SlideShare une entreprise Scribd logo
1  sur  12
Privacy by Design (PbD)
Connecting the dots between legal and technology
by Advocate Alon Saposhnik and Initech Software Services Ltd,
November, 2016
Main players
● “Data Subject” -An Individual who is the subject of personal data.
● “Personal data” - any information relating to an identified or identifiable natural person
● “Sensitive data” (according to the Israeli Privacy Laws) - includes “details concerning an
individual’s personality, intimate relations, health condition, financial condition, opinions
and religious belief”.
● “Controller” - is the one that is responsible for the compliance with the data protection
regulations.
● “Processor” - is the one that is only responsible for processing personal data and is
acting on behalf of the controller and according to its instructors.
● “Regulator” - Data Protection Authority (e.g, ILITA, information commissioner office
etc.)
Guiding principles of PBD (Privacy by Design)
1. Proactive not reactive ; Preventative not remedial
2. Privacy as the Default
3. Privacy Embedded into Design.
4. Full Functionality; Positive-Sum not Zero-Sum.
5. End-to-End Lifecycle Protection.
6. Visibility and Transparency.
7. Respect for User Privacy
Who’s affected?
● Developers
● Companies using third party apps / software / hosting as a part of their
product / service
● Data Controllers
● Data Processors
● Others?
Implementation - legal considerations
1. Infrastructure providers located outside of the EU territory - do they comply
with privacy regulations or do they offer to sign on Model Clause (or Data
Processing Addendum)?
2. Service providers located outside of the EU (Marketing, R&D) - sign on Model
Clause when transferring data abroad
3. NDA agreements with workers and service providers to assure privacy
compliance.
4. Information security - get ISO certificate for working with global companies
Implementation - applicative considerations
1. Privacy Policies
2.Israeli Privacy Law requires registration of certain databases with
the Database Registrar
3. Data Protection Certification - for demonstrating compliance with Data
Protection Regulation by controllers and processors
4. Conduct Privacy Impact Assessment
5. Internal Training Programs
Implementation - examples
● Privacy policy + confirmation for designated actions (account creation, etc.)
● Newsletters / promotion correspondence establish an opt-in mechanism according to
Privacy law and the Anti-Spam Law requirements
● Infrastructure for personal data retrieval and erasure (blacklisting erased data to be
filtered out during recovery from backups)
● Back office with multiple levels of access to Personal data of Users (each role has
access only to need-to-know data + protocols of handling data)
● Hosting location selection - EU or approved location by EU (Israel is approved)
● Managing the list of 3rd parties that receive access to User’s personal data (including
appropriate permissions model).
Typical privacy issues in mobile / web applications
Collecting unnecessary sensitive data during sign-up
Failure to get approval for TOS / receiving emails during sign-up (Privacy and
Anti-Spam Laws)
Blind selection of data center in USA
Unintentional exposure of sensitive data when using 3rd party integrations (i.e.,
using Messenger to collect personal data exposes it to Facebook)
Development / testing environments are replicated from production data without
Implementation - takeouts and challenges for PBD
Big advantage for EU / Israel-based providers
High risk of working with providers based outside of the EU and in such places
as East-Europe / Asia (Belarus, Ukraine, India, China, Russia) where EU
privacy regulations does not apply and thus impossible to enforce
Which Criteria should we implement as a minimum default privacy by design
How to raise privacy awareness in development phase of new products.
At what stage should we involve a privacy specialist.
Case studies of privacy lawsuits - in Israel
● Local Israeli App (Sync.Me): was ordered by the regulator to erase all
personal data that were illegally collected on users. Activity in Israel has been
stopped.
● Data Rings (seller of databases): was ordered by court to erase all personal
data that was collected on individuals. Clients of the company who gained
access to the data were ordered to do the same.
● Israeli company (undisclosed) was fined 177,000 NIS for illegal commercial
use of personal data that as collected on individuals.
Case studies of privacy lawsuits - abroad
● The Hamburg regulator has ordered Facebook to halt its unlawful collection and storage of data belonging to 35
million German WhatsApp users. The Commissioner has also ordered that Facebook delete any data that they have
already collected from WhatsApp.
● £40,000 fine for healthcare organization that failed to protect patient's personal data: a general practitioner clinic that
revealed confidential details about a woman and her family to her estranged ex-partner was fined £40,000 by the
Information Commissioner.
● An EU lawmaker is calling for the European Commission to investigate dating app Tinder for potential breaches of
European data protection rules, because it uses personal data without explicit consent.
● The CNIL has issued an order giving Microsoft three months to make changes to its operating system in line with
French data protection law. According to the CNIL, Windows Store collects user data on all downloaded applications
without user consent or even awareness, monitoring the time spent on each app. Windows 10 also automatically
installs an advertising identifier, enabling Microsoft to monitor users' browsing to offer targeted ads. The CNIL will
only consider fining the company if it fails to make changes.
● Intelligent Lending, trading as Ocean Finance, was fined by the UK regulator after it sent seven million texts offering
a new credit card powered by a major lender.
Thank you for listening!
For technical questions: contact@initech.co.il
For legal questions: alon.saposhnik@sr-lawoffice.co.il

