<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://ipen.trialog.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=JoseDelAlamo</id>
	<title>IPEN Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://ipen.trialog.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=JoseDelAlamo"/>
	<link rel="alternate" type="text/html" href="https://ipen.trialog.com/wiki/Special:Contributions/JoseDelAlamo"/>
	<updated>2026-04-08T00:24:45Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.37.6</generator>
	<entry>
		<id>https://ipen.trialog.com/?title=Events&amp;diff=857</id>
		<title>Events</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Events&amp;diff=857"/>
		<updated>2017-11-10T15:56:29Z</updated>

		<summary type="html">&lt;p&gt;JoseDelAlamo: IWPE added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;1174&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| April 27, 2018&lt;br /&gt;
| 4th International Workshop on Privacy Engineering (IWPE)&lt;br /&gt;
| [http://iwpe.info [1]]&lt;br /&gt;
|-&lt;br /&gt;
| January 24-26, 2018&lt;br /&gt;
| CPDP Brussels&amp;lt;br/&amp;gt;&lt;br /&gt;
| [http://www.cpdpconferences.org/index.html http://www.cpdpconferences.org/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| June 9 2017&amp;lt;br/&amp;gt;&lt;br /&gt;
| 4th IPEN Workshop, Vienna&amp;lt;br/&amp;gt;&lt;br /&gt;
| [https://edps.europa.eu/node/4184 [1]]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| June 7-8 2017&amp;lt;br/&amp;gt;&lt;br /&gt;
| 5th Annual Privacy Forum, Vienna&amp;lt;br/&amp;gt;&lt;br /&gt;
| [http://privacyforum.eu/ [2]]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| June 05 2017&amp;lt;br/&amp;gt;&lt;br /&gt;
| NIST workshop:&amp;amp;nbsp;Privacy Risk Assessment: A Prerequisite for Privacy Risk Management&amp;lt;br/&amp;gt;&lt;br /&gt;
| [https://www.nist.gov/news-events/events/2017/06/privacy-risk-assessment-prerequisite-privacy-risk-management https://www.nist.gov/news-events/events/2017/06/privacy-risk-assessment-prerequisite-privacy-risk-management]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| May 25 2017&amp;lt;br/&amp;gt;&lt;br /&gt;
| 2017 International Workshop on Privacy Engineering – IWPE'17&lt;br /&gt;
| [https://ieee-security.org/TC/SPW2017/IWPE/index.html https://ieee-security.org/TC/SPW2017/IWPE/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| May 17-19 2017&amp;lt;br/&amp;gt;&lt;br /&gt;
| TILTing, Tilburg&amp;lt;br/&amp;gt;&lt;br /&gt;
| [https://www.tilburguniversity.edu/research/institutes-and-research-groups/tilt/events/tilting-perspectives/ https://www.tilburguniversity.edu/research/institutes-and-research-groups/tilt/events/tilting-perspectives/]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| May 9 2017&lt;br /&gt;
| EIC OASIS privacy engineering workshop&lt;br /&gt;
| [https://www.kuppingercole.com/events/eic2017-oasis https://www.kuppingercole.com/events/eic2017-oasis]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Jan 25-27 2017&amp;lt;br/&amp;gt;&lt;br /&gt;
| CPDP Brussels&amp;lt;br/&amp;gt;&lt;br /&gt;
| [http://www.cpdpconferences.org/index.html http://www.cpdpconferences.org/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Sept 9 2016&amp;lt;br/&amp;gt;&lt;br /&gt;
| 3rd IPEN workshop, Frankfurt&amp;lt;br/&amp;gt;&lt;br /&gt;
| [https://edps.europa.eu/node/3496 [3]]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Sept 7-8 2016&lt;br /&gt;
| 4th Annual Privacy Forum, Fra&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://privacyforum.eu/ http://privacyforum.eu/]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| May 2016&lt;br /&gt;
| IEEE International Workshop on Privacy Engineering&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://ieee-security.org/TC/SPW2016/IWPE/program.html http://ieee-security.org/TC/SPW2016/IWPE/program.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| January 27-29 2016&lt;br /&gt;
| 9th International conference, Computer Privacy &amp;amp; Data Protection conference, Brussels&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://www.cpdpconferences.org/ http://www.cpdpconferences.org/]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| October 23-26 2015&lt;br /&gt;
| Amsterdam privacy conference&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://www.apc2015.net/ http://www.apc2015.net/]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| October 7-8 2015&lt;br /&gt;
| 3rd Annual Privacy Forum, Luxemburg&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://privacyforum.eu/ http://privacyforum.eu/]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| August 31-September 1 2015&lt;br /&gt;
| CCC Privacy-by-design workshop, Pittsburgh&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://www.cra.org/ccc/visioning/visioning-activities/privacy-by-design http://www.cra.org/ccc/visioning/visioning-activities/privacy-by-design]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| July 8-9 2015&lt;br /&gt;
| &lt;br /&gt;
OASIS conference Ditton Manor UK&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;(Building trust in a hyperconnected world)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.oasis-open.org/events/hyperconnected-2015 https://www.oasis-open.org/events/hyperconnected-2015]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| June 5th 2015&lt;br /&gt;
| IPEN Workshop Leuven&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN/IPEN_Workshop_2015 https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN/IPEN_Workshop_2015]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>JoseDelAlamo</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=855</id>
		<title>Wiki for Privacy Standards and Privacy Projects</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=855"/>
