2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2018
DOI: 10.1109/eurospw.2018.00021
|View full text |Cite
|
Sign up to set email alerts
|

Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering

Abstract: In this position paper we posit that, for Privacy by Design to be viable, engineers must be effectively involved and endowed with methodological and technological tools closer to their mindset, and which integrate within software and systems engineering methods and tools, realizing in fact the definition of Privacy Engineering. This position will be applied in the soon-tostart PDP4E project, where privacy will be introduced into existent general-purpose software engineering tools and methods, dealing with (ris… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(27 citation statements)
references
References 17 publications
0
26
0
1
Order By: Relevance
“…After that, the threats are identified and risks estimated. Afterwards, risks are evaluated and prioritized in order to identify data protection solutions and countermeasures to mitigate the risks (Tikkinen-Piri et al, 2018;Martín and Kung, 2018). Finally, these measures are communicated to the Supervisory Authorities in order to obtain approval, the so called "prior consultation".…”
Section: Data Protection Impact Assessmentmentioning
confidence: 99%
“…After that, the threats are identified and risks estimated. Afterwards, risks are evaluated and prioritized in order to identify data protection solutions and countermeasures to mitigate the risks (Tikkinen-Piri et al, 2018;Martín and Kung, 2018). Finally, these measures are communicated to the Supervisory Authorities in order to obtain approval, the so called "prior consultation".…”
Section: Data Protection Impact Assessmentmentioning
confidence: 99%
“…There were two principles that were found in each law, notice and use restriction. Other frequently occurring principles include: quality (13 laws), retention (12), minimization (12), security (12), enforcement (12), access (10), consent (10), participation (10), transparency (10), and disclosure (8). There were four principles that each only appeared in the law of one country: information flow, context, identifiability, and consolidation.…”
Section: Discussionmentioning
confidence: 99%
“…These discussions, however, cannot be localized as data privacy is an international issue [5][6][7]. The world is creating privacy methods and tools to protect privacy [8], working to integrate privacy and technology [9], and outlining key activities which must occur to keep a digital investigation private [10]. Common understanding of privacy is critical when moving forward in a world of international community.…”
Section: Introductionmentioning
confidence: 99%
“…Privacy by design concept [94] emphasizes on the proactive role of data controllers and processors in addressing the privacy aspects of associated systems not only during the full life cycle of each system, but also throughout the design and planning phases. While the paradigm of privacy by design is not new, it has recently gained increasing attention from researchers and the industry due to the adherence of the General Data Protection Regulation (GDPR) to this concept [95]. While some studies (e.g., [96][97] [98]) have applied the principles of privacy by design to the ITS domain, there still remains a wide gap between the state of the art and satisfying the privacy requirements of GDPR in ITS technologies [99].…”
Section: Privacy By Designmentioning
confidence: 99%