The Register - Security

IEEE Spectrum Computing Channel

Jan 14, 2015

Deciphering the landscape for Privacy by Design. ENISA publishes its recommendations for policy makers, data protection authorities and experts — ENISA

Jan 12, 2015
Deciphering the landscape for Privacy by Design. ENISA publishes its recommendations for policy makers, data protection authorities and experts
ENISA publishes today, 12th January 2015, a cutting edge report on Privacy and Data Protection by Design - from policy to engineering. The report aims to bridge the gap between the legal framework and the available technological implementation measures. It provides an inventory of the existing approaches and privacy design strategies, and the technical building blocks of various degree of maturity from research and development. Limitations and inherent constraints are presented with recommendations for their mitigation.
The study, targeted at data protection authorities, policy makers, regulaltors, engineers and researchers, offers an insight into the technological aspect of the current state of the art. It presents the challenges and limitations of by-design principles for privacy and data protection, acts as a reference guide, and intends to improve the effectiveness of future policy in the area.
The main challenges identified in the report are two fold:  
  • Existing policy doesn’t offer a guarantee for compliance with privacy by design. New policy should give incentives for adopting privacy by design.
  • New standards for electronic communication need to consider privacy and data protection, while privacy and data protection-ignorant standards should be out-phased.
Furthermore, privacy by design needs to be linked with the practice taking usability into account.
Deciphering the landscape for Privacy by Design. ENISA publishes its recommendations for policy makers, data protection authorities and experts — ENISA: Deciphering the landscape for Privacy by Design. ENISA publishes its recommendations for policy makers, data protection authorities and experts — ENISA

Help Net Security - News

Latest articles from SC Magazine UK

Here's a phish you might not spot - 60 Sec Security

Biggest Information Security and Cybersecurity Misconceptions

Computer History Museum Videos

Slashdot: Your Rights Online

Public Key Cryptography: Diffie-Hellman Key Exchange

InfoWorld Security

ComputerWeekly.com - When IT Meets Politics

Nextgov.com News Articles

Electronic Privacy Information Center

Cyberlaw - Stanford Center for Internet and Society

SecurityWeek

European Public Policy Blog