Privacy Concepts
Privacy Concepts
Privacy by Design
• In dealing with the privacy of PII, two (2) new concepts have emerged: privacy by design (PbD)
and privacy engineering.
• The goal of privacy by design is to take privacy requirements into account throughout the system
development process, from the conception of a new IT system through detailed system design,
implementation, and operation.
o Privacy requirements: These are system requirements that have privacy
relevance. System privacy requirements define the protection capabilities
provided by the system, the performance and behavioral characteristics
exhibited by the system, and the evidence used to determine that the system
privacy requirements have been satisfied. Privacy requirements are derived from
various sources, including laws, regulations standards and stakeholder
expectations.
Figure 1: Information Privacy Development Life Cycle
Figure 1 provides an overview of the major activities and tasks involved in integrating information
privacy protection into any information system developed by an organization. The upper part of the
figure encompasses design activities that determine what is needed and how to satisfy requirements.
The lower part of the figure deals with the implementation and operation of privacy features as part of
the overall system.
Privacy Engineering
• Privacy engineering involves taking account of privacy during the entire life cycle of ICT
(information and communications technology) systems
• Privacy engineering focuses on implementing techniques that decrease privacy risks and enables
organizations to make purposeful decisions about resource allocation and effective
implementation of controls in information systems
• Figure 1 indicates that privacy engineering encompasses the implementation, deployment, and
ongoing operation and management of privacy features and controls in systems
• Privacy engineering involves both technical capabilities and management processes. The primary
goals of privacy engineering are to:
o Incorporate functionality and management practices to satisfy privacy requirements
o Prevent compromise of PII
o Mitigate the impact of breach of personal data.
• Privacy engineering is often used to encompass privacy-related activities throughout the system
development life cycle. An example of this is shown in Figure 3.
o Assess risk based on assets, threats, vulnerabilities, and existing controls. From these
inputs, determine impact and likelihood and then the level of risk.
o Identify potential security controls to reduce risk, prioritize their use, and select controls
for implementation.
o Allocate resources, roles, and responsibilities and implement controls.
o Monitor and evaluate risk treatment effectiveness.
Privacy requirements are system requirements that have privacy relevance. System privacy
requirements define the protection capabilities provided by the system, the performance and behavioral
characteristics exhibited by the system, and the evidence used to determine that the system privacy
requirements have been satisfied. Privacy requirements are derived from various sources, including laws,
regulations, standards, and stakeholder expectations.
Privacy impact assessment (PIA) is an analysis of how information is handled: to ensure handling
conforms to applicable legal, regulatory, and policy requirements regarding privacy; to determine the
risks and effects of collecting,
maintaining, and to examine and evaluate protections and alternative processes for handling information
to mitigate potential privacy risks. In essence, PIA consists of a privacy risk assessment followed by a
selection of privacy and security controls to reduce the risk.
Privacy engineering and security objectives focus on the types of capabilities the system needs to
demonstrate the implementation of an organization's privacy policies and system privacy requirements.