What are the Priorities for Data Protection and Privacy Officers in 2020?    
The Need to Embed Privacy, by Design, into Big Data and IoT
The Need to Embed Privacy, by Design, into Big Data and IoT

The Need to Embed Privacy, by Design, into Big Data and IoT

Privacy is under siege. With the growth of ubiquitous computing, online connectivity, social media, and wireless and wearable devices, people are being led to believe they have no choice but to give up on privacy. Not so! Dr. Cavoukian will outline a privacy framework called Privacy by Design that will enable our privacy and our freedom, to live well into the future.

While some believe that fundamental privacy protections will be challenged by the operation of Big Data and the Internet of Things, Dr. Cavoukian dispels the notion that privacy acts as a barrier to data analytics and the innovations they can spark. She argues that the limiting paradigm of “zero-sum” – that you can either have privacy or innovation, but not both – is an outdated, win/lose model of approaching the question of privacy in the age of Big Data and IoT. Instead, a “positive-sum” solution is needed in which the interests of both sides may be met, in a doubly-enabling, “win-win” manner through Privacy by Design (PbD). PbD is predicated on the rejection of zero-sum propositions by proactively identifying the risks and embedding the necessary protective measures into the IT and data architecture involved. Dr. Cavoukian will demonstrate how you can embed privacy into virtually any system or operation to achieve positive-sum outcomes, enabling both privacy and data utility – not one at the expense of the other.

During her unprecedented three terms as Information and Privacy Commissioner of Ontario, Dr. Ann Cavoukian created Privacy by Design. Privacy by Design is a framework that seeks to proactively embed privacy into the design specifications of information technologies, networked infrastructure and business practices, thereby achieving the strongest protection possible.

See all Data Privacy Asia conference videos

 

Watch full video

Only registered members have access to the full video. Please register or login below.

Subscribe
Notify of
1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Mark Sitkowski
Mark Sitkowski
2 years ago

It seems there’s a dichotomy between privacy and security. Our main area of interest is user authentication, whose aim is to unequivocally identify a person. The techniques we use to do so are not far removed from those employed by unscrupulous marketing companies to track potential customers. However, there’s a world of difference between wanting to stay anonymous while surfing the net, and needing to guarantee that you’re the only person able to access your bank account. It isn’t necessary to give up your privacy to do so. We believe that a password, the signature of the device you use… Read more »

Enjoyed the article?

Get notified of new articles and relevant events.

Thank you for being a part of the CPO Magazine community.

Something went wrong.

Before you go ...

How about giving us a follow? lang: en_US Or let us notify you of new articles and relevant events.

Thank you for being a part of the CPO Magazine community.

Something went wrong.

 

Follow CPO Magazine