
18 Privacy By Design Techniques John Spacey, updated on
![]() AnonymityAllowing users to remain anonymous as far as it's practical and legal. For example, allowing users to use pseudonyms as opposed to their real name.Audit Trail MinimizationMinimizing the information in audit trails as far as the law will allow.Compliance TransparencyGovernments may require services to capture and retain certain information. They may also make requests for such data. Compliance transparency is the practice of communicating such occurrences to the public. In many cases, governments may gag such communications.Comprehensible TermsLegal agreements such as privacy terms that are readable, unambiguous and as simple as possible.ConsentAsking for consent before collecting data such as sensor data or tracking ids.Data LiberationAllowing users to download the data that you have about them.DecentralizationStoring and processing information locally as opposed to sending it over a network for storage and processing on a server or cloud platform.Design TransparencyCommunicating how you collect, process and use personally identifiable information.EncryptionUsing strong encryption for all network communications and data in storage.Ephemera DesignDesigns that temporarily use information and then forget it. For example, a voice command system that determines the meaning of a command but doesn't store audio data or its machine representations.Forgetful SensorsSensor recordings such as sound, video and geospatial information that is processed but not stored in a data repositoy.Information MinimizationMinimizing data collection to information that you truly need to provide a service.Information SecurityPreventing unauthorized access, use, modification and destruction of information. Information security is a broad practice that is incorporated into design, development, quality assurance, infrastructure, processes, operations and management.Offline FunctionalityProducts that have no capability to connect to computer networks tend to have less privacy and information security issues. Customers may be uncomfortable with minor tools, electronics and appliances such as a toaster connecting to external networks.Privacy By DefaultOptions that are set to the most private settings by default.Privacy GuaranteesExplicit privacy guarantees such as stating that voice commands are not stored.Retention LimitsPlacing limits on data retention such as deleting all data associated with old accounts after a period of inactivity.True DeletionDeleting data as opposed to setting a deletion flag. Physically wiping data from storage also enhances privacy.PrivacyThis is the complete list of articles we have written about privacy.If you enjoyed this page, please consider bookmarking Simplicable.
Encryption ExamplesA definition of encryption with examples.Expectation Of Privacy
The definition of expectation of privacy.
Personally Identifiable Information
An overview of personally identifiable information.
Delete vs Wipe
The difference between deleting data and wiping it.
Data RisksA definition of data risk with examples.Personal Information
A definition of personal information with examples.
Data Subject
A definition of data subject with examples.
Machine Readable
The definition of machine readable with examples.
Delete
The definition of delete with examples.
Privacy Examples
The definition of privacy with examples.
Urban DesignA few common urban design terms.Green Walls vs Green Facades
The difference between a green wall and green facade.
Sustainable Urban DesignA list of sustainable urban design techniques.Passive Design vs Active DesignThe difference between active and passive design.Street Canyon
How a street canyon changes an urban environment.
Parti Pris
An overview of parti pris in architecture with an example.
City IssuesA list of common city issues.Community ProblemsA list of common community problems.Things In Cities
An a-z list of things in cities.
City TypesAn list of the common types of city.TrendingThe most popular articles on Simplicable in the past day.New ArticlesRecent posts or updates on Simplicable.
Benchmarking
Business Analysis Communication Compliance Networking Computing Creativity Cryptography Data Design Design Thinking Governance Information Security Information Technology Infrastructure Knowledge Management Management Metrics Organizational Culture Problem Solving Productivity Project Management Quality More ...
© 2010-2024 Simplicable. All Rights Reserved. Reproduction of materials found on this site, in any form, without explicit permission is prohibited. View credits & copyrights or citation information for this page. |