{"id":196,"date":"2007-10-10T00:26:04","date_gmt":"2007-10-09T23:26:04","guid":{"rendered":"http:\/\/www.thetawelle.de\/?p=196"},"modified":"2009-10-06T09:09:14","modified_gmt":"2009-10-06T08:09:14","slug":"privacy-by-design-the-7-privacy-%e2%80%93-embedded-laws","status":"publish","type":"post","link":"https:\/\/www.thetawelle.de\/?p=196","title":{"rendered":"Privacy by Design: The 7 Privacy \u2013 Embedded Laws"},"content":{"rendered":"<p><img src='\/wp-upload\/csclogo.gif' alt='csclogo.gif' class=\"alignright\" \/>Today I payed very close attention towards a <a href=\"http:\/\/csclub.uwaterloo.ca\/media\/Privacy%20by%20Design.html\">presentation<\/a> held by <strong>Dr. Ann Cavoukian<\/strong> (Information and Privacy Commissioner of Ontario) at the <a href=\"http:\/\/csclub.uwaterloo.ca\/\">Computer Science Club<\/a> of the <strong>University of Waterloo\/Canada<\/strong> where she explains <strong>&#8222;how to design software that properly protects users privacy&#8220;<\/strong>. She has also published the book entitled &#8222;Who Knows: Safeguarding Your Privacy in a Networked World.&#8220; about these questions (see a <a href=\"http:\/\/www.techsoc.com\/whoknows.htm\">Review<\/a>).<\/p>\n<p>She differentiates the terms &#8222;Privacy&#8220; and &#8222;Security&#8220; and emphasizes that security and privacy are <strong>NOT<\/strong> a zero-sum-game but can be designed to be a win-win-situation. I summed up her core statements graphically below.<\/p>\n<p><center><a href=\"\/wp-upload\/privacy_security_big.jpg\"><img src='\/wp-upload\/privacy_security_mini.jpg' alt='privacy_security_big.jpg' class=\"aligncentered\" \/><\/a><br \/>\n<small>The 7 Laws of Embedded Privacy (Click image to zoom!)<\/small><\/center><\/p>\n<p>Interestingly she also refers to the german law of informational selfdetermination and refers to germany as a leader in data protection. She speaks about identity theft, and that there would be much less problems with it, if data was encrypted in databases.<br \/>\n(via <a href=\"http:\/\/yro.slashdot.org\/article.pl?sid=07\/10\/07\/0625216\">slashdot.org<\/a>)<\/p>\n<p>See her full presentation captured on video <a href=\"http:\/\/csclub.uwaterloo.ca\/media\/Privacy%20by%20Design.html\">here<\/a>:<br \/>\n<center><script type=\"text\/javascript\" src=\"http:\/\/csclub.uwaterloo.ca\/flash\/swfobject.js\"> <\/script><\/p>\n<p id=\"player1\"><a href=\"http:\/\/www.macromedia.com\/go\/getflashplayer\">Get the Flash Player<\/a> to see this video using Flash Player.<\/p>\n<p><script type=\"text\/javascript\">\n    var s1 = new SWFObject(\"http:\/\/csclub.uwaterloo.ca\/flash\/flvplayer.swf\",\"single\",\"400\",\"300\",\"7\");\n    s1.addParam(\"allowfullscreen\",\"true\");\n    s1.addVariable(\"file\",\"http:\/\/csclub.uwaterloo.ca\/files\/privacy.flv\");   \n    s1.write(\"player1\");\n  <\/script><\/center><br \/>\n<small><strong>Why do I blog this?<\/strong> I think public and private IT has to find the best solution to protect the data of users to secure their business &#038; future. I like to compare this with automobiles which got airbags to increase the security, the same kind of &#8222;airbag&#8220;-solution seems to be necessary for data-protection. Noone needs to get injured in his\/her &#8222;privacy&#8220; if there happpens to be some data-leakage or data-theft if some kind of encryption-airbag protects the users data in a data-crash-scenario.<\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today I payed very close attention towards a presentation held by Dr. Ann Cavoukian (Information and Privacy Commissioner of Ontario) at the Computer Science Club of the University of Waterloo\/Canada where she explains &#8222;how to design software that properly protects users privacy&#8220;. She has also published the book entitled &#8222;Who Knows: Safeguarding Your Privacy in &hellip; <a href=\"https:\/\/www.thetawelle.de\/?p=196\" class=\"more-link\"><span class=\"screen-reader-text\">\u201ePrivacy by Design: The 7 Privacy \u2013 Embedded Laws\u201c <\/span>weiterlesen<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,67,2],"tags":[],"class_list":["post-196","post","type-post","status-publish","format-standard","hentry","category-best-practice","category-english","category-gefunden"],"_links":{"self":[{"href":"https:\/\/www.thetawelle.de\/index.php?rest_route=\/wp\/v2\/posts\/196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thetawelle.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thetawelle.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thetawelle.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thetawelle.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=196"}],"version-history":[{"count":0,"href":"https:\/\/www.thetawelle.de\/index.php?rest_route=\/wp\/v2\/posts\/196\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.thetawelle.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thetawelle.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thetawelle.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}