		<updated>2017-11-10T15:53:47Z</updated>

		<summary type="html">&lt;p&gt;JoseDelAlamo: Added IWPE to the events list.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Objective of this Wiki&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
During the [https://secure.edps.europa.eu/EDPSWEB/edps/site/mySite/lang/en/IPEN_Workshop_2015 IPEN workshop held in Leuven on June 5th 2015], it was agreed that the IPEN community would benefit from the creation of a repository of information on activities related to privacy engineering initiatives and standards. The wiki was further extended in 2016 to cover privacy engineering projects&lt;br /&gt;
&lt;br /&gt;
The objective of this Wiki is to be a tool allowing stakeholders interested in privacy engineering and standardisation to find resources and to identify and seek harmonisation and convergence opportunities.&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Membership&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
IPEN members can register to this Wiki as contributors&amp;amp;nbsp;(i.e. providing information and comments on privacy standards activities).&lt;br /&gt;
&lt;br /&gt;
If you wish to contribute please read the [[Rules for Contribution|Rules for Contribution]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:medium&amp;quot;&amp;gt;'''Contact [[Special:Contact|Antonio Kung]] to become a contributor.'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Content of the wiki&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== This section contains an overview of the content and short explanations to the items. ===&lt;br /&gt;
&lt;br /&gt;
=== Privacy Standards ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;mw-collapsible mw-collapsed autocollapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Click expand to find links to information regarding various standardisation organizations and their work on privacy and data protection standards&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/ISO ISO], International Organization for Standardisation, has standards on e.g. Privacy Engineering or BigData&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/OpenId_Foundation_Activities OpenID Foundation]&amp;amp;nbsp;is a non-profit international standardization organization and has Workingroups regarding e.g. privacy and health related data&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/OASIS OASIS], Organization for the Advancement of Structured Information Standards, is e.g. working on Standards for Privacy Management Reference Model and Methodology.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/W3C_Activities W3C Activities], World Wide Web Consortium, has a privacy group working e.g. on Tracking Protection.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/IETF_Activities IETF Activities], Internet Engineering Taskforce, is working on the RFC 6973&amp;amp;nbsp;[https://tools.ietf.org/html/rfc6973 &amp;quot;Privacy Considerations for Internet Protocols&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The [https://ipen.trialog.com/wiki/IEEE_Activities IEEE Activities]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/ITU_Activities ITU Activities]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*There exist diverse&amp;amp;nbsp;[https://ipen.trialog.com/wiki/National_Level_Activities National Level Standards]&amp;amp;nbsp;regarding privacy, some with which IPEN members are invovled, can be found&amp;amp;nbsp;[http://ipen.trialog.com/wiki/National_Level_Activities here].&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The European commission has issued a mandate to&amp;amp;nbsp;[http://ipen.trialog.com/wiki/CEN-CENELEC-ETSI_Activities European Standardisation Organisations], ESOs, to work on standards relating to privacy management of security products and related services.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Privacy Engineering Projects ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;mw-collapsible mw-collapsed autocollapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Find in the following information on different projects that follow Privacy Engineering ideas such as privacy and data protection by design and by default.&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*With its&amp;amp;nbsp;[https://ipen.trialog.com/wiki/App_PETs APP Pets]&amp;amp;nbsp;project the&amp;amp;nbsp;[https://www.datenschutzzentrum.de/ Datenschutzzentrum (ULD)]&amp;amp;nbsp;is working on privacy enhancing technologies for smart device apps&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The goal of&amp;amp;nbsp;[https://ipen.trialog.com/wiki/AN_ON_Next AN.ON-Next]&amp;amp;nbsp;by the&amp;amp;nbsp;[https://www.datenschutzzentrum.de/ Datenschutzzentrum (ULD)]&amp;amp;nbsp;is to integrate processes for anonymization into the internet infrastructure.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/CREDENTIAL CREDENTIAL]&amp;amp;nbsp;project's goal is to enable end-to-end security and improved privacy in cloud identity management services for managing secure access control.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/DNT_Guide DNT Guide]&amp;amp;nbsp;aims at helping website owners to implement the Do Not Track (DNT) standard.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*With the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/PARIS PARIS]&amp;amp;nbsp;project sets out to define and demonstrate a methodological approach for the development of a surveillance infrastructure which enforces the right of citizens for privacy, justice and freedom.