privacy tools and techniques for developers
play

Privacy Tools and Techniques for Developers -Amber Welch - PowerPoint PPT Presentation

Privacy Tools and Techniques for Developers -Amber Welch bit.ly/2x1UXWX Amber Welch MA, CISSP, CISA, CIPP/E, CIPM, FIP, CCSK, and ISO 27001 Lead Auditor linkedin.com/in/amberwelch1 github.com/msamberwelch @MsAmberWelch bit.ly/2WRAGh8


  1. Privacy Tools and Techniques for Developers -Amber Welch bit.ly/2x1UXWX

  2. Amber Welch MA, CISSP, CISA, CIPP/E, CIPM, FIP, CCSK, and ISO 27001 Lead Auditor linkedin.com/in/amberwelch1 github.com/msamberwelch @MsAmberWelch bit.ly/2WRAGh8

  3. ● Privacy Engineering Intro ● Privacy by Design ● Privacy Enhancing Technologies bit.ly/2WXJTcR

  4. First, an apology. bit.ly/2x1UXWX

  5. Legal teams have often kept tech out of privacy. bit.ly/2ZBiEBz

  6. Developers don’t know privacy concepts. Privacy teams haven’t taught them. bit.ly/2J3yEWn

  7. Privacy Impact Assessment bit.ly/2x1UXWX

  8. Description A Privacy Impact Assessment (PIA) is a method to: ● Identify privacy risk ● Map personal data flows ● Document privacy risk mitigations ● Fulfill regulatory requirements bit.ly/2KmuLyI

  9. bit.ly/2x7BlRh

  10. Use Cases ● New applications ● Adding functions and features ● Collecting new sensitive personal data ● Annual reviews or audits

  11. Tasting Notes Benefits ● Legal compliance ● Identify and reduce privacy risks ● Catch privacy errors bit.ly/2qbrnu5

  12. Tasting Notes Benefits Limitations ● Legal compliance ● High time investment ● Identify and reduce ● Ineffective if not privacy risks completed well ● Catch privacy errors ● Not a security risk assessment bit.ly/2qbrnu5

  13. Data Minimization and Retention bit.ly/2x1UXWX

  14. Description Data minimization is: ● Collecting only necessary data ● Maintaining and updating data ● Deleting old data that isn’t needed bit.ly/2KmuLyI

  15. Use Cases ● New applications ● API integrations ● Adding functions and features ● Collecting new personal data ● Customer termination

  16. Tasting Notes Benefits ● Legal compliance ● Minimize volume of data to be breached ● Improve data quality bit.ly/2qbrnu5

  17. Tasting Notes Benefits Limitations ● Legal compliance ● Users may be frustrated ● Minimize volume of data ● Companies like to keep to be breached all the data ● Improve data quality bit.ly/2qbrnu5

  18. Default Settings bit.ly/2x1UXWX

  19. Description Default settings for privacy should: ● Minimize personal data collected ● Prevent default data sharing ● Require enabling of intrusive settings ● Avoid making data public by default bit.ly/2KmuLyI

  20. Less than 5% of general users change any default settings, while programmers change 40% of settings. bit.ly/2UmLXEP

  21. bit.ly/2Hic0qm

  22. bit.ly/2Yg4i9D

  23. Tasting Notes Benefits ● Reputation for privacy ● Reduce user frustration ● Protect less educated users bit.ly/2qbrnu5

  24. Tasting Notes Benefits Limitations ● Legal compliance ● Companies may want to ● Reputation for privacy monetize intrusive apps ● Reduce user frustration ● Requires privacy ● Protect less educated awareness at design users bit.ly/2qbrnu5

  25. Encryption bit.ly/2x1UXWX

  26. Encrypt these: ● TLS ● Email and messaging ● Databases ● Cloud storage ● Backups ● Password management ● Endpoint devices bit.ly/2qbrnu5

