Privacy by Design: Principle 5 – End-to-end security: full lifecycle protection

Source: GPS by Design

Privacy by Design, having been embedded into the system prior to the first element of information being collected,
extends securely throughout the entire lifecycle of the data involved — strong security measures are essential to privacy, from start to finish. This ensures that all data are securely collected, used, retained, and then securely destroyed at the end of the process, in a timely fashion. Thus, Privacy by Design ensures cradle to grave, secure lifecycle management of information, end-to-end.

Facebook icon Twitter icon Linkedin icon E-mail icon

Privacy by Design: Principle 4 – Full functionality: positive-sum, not zero-sum

Source: GPS by Design

Privacy by Design seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner, not through the dated, zero-sum (either/or) approach, where unnecessary trade-offs are made. Privacy by Design avoids the pretence of false dichotomies, such as privacy vs. security, demonstrating that it is indeed possible to have both.

Facebook icon Twitter icon Linkedin icon E-mail icon

Privacy by Design: Principle 3 – Privacy embedded into design

Source: GPS by Design

Privacy measures are embedded into the design and architecture of IT systems and business practices. These are not bolted on as add-ons, after the fact. The result is that privacy becomes an essential component of the core functionality being delivered. Privacy is thus integral to the system, without diminishing functionality.

Facebook icon Twitter icon Linkedin icon E-mail icon

Privacy by Design: Principle 2 – Privacy as the default setting

Source: GPS by Design

We can all be certain of one thing — the default rules! Privacy by Design seeks to deliver the maximum degree of privacy by ensuring that personal data are automatically protected in any given IT system or business practice, as the default. If an individual does nothing, their privacy still remains intact. No action is required on the part of the individual in order to protect their privacy — it is already built into the system, by default.

Facebook icon Twitter icon Linkedin icon E-mail icon