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The mission of&amp;amp;nbsp;[https://ipen.trialog.com/wiki/PRIPARE PRIPARE]&amp;amp;nbsp;is to facilitate the application of a privacy and security-by-design methodology and to foster a risk management culture through educational material.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/PRISMACLOUD PRISMACLOUD]&amp;amp;nbsp;produces tools to enable end-to-end security and thus allowing users to protect their privacy by cryptographic means.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Privacypatterns Privacypatterns]&amp;amp;nbsp;project provides building blocks for developers to advance privacy and data protection by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[https://ipen.trialog.com/wiki/Signatu Signatu]&amp;amp;nbsp;provides a service for companies to MAP their data processing activities, to create privacy policies and to track their users consent or consent withdrawal.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Other Privacy projects, Events and Presentations ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;mw-collapsible mw-collapsed autocollapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Find in the following an overview of other privacy projects and events&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*Multiple institutions have worked on&amp;amp;nbsp;[https://ipen.trialog.com/wiki/DPIA_and_PIA_Guidelines Guidelines]&amp;amp;nbsp;for Privacy and Data Protection Impact Assessments.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*You can find various&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Studies Studies on Privacy and DP here.]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/OWASP OWASP Top 10 Project]&amp;amp;nbsp;lists the current top 10 privacy risks.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Business_Process_CB Business Process Cookbook]&amp;amp;nbsp;is an open repository to integrate Privacy and DP by design into business processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*Privacy related&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Events Events]: see past and upcoming events in Europe&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Presentations Presentations]&amp;amp;nbsp;or interest on privacy&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*The [http://iwpe.info International Workshop on Privacy Engineering] is a yearly event to share and discuss the lates reaserch in the field.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger&amp;quot;&amp;gt;Content Overview table&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:75%;&amp;quot; align=&amp;quot;center&amp;quot; cellpadding=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;width: 30%; background-color: #00cccc&amp;quot; | &lt;br /&gt;
Privacy Standards&lt;br /&gt;
&lt;br /&gt;
! style=&amp;quot;width: 30%; background-color: #51AC41&amp;quot; | &lt;br /&gt;
Privacy Engineering Projects&lt;br /&gt;
&lt;br /&gt;
! style=&amp;quot;width: 30%; background-color: #efe662&amp;quot; | &lt;br /&gt;
Other Privacy Projects / Events / Presentations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #00cccc&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/ISO &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;ISO&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #51AC41&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/App_PETs &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;APP Pets&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #efe662&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/DPIA_and_PIA_Guidelines &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;DPIA and PIA guidelines&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #00cccc&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/OpenId_Foundation_Activities &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;OpenID Foundation&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #51AC41&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/AN_ON_Next &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;AN.ON-Next&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #efe662&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/Studies &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Studies&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #00cccc&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/OASIS &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;OASIS&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #51AC41&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/CREDENTIAL &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;CREDENTIAL&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #efe662&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/OWASP &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;OWASP&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #00cccc&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/W3C_Activities &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;W3C Activities&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #51AC41&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/DNT_Guide &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;DNT Guide&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #efe662&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/Business_Process_CB &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Business Process Cookbook&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #00cccc&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/IETF_Activities &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;IETF Activities&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #51AC41&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/PARIS &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PARIS&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #efe662&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/Events &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Events&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #00cccc&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/CEN-CENELEC-ETSI_Activities &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;CEN-CENELEC-ETSI&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #51AC41&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/PRIPARE &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PRIPARE&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #efe662&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/Presentations &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Presentations&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #00cccc&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/National_Level_Activities &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;National Level Standards&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #51AC41&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/PRISMACLOUD &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PRISMACLOUD&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #efe662&amp;quot; | &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #00cccc&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/IEEE_Activities &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;IEEE standards&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #51AC41&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/Privacypatterns &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Privacypatterns&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #efe662&amp;quot; | &lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #00cccc&amp;quot; | &lt;br /&gt;
*&amp;amp;nbsp;[https://ipen.trialog.com/wiki/ITU_Activities &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;ITU standards&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #51AC41&amp;quot; | &lt;br /&gt;
*[https://ipen.trialog.com/wiki/Signatu &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Signatu&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background-color: #efe662&amp;quot; | &lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;More on IPEN - Internet Privacy Engineering Network&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The purpose of IPEN ([http://www.engineeringprivacy.eu/ www.engineeringprivacy.eu]) is to bring together developers and data protection experts with a technical background from different areas in order to launch and support projects that build privacy into everyday tools and develop new tools which can effectively protect and enhance our privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:x-large&amp;quot;&amp;gt;Sponsors and Support&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This Wiki is sponsored by ''[https://trialog.com TRIALOG]'' and supported by the [http://pripareproject.eu/ PRIPARE] project&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;text-align: center; width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 50%&amp;quot; | [[File:LOGO TRIALOG 200 small 2.png|LOGO TRIALOG 200 small 2.png|link=http://www.trialog.com/]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| [[File:Logo Pripare-Large-clear.png|Logo Pripare-Large-clear.png|link=http://pripareproject.eu/]]&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>JoseDelAlamo</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Other_Activities&amp;diff=266</id>
		<title>Other Activities</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Other_Activities&amp;diff=266"/>
		<updated>2015-07-02T09:06:38Z</updated>

		<summary type="html">&lt;p&gt;JoseDelAlamo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This pages covers other activities which could be of interest: guidelines, studies, events&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Guidelines&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;EC &amp;lt;span style=&amp;quot;font-family: Verdana, Arial, Helvetica, 'DejaVu Sans', sans-serif; line-height: 14.3999996185303px;&amp;quot;&amp;gt;Data Protection Impact Assessment Template for &amp;lt;/span&amp;gt;Smart Grid and Smart Metering Systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Context&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-family: Verdana, Arial, Helvetica, 'DejaVu Sans', sans-serif; line-height: 14.3999996185303px;&amp;quot;&amp;gt;The Smart Grids Task Force was set up by the European Commission in 2009 to advise on issues related to smart grid deployment and development. One of the working group (WG2) is on security and privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-family: Verdana, Arial, Helvetica, 'DejaVu Sans', sans-serif; line-height: 14.3999996185303px;&amp;quot;&amp;gt;The EC has provided a &amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-family: Verdana, Arial, Helvetica, 'DejaVu Sans', sans-serif; line-height: 14.3999996185303px;&amp;quot;&amp;gt;Data Protection Impact Assessment Template for smart grid and smart metering systems.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-family: Verdana, Arial, Helvetica, 'DejaVu Sans', sans-serif; line-height: 14.3999996185303px;&amp;quot;&amp;gt;The EC has decided to have a two-year trial of the template starting from March 2015.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| URL&lt;br /&gt;
| &lt;br /&gt;
Smart grid task force: [http://ec.europa.eu/energy/en/topics/markets-and-consumers/smart-grids-and-meters http://ec.europa.eu/energy/en/topics/markets-and-consumers/smart-grids-and-meters]&lt;br /&gt;
&lt;br /&gt;
Test phase for template:&amp;amp;nbsp;[https://ec.europa.eu/energy/en/test-phase-data-protection-impact-assessment-dpia-template-smart-grid-and-smart-metering-systems https://ec.europa.eu/energy/en/test-phase-data-protection-impact-assessment-dpia-template-smart-grid-and-smart-metering-systems]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documents&lt;br /&gt;
| Template document:&amp;amp;nbsp;[https://ec.europa.eu/energy/sites/ener/files/documents/2014_dpia_smart_grids_forces.pdf https://ec.europa.eu/energy/sites/ener/files/documents/2014_dpia_smart_grids_forces.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
*Integrates lots of input from CNIL privacy risk analysis&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;CNIL Privacy Risk analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Context&lt;br /&gt;
| &amp;lt;span style=&amp;quot;color: rgb(44, 44, 40); font-family: Arial, Helvetica, sans-serif; font-size: 12.996000289917px; line-height: normal; text-align: justify;&amp;quot;&amp;gt;CNIL is the French DPA. It has produced two guidelines in November 2012&amp;lt;/span&amp;gt;&lt;br /&gt;
*a methodology for managing the risks that can affect the individuals&amp;amp;nbsp;;&lt;br /&gt;
*a catalogue of measures and best practices to treat the risks identified with the methodology.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color: rgb(44, 44, 40); font-family: Arial, Helvetica, sans-serif; font-size: 12.996000289917px; line-height: normal; text-align: justify;&amp;quot;&amp;gt;The two new guides propose a way to build a comprehensive analysis to handle complex personal data processing operations. These documents are primarily intended for use by controllers, data protection officers (DPO) and chief information security officers (CISO). They assist them in creating a rational understanding of the risks arising from the processing of personal data and to choose necessary and sufficient organizational and technical measures to protect privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| URL&lt;br /&gt;
| English web page:&amp;amp;nbsp;[http://www.cnil.fr/english/news-and-events/news/article/the-cnil-publishes-an-english-translation-of-its-two-advanced-security-and-privacy-risk-management/ http://www.cnil.fr/english/news-and-events/news/article/the-cnil-publishes-an-english-translation-of-its-two-advanced-security-and-privacy-risk-management/]&lt;br /&gt;
|-&lt;br /&gt;
| Document&lt;br /&gt;
| &lt;br /&gt;
Methodology to manage risk:&amp;amp;nbsp;[http://www.cnil.fr/fileadmin/documents/en/CNIL-ManagingPrivacyRisks-Methodology.pdf http://www.cnil.fr/fileadmin/documents/en/CNIL-ManagingPrivacyRisks-Methodology.pdf]&lt;br /&gt;
&lt;br /&gt;
Measures for the privacy risk treatment:&amp;amp;nbsp;[http://www.cnil.fr/fileadmin/documents/en/CNIL-ManagingPrivacyRisks-Measures.pdf http://www.cnil.fr/fileadmin/documents/en/CNIL-ManagingPrivacyRisks-Measures.pdf]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*inspired from EBIOS security risk analysis.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Studies&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;NIST study on privacy risk management framework for Federal Information Systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Context&lt;br /&gt;
| &lt;br /&gt;
NIST issued in May 2015 a draft report: NISTIR 8062, Privacy Risk Management for Federal Information Systems&lt;br /&gt;
&lt;br /&gt;
The report describes a privacy risk management framework for federal information systems. The framework provides the basis for establishing a common vocabulary to facilitate better understanding of - and communication about - privacy risks and the effective implementation of privacy principles in federal information systems.&lt;br /&gt;
&lt;br /&gt;
Comments are expected by&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;&amp;amp;nbsp;July 13, 2015 at 5:00pm.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| URL&lt;br /&gt;
| See 8062 dated May 28:&amp;amp;nbsp;[http://csrc.nist.gov/publications/PubsDrafts.html http://csrc.nist.gov/publications/PubsDrafts.html]&amp;amp;nbsp;and&amp;amp;nbsp;[http://www.nist.gov/itl/201506_privacy_framework.cfm http://www.nist.gov/itl/201506_privacy_framework.cfm]&lt;br /&gt;
|-&lt;br /&gt;
| Document&lt;br /&gt;
| &lt;br /&gt;
Draft document:&amp;amp;nbsp;[http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft.pdf http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft.pdf]&lt;br /&gt;
&lt;br /&gt;
Comment matrix form:&amp;amp;nbsp;[http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft_comment_matrix.xls http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft_comment_matrix.xls]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*defines 3 privacy engineering objectives (predictability, manageability, dissociability)&lt;br /&gt;
*focuses on organisational risks (e.g. reputation). Does not focus at this point on risks for citizens&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;ENISA 2015 Study: Privacy and Data Protection-by-Design - from Policy to Engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Context&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;color: rgb(85, 85, 85); font-family: Verdana, Arial, sans-serif; font-size: 12px; line-height: 16px;&amp;quot;&amp;gt;Report published in January 2015. Report&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(85, 85, 85); font-family: Verdana, Arial, sans-serif; font-size: 12px; line-height: 16px;&amp;quot;&amp;gt;aims to bridge the gap between the legal framework and the available technological implementation measures. It provides an inventory of the existing approaches and privacy design strategies, and the technical building blocks of various degree of maturity from research and development. Limitations and inherent constraints are presented with recommendations for their mitigation.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| URL&lt;br /&gt;
