Hoepman, J. (2015). Privacy Design Strategies. Nijmegen, The Netherlands: Radboud University, pp.4-6.
Abstract. In this paper we define the notion of a privacy design strategy. These strategies help IT architects to support privacy by design early in the software development life cycle, during concept development and analysis. Using current data protection legislation as point of departure we derive the following eight privacy design strategies: MINIMISE, HIDE, SEPARATE, AGGREGATE, INFORM, CONTROL, ENFORCE, and DEMONSTRATE. The strategies also provide a useful classification of privacy design patterns and the underlying privacy enhancing technologies. We therefore believe that these privacy design strategies are not only useful when designing privacy friendly systems, but also helpful when evaluating the privacy impact of existing IT systems.
This is a 14-page report by Jaap-Henk Hoepman, an associate professor of privacy enhancing protocols and privacy by design in the Digital Security group at the Institute for Computing and Information Sciences of the Radboud University Nijmegen. In this paper, he discusses the importance of data privacy and how systems should be designed at the outset to incorporate this concept. He also addresses the implications of data privacy in the context of the new GDPR in May 2018, and then goes on to discuss how data privacy can be examined and improved in existing IT systems.
This paper is of particular interest to me as I am a software designer and developer, and am usually involved throughout the lifecycle. The traditional SDLC starts with analysis and design phases - both of which should take data privacy into account - and culminates in maintenance. This phase would apply to existing systems, which can be audited and re-evaluated and any necessary changes built in.
This paper is also written from a European point of view, in contrast to the e-Book I spoke about in the last post, which was written from an American perspective. As the GDPR will have an impact on organisations worldwide, it is interesting to compare and contrast the approaches of different parties.