Contenu connexe

Tendances

Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
Cathy Dwyer
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
Ulf Mattsson
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'Connor
Paul O'Connor
 

Tendances (20)

Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignGDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'Connor
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 

En vedette

Privacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswPrivacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxsw
Kennisnet
 

En vedette (15)

React native
React nativeReact native
React native
 
Frankfurt accelerator Cyber & FinTech
Frankfurt accelerator Cyber & FinTechFrankfurt accelerator Cyber & FinTech
Frankfurt accelerator Cyber & FinTech
 
Chat bots for foodtech initech english
Chat bots  for foodtech   initech englishChat bots  for foodtech   initech english
Chat bots for foodtech initech english
 
Presentation product development and R&D for digital healthcare
Presentation product development and R&D for digital healthcarePresentation product development and R&D for digital healthcare
Presentation product development and R&D for digital healthcare
 
ChatBots solutions for smart cities
ChatBots solutions for smart citiesChatBots solutions for smart cities
ChatBots solutions for smart cities
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
 
Slides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalSlides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraal
 
Privacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswPrivacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxsw
 
COMMUNIQUE DES FAMILLES BELGACEM-BENHAMIMID & DE GUILLAUME DELBAR, MAIRE DE R...
COMMUNIQUE DES FAMILLES BELGACEM-BENHAMIMID & DE GUILLAUME DELBAR, MAIRE DE R...COMMUNIQUE DES FAMILLES BELGACEM-BENHAMIMID & DE GUILLAUME DELBAR, MAIRE DE R...
COMMUNIQUE DES FAMILLES BELGACEM-BENHAMIMID & DE GUILLAUME DELBAR, MAIRE DE R...
 
How to use collected data in the multi-channel approach?
How to use collected data in the multi-channel approach?How to use collected data in the multi-channel approach?
How to use collected data in the multi-channel approach?
 
ERGO: regulatory compliance to kick-start digital hybrid
ERGO: regulatory compliance to kick-start digital hybridERGO: regulatory compliance to kick-start digital hybrid
ERGO: regulatory compliance to kick-start digital hybrid
 
Waternomics Applications Platform - Water Apps for Everyone
Waternomics Applications Platform - Water Apps for EveryoneWaternomics Applications Platform - Water Apps for Everyone
Waternomics Applications Platform - Water Apps for Everyone
 
Waternomics Methodology Overview
Waternomics Methodology OverviewWaternomics Methodology Overview
Waternomics Methodology Overview
 
Shazam that water leak! Sensors and faults
Shazam that water leak! Sensors and faultsShazam that water leak! Sensors and faults
Shazam that water leak! Sensors and faults
 

Similaire à Privacy by design for startups: legal and technology

Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 

Similaire à Privacy by design for startups: legal and technology (20)

Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Board Priorities for GDPR Implementation
Board Priorities for GDPR ImplementationBoard Priorities for GDPR Implementation
Board Priorities for GDPR Implementation
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...
 
