i3 - January/February 2019 - 15

By Mike Bergman

Tech

PIPE LINE

Privacy, Engineering
and Privacy Engineering

 C 

John Lund/Getty Images

onsumer data privacy
is a topic that is keeping executives of the
biggest internet giants busy.
Privacy is on a lot of minds in
Washington and in other
global regulatory organizations, as they consider how
industry should protect consumers' Personally Identifiable
Information (PII). The people
who work on standards and
best practices are deep into
these waters as well.
As the attention on privacy grows,
the term "privacy engineering" has
emerged. But it can be difficult to
understand what someone means by
privacy as an engineering topic. At
the root, questions of privacy are
questions of policy.
As an analogy, I have a policy at my
home that I don't want people looking
in the windows at night. I use technology-window blinds-to enforce that
policy. The window blinds are the privacy engineering supporting the privacy
policy. Closing the blinds is a best practice for use of the technology.
Similarly, I have a security policy that
people should not walk in the front door
and steal things. The lock is my security
technology. I lock the door at night when
I close the blinds, also as a best practice.

Privacy Engineering

What does this mean if privacy per se
is a policy topic?
C TA . t e c h / i 3

The mission of the National Institute
of Standards and Technology (NIST)
Privacy Engineering Program is to:
Support the development of trustworthy information systems by
applying measurement science and
system engineering principles to
the creation of frameworks, risk
models, guidance, tools and standards that protect privacy and, by
extension, civil liberties.
While the NIST description is specific
to their efforts, a few common themes are
for a manager's own considerations of
privacy engineering.
The first has to do with using secure
systems- "trustworthy" systems -to
protect privacy. If you are collecting
data, it's important to protect that data
when it is stored or being transmitted-
or in the parlance of the security world,
"data at rest and data in motion." This
implies good cybersecurity practice. A

good starting point is Securing
Connected Devices for Consumers in the
Home - A Manufacturer's Guide (CTACEB33), free to CTA members.
The NIST mission also mentions measurement science. Privacy concerns are
about the risk of breaches. Breaches of
consumer data not only damage consumers, but tarnish the company's reputation,
expose it to government action and civil
lawsuits, and potentially impact the stock
price. Setting up privacy requirements for
the organization is only logical. Like performance goals in an annual review, privacy requirements should be measurable
- by test, observation, etc. Privacy engineering is also about measuring performance to privacy requirements.
The text also speaks of frameworks.
CTA believes that prescriptive regulatory requirements hamper innovation
and are quickly dated. Frameworks are a
useful structure to establish the guidelines without such static requirements.
When you use an established framework
for a purpose, you can customize your
program to your evolving needs. A privacy risk management framework can
be helpful to understand and measure
risk categories within the privacy space.
Understanding privacy risk categories
allows you to decide which ones must be
given the greatest attention. One cannot
mitigate all possible risks with equal
effort. Those risk categories that need to
be addressed can be attacked with good
cyber hygiene. CTA has partnered with
the Council to Secure the Digital
Economy (CSDE) to develop an international anti-botnet guide (IABG) . While
the IABG is mostly focused on botnets-
swarms of compromised computing
devices used by hackers for malicious,
coordinated attacks-the best practices
in the IABG span all parts of the internet
ecosystem and cover the important elements of security engineering that will
also support privacy policy.
In short, privacy engineering is about
managing privacy-related risks with
tools and frameworks that help decide
how to direct cyber security resources to
protect the security of PII.
JANUARY/FEBRUARY 2019

15


http://www.cta.tech/research http://www.cta.tech/research http://www.cta.tech/research https://www.cta.tech/