| Announcement:&amp;amp;nbsp;[https://www.enisa.europa.eu/media/news-items/deciphering-the-landscape-for-privacy-by-design https://www.enisa.europa.eu/media/news-items/deciphering-the-landscape-for-privacy-by-design]&lt;br /&gt;
|-&lt;br /&gt;
| Document&lt;br /&gt;
| Report:&amp;amp;nbsp;[https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-and-data-protection-by-design/at_download/fullReport https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-and-data-protection-by-design/at_download/fullReport]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*highlights work from Jaap-Henk Hoepman.on Privacy design strategies, based on&amp;amp;nbsp;4 data oriented strategies (minmise, hide, separate, aggregate) and 4 process oriented strategies (inform, control, enforce, demonstrate). This work is foundational.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Events&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| May 2016&lt;br /&gt;
| IEEE International Workshop on Privacy Engineering&lt;br /&gt;
| [http://ieee-security.org/TC/SPW2015/IWPE http://ieee-security.org/TC/SPW2015/IWPE]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Jan 27-29&lt;br /&gt;
| CPDP, Brussels&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://www.cpdpconferences.org/ http://www.cpdpconferences.org/]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Oct 7-8 2015&lt;br /&gt;
| Annual Privacy Forum, Luxemburg&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://privacyforum.eu/ http://privacyforum.eu/]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Aug 31-Sept 1 2015&lt;br /&gt;
| CCC Privacy-by-design workshop, Pittsburgh&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://www.cra.org/ccc/visioning/visioning-activities/privacy-by-design http://www.cra.org/ccc/visioning/visioning-activities/privacy-by-design]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| July 8-9 2015&lt;br /&gt;
| &lt;br /&gt;
OASIS conference Ditton Manor UK&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;(Building trust in a hyperconnected world)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.oasis-open.org/events/hyperconnected-2015 https://www.oasis-open.org/events/hyperconnected-2015]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| June 5th 2015&lt;br /&gt;
| IPEN Workshop Leuven&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN/IPEN_Workshop_2015 https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN/IPEN_Workshop_2015]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>JoseDelAlamo</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Other_Activities&amp;diff=265</id>
		<title>Other Activities</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Other_Activities&amp;diff=265"/>
		<updated>2015-07-02T09:05:36Z</updated>

		<summary type="html">&lt;p&gt;JoseDelAlamo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This pages covers other activities which could be of interest: guidelines, studies, events&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Guidelines&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;EC &amp;lt;span style=&amp;quot;font-family: Verdana, Arial, Helvetica, 'DejaVu Sans', sans-serif; line-height: 14.3999996185303px;&amp;quot;&amp;gt;Data Protection Impact Assessment Template for &amp;lt;/span&amp;gt;Smart Grid and Smart Metering Systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Context&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-family: Verdana, Arial, Helvetica, 'DejaVu Sans', sans-serif; line-height: 14.3999996185303px;&amp;quot;&amp;gt;The Smart Grids Task Force was set up by the European Commission in 2009 to advise on issues related to smart grid deployment and development. One of the working group (WG2) is on security and privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-family: Verdana, Arial, Helvetica, 'DejaVu Sans', sans-serif; line-height: 14.3999996185303px;&amp;quot;&amp;gt;The EC has provided a &amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-family: Verdana, Arial, Helvetica, 'DejaVu Sans', sans-serif; line-height: 14.3999996185303px;&amp;quot;&amp;gt;Data Protection Impact Assessment Template for smart grid and smart metering systems.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-family: Verdana, Arial, Helvetica, 'DejaVu Sans', sans-serif; line-height: 14.3999996185303px;&amp;quot;&amp;gt;The EC has decided to have a two-year trial of the template starting from March 2015.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| URL&lt;br /&gt;
| &lt;br /&gt;
Smart grid task force: [http://ec.europa.eu/energy/en/topics/markets-and-consumers/smart-grids-and-meters http://ec.europa.eu/energy/en/topics/markets-and-consumers/smart-grids-and-meters]&lt;br /&gt;
&lt;br /&gt;
Test phase for template:&amp;amp;nbsp;[https://ec.europa.eu/energy/en/test-phase-data-protection-impact-assessment-dpia-template-smart-grid-and-smart-metering-systems https://ec.europa.eu/energy/en/test-phase-data-protection-impact-assessment-dpia-template-smart-grid-and-smart-metering-systems]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documents&lt;br /&gt;
| Template document:&amp;amp;nbsp;[https://ec.europa.eu/energy/sites/ener/files/documents/2014_dpia_smart_grids_forces.pdf https://ec.europa.eu/energy/sites/ener/files/documents/2014_dpia_smart_grids_forces.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
