. Instead, all information, content, and materials presented during this webinar are for general informational purposes only.
  • 5.
    5 Agenda ▪ An overviewof Privacy Enhancing Technologies (PETs) ▪ The benefits of PETs for privacy protection and data-driven business decisions ▪ PETs and Privacy Principles ▪ TrustArc's recommendations for PETs and how they can help your organization achieve its privacy goals ▪ Q&A
  • 6.
    6 Privacy Technology vsPrivacy Laws! Proactive Functional Design vs Reactive Documentation Compliance ● New ICO guide to “high tech” PETS ○ https://ico.org.uk/about-the-ico/media-centre/news-and-blo gs/2023/06/ico-urges-organisations-to-harness-the-power-of -data-safely-by-using-privacy-enhancing-technologies/ ● Legal compliance is the old way ○ for low maturity companies ○ Reactive ○ Cost ● Technological design features ○ Empower individuals to manage the data ○ Proactive ○ Benefit
  • 7.
    7 What are PETS? ●Normal Tech with a fancy name! ● Security ○ C I A ● Data Management tools ● User data control functions ● Rights Requests
  • 8.
    8 How to fitPETs into a Privacy Strategy PROCESS ORIENTED STRATEGY? ● Inform ● Control ● Demonstrate ● Enforce DATA ORIENTED STRATEGY? ● Minimise ● Separate ● Hide ● Aggregate
  • 9.
    9 PET as PrivacyBy Design Principles ● Proactive not reactive; preventive not remedial ● Privacy as the default setting ● Privacy embedded into design ● Full functionality – positive-sum, not zero-sum ● End-to-end security – full lifecycle protection ● Visibility and transparency – keep it open ● Respect for user privacy – keep it user-centric
  • 10.
    10 PETs into OperationalProcesses ● People ○ Commitment ○ Training ○ Buy in ● Process ○ SLDC ○ Security ○ Project management ○ Vendor management ● Technology ○ New systems ○ Legacy systems
  • 11.