Ray Najem
Sales Representative & Webmaster
Despite its long-standing recognition among EU member states, there remains uncertainty about the exact meaning, vague guidelines, and implementation of Privacy by Design (PbD). Privacy by Design has been frequently discussed in the context of the General Data Protection Regulation (GDPR), but never properly implemented. The GDPR emphasizes that responsible entities like TOMs (Technical and Organizational Measures) must define the means for processing data early in the design process to meet the principles of "Privacy by Design."
When was the term "Privacy by Design" coined? How far along are we from having a common understanding of what it should entail? And what are the current principles it entails?
We interestingly know where the term computer bugs came from (For those who don't know, read on through this link, so why not learn where PbD came from? Before the concept of PbD was first proposed in the 1990s by Dr. Ann Cavoukian, who was the former Information and Privacy Commissioner of Ontario, Canada. She envisioned a world where privacy is embedded into every step of the way into technology, business practices, and networked infrastructure.
Dr. Cavoukian had been newly appointed as Privacy Commissioner, she worked a lot with lawyers who traditionally applied the law where there was a problem or a data breach. While she found the work already being done important, she also found that there could be ways to prevent the privacy harms from the source. In only three nights, she developed PbD, and took it to work to convince the lawyers as to how it could complement the regulatory compliance they already have set. This was taken from the interview "Talking with Dr. Ann Cavoukian, Privacy by Design inventor".
Privacy by Design is a proactive approach to privacy that aims to embed data protection into the technology itself at the outset, rather than taking a reactive approach. The proactive nature of PbD involves anticipating security risks that might not be so obvious and assessing the risks they pose before an issue or breach occurs. The integration of PbD into IT systems, business practices, operations, and network infrastructure emphasizes that privacy is not an optional or separate element but a solution from within. This integration ensures that privacy considerations are a standard part of the decision-making process in everything from software development to business processes and systems operations.
TOMs are a crucial aspect of this integration, providing the necessary tools and protocols to enforce privacy principles at every level of an organization.
Technical and Organizational Measures (TOMs) are essential strategies and practices that organizations implement to ensure data protection and security. These measures encompass a wide range of actions, from technological solutions like encryption and access controls to organizational practices such as policies, procedures, and employee training. TOMs are closely related to Privacy by Design (PbD) as they provide the necessary tools and protocols to enforce privacy principles at every level of an organization. Although this article focuses on the foundational principles and implementation of PbD, a future article will delve deeper into TOMs and their role in data protection.
To learn more about the intricacies of the foundational principles, we recommend reading this paper written by Dr. Ann Cavoukian herself.
Privacy by Design remains an important framework that ensures the integration of privacy and data protection directly into the fabric of technologies and business practices. While we wait for a definitive common guideline to emerge, the current Privacy by Design framework ensures that we are on the right track. Any added security is peace of mind added and shouldn't be taken for granted. This article covered what PbD means, its origin, and founding principles. The upcoming articles will be more practical and will delve into how companies can implement these principles in practice. In a future article, we will explore TOMs in more detail and discuss their critical role in data protection. Stay tuned.