*Integrates lots of input from CNIL privacy risk analysis&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;CNIL Privacy Risk analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Context&lt;br /&gt;
| &amp;lt;span style=&amp;quot;color: rgb(44, 44, 40); font-family: Arial, Helvetica, sans-serif; font-size: 12.996000289917px; line-height: normal; text-align: justify;&amp;quot;&amp;gt;CNIL is the French DPA. It has produced two guidelines in November 2012&amp;lt;/span&amp;gt;&lt;br /&gt;
*a methodology for managing the risks that can affect the individuals&amp;amp;nbsp;;&lt;br /&gt;
*a catalogue of measures and best practices to treat the risks identified with the methodology.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color: rgb(44, 44, 40); font-family: Arial, Helvetica, sans-serif; font-size: 12.996000289917px; line-height: normal; text-align: justify;&amp;quot;&amp;gt;The two new guides propose a way to build a comprehensive analysis to handle complex personal data processing operations. These documents are primarily intended for use by controllers, data protection officers (DPO) and chief information security officers (CISO). They assist them in creating a rational understanding of the risks arising from the processing of personal data and to choose necessary and sufficient organizational and technical measures to protect privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| URL&lt;br /&gt;
| English web page:&amp;amp;nbsp;[http://www.cnil.fr/english/news-and-events/news/article/the-cnil-publishes-an-english-translation-of-its-two-advanced-security-and-privacy-risk-management/ http://www.cnil.fr/english/news-and-events/news/article/the-cnil-publishes-an-english-translation-of-its-two-advanced-security-and-privacy-risk-management/]&lt;br /&gt;
|-&lt;br /&gt;
| Document&lt;br /&gt;
| &lt;br /&gt;
Methodology to manage risk:&amp;amp;nbsp;[http://www.cnil.fr/fileadmin/documents/en/CNIL-ManagingPrivacyRisks-Methodology.pdf http://www.cnil.fr/fileadmin/documents/en/CNIL-ManagingPrivacyRisks-Methodology.pdf]&lt;br /&gt;
&lt;br /&gt;
Measures for the privacy risk treatment:&amp;amp;nbsp;[http://www.cnil.fr/fileadmin/documents/en/CNIL-ManagingPrivacyRisks-Measures.pdf http://www.cnil.fr/fileadmin/documents/en/CNIL-ManagingPrivacyRisks-Measures.pdf]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*inspired from EBIOS security risk analysis.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Studies&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;NIST study on privacy risk management framework for Federal Information Systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Context&lt;br /&gt;
| &lt;br /&gt;
NIST issued in May 2015 a draft report: NISTIR 8062, Privacy Risk Management for Federal Information Systems&lt;br /&gt;
&lt;br /&gt;
The report describes a privacy risk management framework for federal information systems. The framework provides the basis for establishing a common vocabulary to facilitate better understanding of - and communication about - privacy risks and the effective implementation of privacy principles in federal information systems.&lt;br /&gt;
&lt;br /&gt;
Comments are expected by&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;&amp;amp;nbsp;July 13, 2015 at 5:00pm.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| URL&lt;br /&gt;
| See 8062 dated May 28:&amp;amp;nbsp;[http://csrc.nist.gov/publications/PubsDrafts.html http://csrc.nist.gov/publications/PubsDrafts.html]&amp;amp;nbsp;and&amp;amp;nbsp;[http://www.nist.gov/itl/201506_privacy_framework.cfm http://www.nist.gov/itl/201506_privacy_framework.cfm]&lt;br /&gt;
|-&lt;br /&gt;
| Document&lt;br /&gt;
| &lt;br /&gt;
Draft document:&amp;amp;nbsp;[http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft.pdf http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft.pdf]&lt;br /&gt;
&lt;br /&gt;
Comment matrix form:&amp;amp;nbsp;[http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft_comment_matrix.xls http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft_comment_matrix.xls]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*defines 3 privacy engineering objectives (predictability, manageability, dissociability)&lt;br /&gt;
*focuses on organisational risks (e.g. reputation). Does not focus at this point on risks for citizens&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;ENISA 2015 Study: Privacy and Data Protection-by-Design - from Policy to Engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Context&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;color: rgb(85, 85, 85); font-family: Verdana, Arial, sans-serif; font-size: 12px; line-height: 16px;&amp;quot;&amp;gt;Report published in January 2015. Report&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(85, 85, 85); font-family: Verdana, Arial, sans-serif; font-size: 12px; line-height: 16px;&amp;quot;&amp;gt;aims to bridge the gap between the legal framework and the available technological implementation measures. It provides an inventory of the existing approaches and privacy design strategies, and the technical building blocks of various degree of maturity from research and development. Limitations and inherent constraints are presented with recommendations for their mitigation.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| URL&lt;br /&gt;
| Announcement:&amp;amp;nbsp;[https://www.enisa.europa.eu/media/news-items/deciphering-the-landscape-for-privacy-by-design https://www.enisa.europa.eu/media/news-items/deciphering-the-landscape-for-privacy-by-design]&lt;br /&gt;
|-&lt;br /&gt;
| Document&lt;br /&gt;
