1 Understanding “data” and “privacy”

 

Chapter 2 from Data Privacy by Nishant Bhajaria

This chapter covers

  • Why privacy is hard for smart engineers and accomplished businesses
  • What happens when privacy is overlooked
  • How data can be powerful in helping grow your business
  • How data can be a risk when you handle privacy incorrectly
  • The regulatory sentiment around privacy
  • How customers understand and assess data privacy
  • Building a privacy-first program and a privacy-first culture

In the last chapter we started building a very high-level understanding of privacy and your business. In this chapter, we will go one level deeper; we will more directly connect privacy outcomes to how your business operates. More specifically, after reading this chapter you will better understand how your business operations and privacy are connected in the context of the economy, regulatory landscape and customer sentiment. For this understanding to develop, we will look at data.

2.1 Privacy and what it entails

Why do accomplished companies and brilliant engineers find privacy so hard? They have skills that lead to amazing products and growing profits - why can’t they plan for privacy success as well? I have heard these questions asked not in the abstract but in real life situations where companies with no malintent and a proven record of successful products made serious privacy mistakes. 

2.1.1 Why Privacy is Hard

2.1.2 Privacy Engineering on the Ground: What You Have to Accomplish

2.1.3 Privacy, Data Systems and Policy Enforcement

2.2 This could be your company

2.3 Data, Your Business Growth Strategy and Privacy

2.4 Examples: when privacy is violated

2.4.1 Equifax

2.4.2 The Office of Personnel Management (OPM) Breach

2.4.3 LabCorp and Quest

2.5 Privacy and the Regulatory Landscape

2.5.1 How Regulations impact your product and their users

2.5.2 How your Program should help prepare for changing privacy law

2.6 Privacy and the User

2.6.1 Becoming an American and Privacy

2.6.2 Today’s User and their Privacy Concerns

2.7 After building the tools comes the hard part: Building a program

2.8 As you build a program, build a privacy-first culture

2.9 Summary