  27. Don’t: ● Make your own crypto ● Use deprecated crypto (i.e., SHA1) ● Hard code keys ● Store keys on the same server as the data ● Use one key for everything ● Skip password hash and salt ● Forget to restore certificates after testing ● Use old crypto libraries bit.ly/2qbrnu5

  28. Differential Privacy bit.ly/2x1UXWX

  29. Description Differential privacy: ● Adds statistical noise to a data set ● Prevents identification of one individual’s record ● Provides the same results as the raw data would, with or without one record bit.ly/2KmuLyI

  30. bit.ly/2IwDufR

  31. bit.ly/2Pk7fEG

  32. bit.ly/2Pk7fEG

  33. Tasting Notes Benefits ● Limit insider threats ● Increase data usability ● Allows for collaboration without exposing data bit.ly/2qbrnu5

  34. Tasting Notes Benefits Limitations ● Legal compliance ● Works best on large ● Limit exposure from databases security incidents ● Must be tuned well ● Limit insider threats bit.ly/2qbrnu5

  35. Privacy Preserving Ad Click Attribution bit.ly/2x1UXWX

  36. Description Privacy preserving ad click attribution: ● Allows ad attribution monetization ● Prevents user ad click tracking ● Uses the browser to mediate ad clicks bit.ly/2KmuLyI

  37. bit.ly/30FFBoj

  38. bit.ly/30FFBoj

  39. Available now as an experimental feature bit.ly/30FFBoj

  40. Tasting Notes Benefits ● Allows websites to still monetize content ● Could become a W3C web standard bit.ly/2qbrnu5

  41. Tasting Notes Benefits Limitations ● Allows websites to still ● Needs widespread monetize content adoption to be effective ● Could become a W3C ● Users may not believe web standard any ads respect privacy bit.ly/2qbrnu5

  42. Federated Learning bit.ly/2x1UXWX

  43. Description Federated learning: ● Trains a central model on decentralized data ● Never transmits device data ● Sends iterative model updates to devices which return new results ● Uses secure aggregation to decrypt only the aggregate and no user data bit.ly/2KmuLyI

  44. bit.ly/2J4Fx9H

  45. bit.ly/2J4Fx9H

  46. Use Cases ● Android’s Gboard prediction model ● Health diagnostics ● Behavioral preference learning ● Driver behavior

  47. Tasting Notes Benefits ● Speeds up modeling and testing ● Minimally intrusive ● Individual data is not accessible to the central model bit.ly/2qbrnu5

  48. Tasting Notes Benefits Limitations ● Speeds up modeling ● Errors could cause and testing private data leakage ● Minimally intrusive ● Requires a large user ● Individual data is not base accessible to the central model bit.ly/2qbrnu5

  49. Homomorphic Encryption bit.ly/2x1UXWX

  50. Description Homomorphic encryption: ● Allows computation on ciphertext ● Enables collaboration without disclosing confidential data ● Only the calculation results can be decrypted bit.ly/2KmuLyI

  51. bit.ly/2WWvkB4

  52. Use Cases ● Computations on data shared across organizations ● Research using highly sensitive records ● Processing by employees with a lower clearance ● Google’s open source Private Join and Compute

  53. Tasting Notes Benefits ● Reduces insider threat ● Increases collaboration ● Increases data usability bit.ly/2qbrnu5

  54. Tasting Notes Benefits Limitations ● Reduces insider threat ● Resource-intensive ● Increases collaboration ● Limited functions ● Increases data usability ● No fully homomorphic encryption available yet bit.ly/2qbrnu5

  55. Becoming a Privacy Champion bit.ly/2x1UXWX

  56. Amber Welch MA, CISSP, CISA, CIPP/E, CIPM, FIP, CCSK, and ISO 27001 Lead Auditor linkedin.com/in/amberwelch1 github.com/msamberwelch @MsAmberWelch bit.ly/2WRAGh8

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend