- 1 Introduction
- 2 OWASP Top 10 Privacy Risk Project
- 3 Guidelines
- 4 Studies
- 5 Events
This pages covers other activities which could be of interest: guidelines, studies, events
OWASP Top 10 Privacy Risk Project
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.
EC Data Protection Impact Assessment Template for Smart Grid and Smart Metering Systems
The Smart Grids Task Force was set up by the European Commission in 2009 to advise on issues related to smart grid deployment and development. One of the working group (WG2) is on security and privacy.
The EC has provided a Data Protection Impact Assessment Template for smart grid and smart metering systems.
The EC has decided to have a two-year trial of the template starting from March 2015.
Smart grid task force: http://ec.europa.eu/energy/en/topics/markets-and-consumers/smart-grids-and-meters
|Documents||Template document: https://ec.europa.eu/energy/sites/ener/files/documents/2014_dpia_smart_grids_forces.pdf|
CNIL Privacy Impact Assessment (PIA) Manual
The CNIL is the French Data Protection Authority (DPA).
In June 2012, the CNIL published a guide on privacy risk management, applicable to complex processings or high risks scenarios. It helped data controllers to get an objective understanding of the risks arising from their processings, in order to select the necessary and sufficient security controls.
This guide was updated in July 2015 to remain in line with the European Data Protection Regulation project and the WP29’s work on the risk based approach. It also considers feedbacks and improvements proposed by different interested parties on privacy impact assessments guidelines. Three documents are available.
|URL|| English web page:http://www.cnil.fr/english/news-and-events/news/article/privacy-impact-assessments-the-cnil-publishes-its-pia-manual/ |
Tools (templates and knowledge bases): http://www.cnil.fr/fileadmin/documents/en/CNIL-PIA-2-Tools-EN.pdf
NIST study on privacy risk management framework for Federal Information Systems
NIST issued in May 2015 a draft report: NISTIR 8062, Privacy Risk Management for Federal Information Systems
The report describes a privacy risk management framework for federal information systems. The framework provides the basis for establishing a common vocabulary to facilitate better understanding of - and communication about - privacy risks and the effective implementation of privacy principles in federal information systems.
A subsequent version was published in January 2017: NISTIR 8062, An Introduction to Privacy Engineering and Risk Management in Federal Systems
This document provides an introduction to the concepts of privacy engineering and risk management for federal systems. These concepts establish the basis for a common vocabulary to facilitate better understanding and communication of privacy risk within federal systems, and the effective implementation of privacy principles. This publication introduces two key components to support the application of privacy engineering and risk management: privacy engineering objectives and a privacy risk model.
FInal version: http://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8062.pdf
ENISA 2015 Study: Privacy and Data Protection-by-Design - from Policy to Engineering
Report published in January 2015. Report aims to bridge the gap between the legal framework and the available technological implementation measures. It provides an inventory of the existing approaches and privacy design strategies, and the technical building blocks of various degree of maturity from research and development. Limitations and inherent constraints are presented with recommendations for their mitigation.
|June 05 2017||NIST workshop: Privacy Risk Assessment: A Prerequisite for Privacy Risk Management|| https://www.nist.gov/news-events/events/2017/06/privacy-risk-assessment-prerequisite-privacy-risk-management|
|May 9 2017||
EIC OASIS Privacy Engineering Workshop
|Sept 9 2016||3rd IPEN workshop, Frankfort|| https://secure.edps.europa.eu/EDPSWEB/edps/site/mySite/IPEN_Workshop_2016|
|Sept 7-8 2016||4th Annual Privacy Forum, Fra|| http://privacyforum.eu/|
|May 2016||IEEE International Workshop on Privacy Engineering|| http://ieee-security.org/TC/SPW2016/IWPE/program.html|
|January 27-29 2016||9th International conference, Computer Privacy & Data Protection conference, Brussels|| http://www.cpdpconferences.org/|
|October 23-26 2015||Amsterdam privacy conference|| http://www.apc2015.net/|
|October 7-8 2015||3rd Annual Privacy Forum, Luxemburg|| http://privacyforum.eu/|
|August 31-September 1 2015||CCC Privacy-by-design workshop, Pittsburgh|| http://www.cra.org/ccc/visioning/visioning-activities/privacy-by-design|
|July 8-9 2015||
OASIS conference Ditton Manor UK (Building trust in a hyperconnected world)
|June 5th 2015||IPEN Workshop Leuven|| https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN/IPEN_Workshop_2015|