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Data protection for Lend.io - legal analysis by Bird and Bird
Data protection for Lend.io - legal analysis by Bird and BirdData protection for Lend.io - legal analysis by Bird and Bird
Data protection for Lend.io - legal analysis by Bird and Bird
 
Prep your app for gdpr compliance
Prep your app for gdpr compliancePrep your app for gdpr compliance
Prep your app for gdpr compliance
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization  GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 

Plus de Ishay Tentser

Landing your dream hi tech job in post-covid israel
Landing your dream hi tech job in post-covid israelLanding your dream hi tech job in post-covid israel
Landing your dream hi tech job in post-covid israel
Ishay Tentser
 

Plus de Ishay Tentser (15)

CV Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)
CV  Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)CV  Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)
CV Template for Israeli Hi-Tech industry by Olim.Tech(jobs@olim.tech)
 
Landing your dream hi tech job in post-covid israel
Landing your dream hi tech job in post-covid israelLanding your dream hi tech job in post-covid israel
Landing your dream hi tech job in post-covid israel
 
Timelines ai transparency for remote business communication with customers ...
Timelines ai   transparency for remote business communication with customers ...Timelines ai   transparency for remote business communication with customers ...
Timelines ai transparency for remote business communication with customers ...
 
Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)
 
Template of questionnaire for horizon 2020 companies
Template of questionnaire for horizon 2020 companiesTemplate of questionnaire for horizon 2020 companies
Template of questionnaire for horizon 2020 companies
 
Digital innovation crash course
Digital innovation crash courseDigital innovation crash course
Digital innovation crash course
 
Horizon 2020 coaching plan for startups phase A
Horizon 2020 coaching plan for startups phase AHorizon 2020 coaching plan for startups phase A
Horizon 2020 coaching plan for startups phase A
 
Crypto and blockchain crash course
Crypto and blockchain crash courseCrypto and blockchain crash course
Crypto and blockchain crash course
 
Cashless economy(Mobile payments,digital coin,blockchain)
Cashless economy(Mobile payments,digital coin,blockchain)Cashless economy(Mobile payments,digital coin,blockchain)
Cashless economy(Mobile payments,digital coin,blockchain)
 
How augmented reality is reshaping advertising
How augmented reality is reshaping advertisingHow augmented reality is reshaping advertising
How augmented reality is reshaping advertising
 
V - Commerce
V - CommerceV - Commerce
V - Commerce
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0
 
Welcome to the VR revolution
Welcome to the VR revolutionWelcome to the VR revolution
Welcome to the VR revolution
 
Onboarding Israeli startup ecosystem
Onboarding Israeli  startup ecosystemOnboarding Israeli  startup ecosystem
Onboarding Israeli startup ecosystem
 
Organizational messenger solution
Organizational messenger solutionOrganizational messenger solution
Organizational messenger solution
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Privacy by design for startups: legal and technology

