Privacy By
Design Certification
Privacy by Design Certification is offered by the Privacy by Design Centre of Excellence at Ryerson University in Toronto. Companies that have achieved this certification are meeting the highest standards of a globally recognized privacy standard.
THE 7 FOUNDATIONAL PRINCIPLES OF CERTIFICATION
-
PRINCIPLE
1
PROACTIVE, NOT REACTIVE; PREVENTATIVE, NOT REMEDIAL
The Privacy by Design (PbD) framework is characterized by the taking of proactive rather than reactive measures. It anticipates the risks and prevents privacy invasive events before they occur. PbD does not wait for privacy risks to materialize, nor does it offer remedies for resolving privacy infractions once they have occurred — it aims to identify the risks and prevent the harms from arising. In short, Privacy by Design comes before-the-fact, not after.
-
PRINCIPLE
2
PRIVACY AS THE DEFAULT SETTING
We can all be certain of one thing – the default rules! Privacy by Design seeks to deliver the maximum degree of privacy by ensuring that personal data are automatically protected in any given IT system or business practice, as the default. If an individual does nothing, their privacy still remains intact. No action is required on the part of the individual in order to protect their privacy – it is already built into the system, by default.
-
PRINCIPLE
3
PRIVACY EMBEDDED INTO DESIGN
Privacy measures are embedded into the design and architecture of IT systems and business practices. These are not bolted on as add-ons, after the fact. The result is that privacy becomes an essential component of the core functionality being delivered. Privacy is thus integral to the system, without diminishing functionality.
-
PRINCIPLE
4
FULL FUNCTIONALITY: POSITIVE SUM, NOT ZERO SUM
Privacy by Design seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner, not through the dated, zero-sum (either/or) approach, where unnecessary trade-offs are made. Privacy by Design avoids the pretense of false dichotomies, such as privacy vs. security, demonstrating that it is indeed possible to have both.
-
PRINCIPLE
5
END-TO-END SECURITY: FULL LIFECYCLE PROTECTION
Privacy by Design, having been embedded into the system prior to the first element of information being collected, extends securely throughout the entire lifecycle of the data involved – strong security measures are essential to privacy, from start to finish. This ensures that all data are securely collected, used, retained, and then securely destroyed at the end of the process, in a timely fashion. Thus, Privacy by Design ensures cradle to grave, secure lifecycle management of information, end-to-end.
-
PRINCIPLE
6
VISIBILITY AND TRANSPARENCY: KEEP IT OPEN
Privacy by Design seeks to assure all stakeholders that whatever the business practice or technology involved, it is in fact, operating according to the stated promises and objectives, subject to independent verification. The data subject is made fully aware of the personal data being collected, and for what purpose(s). All the component parts and operations remain visible and transparent, to users and providers alike. Remember, trust but verify!
-
PRINCIPLE
7
RESPECT FOR USER PRIVACY: KEEP IT USER-CENTRIC
Above all, Privacy by Design requires architects and operators to keep the interests of the individual uppermost by offering such measures as strong privacy defaults, appropriate notice, and empowering user-friendly options. The goal is to ensure user-centred privacy in an increasingly connected world. Keep it user-centric.
Certified Companies



TELUS Communications
Ruby Corporation
Canadian National Insurance Crime Services (CANATICS)
How To Get Certified
-
Step 1
Apply
The Privacy by Design Certification process begins when your organization submits a Privacy by Design application which can be found here. The Privacy by Design Centre of Excellence reviews your application, and afterwards, your information is forwarded to our assessment partner to begin the assessment process.
-
Step 2
Assess
Assessment services will be carried out under a separate agreement where the product(s), the service(s) and/or the process(es) being certified will be assessed. A report will be issued based on the assessment methodology developed exclusively for the Privacy Certified Certification.
- Proactive not Reactive; Preventative not Remedial
- Privacy as the Default Setting
- Privacy Embedded into Design
- Full Functionality – Positive-Sum, not Zero-Sum
- End-to-End Security – Full Lifecycle Protection
- Visibility and Transparency – Keep it Open
- Respect for User Privacy – Keep it User-Centric
-
Step 3
Certify
After examining the assessment report, we will issue a decision as to whether the certification will be granted. The certified organization will get the certificate and will be listed on our website.
-
Step 4
Surveillance
Certifications are valid for a three-year period, but must be renewed annually. We will remind you in advance with all the details on how to keep your certification up-to-date.
-
Step 5
Annual Self-Declaration
An important part of renewing your certification is the annual self-declaration form in which your organization attests if there has been any change which would affect your certification.
-
Step 6
Renew
If PECB MS is satisfied with the annual self-declaration form, and upon the payment of the renewal fee, your Privacy by Design Certification is renewed for another year.
Learn More About Getting Certified
If you have questions about us, the certification process, or Privacy by Design in general, we’d love to hear from you. We’re always ready to hear from like-minded people who want a future filled with privacy, security, freedom, innovation and prosperity.