i3 - January/February 2019

Table of Contents for the Digital Edition of i3 - January/February 2019

Contents
i3 - January/February 2019 - Cover1
i3 - January/February 2019 - Cover2
i3 - January/February 2019 - Contents
i3 - January/February 2019 - 2
i3 - January/February 2019 - 3
i3 - January/February 2019 - 4
i3 - January/February 2019 - 5
i3 - January/February 2019 - 6
i3 - January/February 2019 - 7
i3 - January/February 2019 - 8
i3 - January/February 2019 - 9
i3 - January/February 2019 - 10
i3 - January/February 2019 - 11
i3 - January/February 2019 - 12
i3 - January/February 2019 - 13
i3 - January/February 2019 - 14
i3 - January/February 2019 - 15
i3 - January/February 2019 - 16
i3 - January/February 2019 - 17
i3 - January/February 2019 - 18
i3 - January/February 2019 - 19
i3 - January/February 2019 - 20
i3 - January/February 2019 - 21
i3 - January/February 2019 - 22
i3 - January/February 2019 - 23
i3 - January/February 2019 - 24
i3 - January/February 2019 - 25
i3 - January/February 2019 - 26
i3 - January/February 2019 - 27
i3 - January/February 2019 - 28
i3 - January/February 2019 - 29
i3 - January/February 2019 - 30
i3 - January/February 2019 - 31
i3 - January/February 2019 - 32
i3 - January/February 2019 - 33
i3 - January/February 2019 - 34
i3 - January/February 2019 - 35
i3 - January/February 2019 - 36
i3 - January/February 2019 - 37
i3 - January/February 2019 - 38
i3 - January/February 2019 - 39
i3 - January/February 2019 - 40
i3 - January/February 2019 - 41
i3 - January/February 2019 - 42
i3 - January/February 2019 - 43
i3 - January/February 2019 - 44
i3 - January/February 2019 - 45
i3 - January/February 2019 - 46
i3 - January/February 2019 - 47
i3 - January/February 2019 - 48
i3 - January/February 2019 - 49
i3 - January/February 2019 - 50
i3 - January/February 2019 - 51
i3 - January/February 2019 - 52
i3 - January/February 2019 - 53
i3 - January/February 2019 - 54
i3 - January/February 2019 - 55
i3 - January/February 2019 - 56
i3 - January/February 2019 - 57
i3 - January/February 2019 - 58
i3 - January/February 2019 - 59
i3 - January/February 2019 - 60
i3 - January/February 2019 - 61
i3 - January/February 2019 - 62
i3 - January/February 2019 - 63
i3 - January/February 2019 - 64
i3 - January/February 2019 - 65
i3 - January/February 2019 - 66
i3 - January/February 2019 - 67
i3 - January/February 2019 - 68
i3 - January/February 2019 - 69
i3 - January/February 2019 - 70
i3 - January/February 2019 - 71
i3 - January/February 2019 - 72
i3 - January/February 2019 - 73
i3 - January/February 2019 - 74
i3 - January/February 2019 - 75
i3 - January/February 2019 - 76
i3 - January/February 2019 - 77
i3 - January/February 2019 - 78
i3 - January/February 2019 - 79
i3 - January/February 2019 - 80
i3 - January/February 2019 - 81
i3 - January/February 2019 - 82
i3 - January/February 2019 - 83
i3 - January/February 2019 - 84
i3 - January/February 2019 - 85
i3 - January/February 2019 - 86
i3 - January/February 2019 - 87
i3 - January/February 2019 - 88
i3 - January/February 2019 - 89
i3 - January/February 2019 - 90
i3 - January/February 2019 - 91
i3 - January/February 2019 - 92
i3 - January/February 2019 - 93
i3 - January/February 2019 - 94
i3 - January/February 2019 - 95
i3 - January/February 2019 - 96
i3 - January/February 2019 - Cover3
i3 - January/February 2019 - Cover4
https://www.nxtbook.com/nxtbooks/manifest/i3_20210304
https://www.nxtbook.com/nxtbooks/manifest/i3_20210102
https://www.nxtbook.com/nxtbooks/manifest/i3_20201112
https://www.nxtbook.com/nxtbooks/manifest/i3_20200910
https://www.nxtbook.com/nxtbooks/manifest/i3_20200708
https://www.nxtbook.com/nxtbooks/manifest/i3_20200506
https://www.nxtbook.com/nxtbooks/manifest/i3_20200304
https://www.nxtbook.com/nxtbooks/manifest/i3_20200102
https://www.nxtbook.com/nxtbooks/manifest/i3_20191112
https://www.nxtbook.com/nxtbooks/manifest/i3_20190910
https://www.nxtbook.com/nxtbooks/manifest/i3_20190708
https://www.nxtbook.com/nxtbooks/manifest/i3_20190506
https://www.nxtbook.com/nxtbooks/manifest/i3_20190304
https://www.nxtbook.com/nxtbooks/manifest/i3_20190102
https://www.nxtbook.com/nxtbooks/manifest/i3_20181112
https://www.nxtbook.com/nxtbooks/manifest/i3_20180910
https://www.nxtbook.com/nxtbooks/manifest/i3_20180708
https://www.nxtbook.com/nxtbooks/manifest/i3_20180506
https://www.nxtbook.com/nxtbooks/manifest/i3_20180304
https://www.nxtbook.com/nxtbooks/manifest/i3_20180102
https://www.nxtbook.com/nxtbooks/manifest/i3_20171112
https://www.nxtbook.com/nxtbooks/manifest/i3_20170910
https://www.nxtbook.com/nxtbooks/manifest/i3_20170708
https://www.nxtbook.com/nxtbooks/manifest/i3_20160102
https://www.nxtbook.com/nxtbooks/manifest/i3_20160304
https://www.nxtbook.com/nxtbooks/manifest/i3_20160506
https://www.nxtbook.com/nxtbooks/manifest/i3_20160708
https://www.nxtbook.com/nxtbooks/manifest/i3_20170506
https://www.nxtbook.com/nxtbooks/manifest/i3_20170304
https://www.nxtbook.com/nxtbooks/manifest/i3_20170102
https://www.nxtbook.com/nxtbooks/manifest/i3_20161112
https://www.nxtbook.com/nxtbooks/manifest/i3_20160910
https://www.nxtbookmedia.com