  • 1. Privacy by Design (PbD) Connecting the dots between legal and technology by Advocate Alon Saposhnik and Initech Software Services Ltd, November, 2016
  • 2. Main players ● “Data Subject” -An Individual who is the subject of personal data. ● “Personal data” - any information relating to an identified or identifiable natural person ● “Sensitive data” (according to the Israeli Privacy Laws) - includes “details concerning an individual’s personality, intimate relations, health condition, financial condition, opinions and religious belief”. ● “Controller” - is the one that is responsible for the compliance with the data protection regulations. ● “Processor” - is the one that is only responsible for processing personal data and is acting on behalf of the controller and according to its instructors. ● “Regulator” - Data Protection Authority (e.g, ILITA, information commissioner office etc.)
  • 3. Guiding principles of PBD (Privacy by Design) 1. Proactive not reactive ; Preventative not remedial 2. Privacy as the Default 3. Privacy Embedded into Design. 4. Full Functionality; Positive-Sum not Zero-Sum. 5. End-to-End Lifecycle Protection. 6. Visibility and Transparency. 7. Respect for User Privacy
  • 4. Who’s affected? ● Developers ● Companies using third party apps / software / hosting as a part of their product / service ● Data Controllers ● Data Processors ● Others?
  • 5. Implementation - legal considerations 1. Infrastructure providers located outside of the EU territory - do they comply with privacy regulations or do they offer to sign on Model Clause (or Data Processing Addendum)? 2. Service providers located outside of the EU (Marketing, R&D) - sign on Model Clause when transferring data abroad 3. NDA agreements with workers and service providers to assure privacy compliance. 4. Information security - get ISO certificate for working with global companies
  • 6. Implementation - applicative considerations 1. Privacy Policies 2.Israeli Privacy Law requires registration of certain databases with the Database Registrar 3. Data Protection Certification - for demonstrating compliance with Data Protection Regulation by controllers and processors 4. Conduct Privacy Impact Assessment 5. Internal Training Programs
  • 7. Implementation - examples ● Privacy policy + confirmation for designated actions (account creation, etc.) ● Newsletters / promotion correspondence establish an opt-in mechanism according to Privacy law and the Anti-Spam Law requirements ● Infrastructure for personal data retrieval and erasure (blacklisting erased data to be filtered out during recovery from backups) ● Back office with multiple levels of access to Personal data of Users (each role has access only to need-to-know data + protocols of handling data) ● Hosting location selection - EU or approved location by EU (Israel is approved) ● Managing the list of 3rd parties that receive access to User’s personal data (including appropriate permissions model).
  • 8. Typical privacy issues in mobile / web applications Collecting unnecessary sensitive data during sign-up Failure to get approval for TOS / receiving emails during sign-up (Privacy and Anti-Spam Laws) Blind selection of data center in USA Unintentional exposure of sensitive data when using 3rd party integrations (i.e., using Messenger to collect personal data exposes it to Facebook) Development / testing environments are replicated from production data without
  • 9. Implementation - takeouts and challenges for PBD Big advantage for EU / Israel-based providers High risk of working with providers based outside of the EU and in such places as East-Europe / Asia (Belarus, Ukraine, India, China, Russia) where EU privacy regulations does not apply and thus impossible to enforce Which Criteria should we implement as a minimum default privacy by design How to raise privacy awareness in development phase of new products. At what stage should we involve a privacy specialist.
  • 10. Case studies of privacy lawsuits - in Israel ● Local Israeli App (Sync.Me): was ordered by the regulator to erase all personal data that were illegally collected on users. Activity in Israel has been stopped. ● Data Rings (seller of databases): was ordered by court to erase all personal data that was collected on individuals. Clients of the company who gained access to the data were ordered to do the same. ● Israeli company (undisclosed) was fined 177,000 NIS for illegal commercial use of personal data that as collected on individuals.
  • 11. Case studies of privacy lawsuits - abroad ● The Hamburg regulator has ordered Facebook to halt its unlawful collection and storage of data belonging to 35 million German WhatsApp users. The Commissioner has also ordered that Facebook delete any data that they have already collected from WhatsApp. ● £40,000 fine for healthcare organization that failed to protect patient's personal data: a general practitioner clinic that revealed confidential details about a woman and her family to her estranged ex-partner was fined £40,000 by the Information Commissioner. ● An EU lawmaker is calling for the European Commission to investigate dating app Tinder for potential breaches of European data protection rules, because it uses personal data without explicit consent. ● The CNIL has issued an order giving Microsoft three months to make changes to its operating system in line with French data protection law. According to the CNIL, Windows Store collects user data on all downloaded applications without user consent or even awareness, monitoring the time spent on each app. Windows 10 also automatically installs an advertising identifier, enabling Microsoft to monitor users' browsing to offer targeted ads. The CNIL will only consider fining the company if it fails to make changes. ● Intelligent Lending, trading as Ocean Finance, was fined by the UK regulator after it sent seven million texts offering a new credit card powered by a major lender.
  • 12. Thank you for listening! For technical questions: contact@initech.co.il For legal questions: alon.saposhnik@sr-lawoffice.co.il

Notes de l'éditeur

  1. Target group: digital health,FinTech,Telecom,HR startups. Round A funds Audience: CEO/CTO/Co-founder
  2. Example: HR database which includes data such as employee’s salary, benefits, bank accounts is considered to be a Sensitive Data. The holder/owner of a database which contain Sensitive Data, must register the database at the local regulator.