Manning Publications, 2022. — 384 p. — ISBN-13 9781617298998.
Конфиденциальность данных: руководство для инженеров
Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits.
In Data Privacy you will learn how toClassify data based on privacy risk
Build technical tools to catalog and discover data in your systems
Share data with technical privacy controls to measure reidentification risk
Implement technical privacy architectures to delete data
Set up technical capabilities for data export to meet legal requirements like Data Subject Asset Requests (DSAR)
Establish a technical privacy review process to help accelerate the legal Privacy Impact Assessment (PIA)
Design a Consent Management Platform (CMP) to capture user consent
Implement security tooling to help optimize privacy
Build a holistic program that will get support and funding from the C-Level and board
About the technologyData privacy is essential for any business. Data breaches, vague policies, and poor communication all erode a user’s trust in your applications. You may also face substantial legal consequences for failing to protect user data. Fortunately, there are clear practices and guidelines to keep your data secure and your users happy.
About the bookData Privacy: A runbook for engineers teaches you how to navigate the trade-off s between strict data security and real world business needs. In this practical book, you’ll learn how to design and implement privacy programs that are easy to scale and automate. There’s no bureaucratic process—just workable solutions and smart repurposing of existing security tools to help set and achieve your privacy goals.
PRIVACY, DATA, AND YOUR BUSINESS
Privacy engineering: Why it’s needed, how to scale it
Understanding data and privacy
A PROACTIVE PRIVACY PROGRAM: DATA GOVERNANCE
Data classification
Data inventory
Data sharing
BUILDING TOOLS AND PROCESSES
The technical privacy review
Data deletion
Exporting user data: Data Subject Access Requests
SECURITY, SCALING, AND STAFFING
Building a consent management platform
Closing security vulnerabilities
Scaling, hiring, and considering regulations