| Report:&amp;amp;nbsp;[https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-and-data-protection-by-design/at_download/fullReport https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-and-data-protection-by-design/at_download/fullReport]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*highlights work from Jaap-Henk Hoepman.on Privacy design strategies, based on&amp;amp;nbsp;4 data oriented strategies (minmise, hide, separate, aggregate) and 4 process oriented strategies (inform, control, enforce, demonstrate). This work is foundational.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Events&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| May 2016&lt;br /&gt;
| IEEE International Workshop on Privacy Engineering&lt;br /&gt;
| [http://ieee-security.org/TC/SPW2015/IWPE]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Jan 27-29&lt;br /&gt;
| CPDP, Brussels&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://www.cpdpconferences.org/ http://www.cpdpconferences.org/]&amp;lt;br/&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Oct 7-8 2015&lt;br /&gt;
| Annual Privacy Forum, Luxemburg&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://privacyforum.eu/ http://privacyforum.eu/]&amp;lt;br/&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Aug 31-Sept 1 2015&lt;br /&gt;
| CCC Privacy-by-design workshop, Pittsburgh&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[http://www.cra.org/ccc/visioning/visioning-activities/privacy-by-design]&amp;lt;br/&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| July 8-9 2015&lt;br /&gt;
| &lt;br /&gt;
OASIS conference Ditton Manor UK&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;(Building trust in a hyperconnected world)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.oasis-open.org/events/hyperconnected-2015 https://www.oasis-open.org/events/hyperconnected-2015]&amp;lt;br/&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| June 5th 2015&lt;br /&gt;
| IPEN Workshop Leuven&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN/IPEN_Workshop_2015 https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN/IPEN_Workshop_2015]&amp;lt;br/&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>JoseDelAlamo</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=IETF_Activities&amp;diff=226</id>
		<title>IETF Activities</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=IETF_Activities&amp;diff=226"/>
		<updated>2015-06-19T14:49:45Z</updated>

		<summary type="html">&lt;p&gt;JoseDelAlamo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:IETF.png]]&lt;br /&gt;
&lt;br /&gt;
[https://tools.ietf.org/html/rfc6973 '''RFC 6973: Privacy Considerations for Internet Protocols''']&lt;/div&gt;</summary>
		<author><name>JoseDelAlamo</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=W3C_Activities&amp;diff=225</id>
		<title>W3C Activities</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=W3C_Activities&amp;diff=225"/>
		<updated>2015-06-19T14:49:34Z</updated>

		<summary type="html">&lt;p&gt;JoseDelAlamo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:W3C.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.w3.org/Privacy/ W3C Privacy Interest Group]&lt;/div&gt;</summary>
		<author><name>JoseDelAlamo</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=User:JoseDelAlamo&amp;diff=224</id>
		<title>User:JoseDelAlamo</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=User:JoseDelAlamo&amp;diff=224"/>
		<updated>2015-06-19T14:39:18Z</updated>

		<summary type="html">&lt;p&gt;JoseDelAlamo: Created page with &amp;quot;Jose M. del Alamo - [http://www.dit.upm.es/~jmdela/index_en.html Homepage]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Jose M. del Alamo - [http://www.dit.upm.es/~jmdela/index_en.html Homepage]&lt;/div&gt;</summary>
		<author><name>JoseDelAlamo</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Contacts&amp;diff=223</id>
		<title>Contacts</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Contacts&amp;diff=223"/>
		<updated>2015-06-19T14:38:14Z</updated>

		<summary type="html">&lt;p&gt;JoseDelAlamo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Subscription ===&lt;br /&gt;
&lt;br /&gt;
Please contact [[Users:Antoniok|Antonio Kung]] (''TRIALOG'').&lt;br /&gt;
&lt;br /&gt;
=== Contacts ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Company&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; style=&amp;quot;width: 15%&amp;quot; | Contact Informations&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; style=&amp;quot;width: 40%&amp;quot; | Presentation&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | [[User:Antoniok|Antonio Kung]]&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | [http://trialog.com Trialog]&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | antonio.kung@trialog.com&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | [[User:Olivierm|Olivier Maridat]]&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | [http://trialog.com Trialog]&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | olivier.maridat@trialog.com&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | [[User:JoseDelAlamo|Jose M. del Alamo]]&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | [http://www.dit.upm.es Universidad Politécnica de Madrid]&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | jmdela@dit.upm.es&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | [http://www.dit.upm.es/~jmdela/index_en.html Homepage]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | [[User:YodSamuelMartin|Yod-Samuel Martin]]&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | [http://ww.dit.upm.es Universidad Politécnica de Madrid]&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | samuelm@dit.upm.es&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>JoseDelAlamo</name></author>
	</entry>
</feed>