
- 384 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. In Data Privacy you will learn how to: Classify data based on privacy risk
Build technical tools to catalog and discover data in your systems
Share data with technical privacy controls to measure reidentification risk
Implement technical privacy architectures to delete data
Set up technical capabilities for data export to meet legal requirements like Data Subject Asset Requests (DSAR)
Establish a technical privacy review process to help accelerate the legal Privacy Impact Assessment (PIA)
Design a Consent Management Platform (CMP) to capture user consent
Implement security tooling to help optimize privacy
Build a holistic program that will get support and funding from the C-Level and board Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You'll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free language. The book's constant awareness of business requirements will help you balance trade-offs, and ensure your user's privacy can be improved without spiraling time and resource costs. About the technology
Data privacy is essential for any business. Data breaches, vague policies, and poor communication all erode a user's trust in your applications. You may also face substantial legal consequences for failing to protect user data. Fortunately, there are clear practices and guidelines to keep your data secure and your users happy. About the book
Data Privacy: A runbook for engineers teaches you how to navigate the trade-offs between strict data security and real world business needs. In this practical book, you'll learn how to design and implement privacy programs that are easy to scale and automate. There's no bureaucratic processâjust workable solutions and smart repurposing of existing security tools to help set and achieve your privacy goals. What's inside Classify data based on privacy risk
Set up capabilities for data export that meet legal requirements
Establish a review process to accelerate privacy impact assessment
Design a consent management platform to capture user consent About the reader
For engineers and business leaders looking to deliver better privacy. About the author
Nishant Bhajaria leads the Technical Privacy and Strategy teams for Uber. His previous roles include head of privacy engineering at Netflix, and data security and privacy at Google. Table of Contents
PART 1 PRIVACY, DATA, AND YOUR BUSINESS
1 Privacy engineering: Why it's needed, how to scale it
2 Understanding data and privacy
PART 2 A PROACTIVE PRIVACY PROGRAM: DATA GOVERNANCE
3 Data classification
4 Data inventory
5 Data sharing
PART 3 BUILDING TOOLS AND PROCESSES
6 The technical privacy review
7 Data deletion
8 Exporting user data: Data Subject Access Requests
PART 4 SECURITY, SCALING, AND STAFFING
9 Building a consent management platform
10 Closing security vulnerabilities
11 Scaling, hiring, and considering regulations
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Part 1. Privacy, data, and your business
1 Privacy engineering: Why itâs needed, how to scale it
- What privacy means
- How privacy is impacted by the flow of data through your tech stack and storage
- Why privacy matters and how it affects your business
- Clarity on privacy tooling, especially the âbuild vs. buyâ debate
- What this book does not do
- How the role of engineers has changed in recent years
1.1 What is privacy?
- An employee or equivalent insider accesses sensitive business or customer data when they should not have.
- A business partner obtains business or customer data at a time or in a volume that affects the privacy of the customers or the competitive advantage of the business.
- Data that was collected for a benign, defensible purpose gets used for something more than that. For example, data collected for fraud detection by verifying that the user is real rather than a bot then gets used for marketing, because the access control systems were compromised.
Table of contents
- inside front cover
- Data Privacy
- Copyright
- brief contents
- contents
- front matter
- Part 1. Privacy, data, and your business
- 1 Privacy engineering: Why itâs needed, how to scale it
- 2 Understanding data and privacy
- Part 2. A proactive privacy program: Data governance
- 3 Data classification
- 4 Data inventory
- 5 Data sharing
- Part 3. Building tools and processes
- 6 The technical privacy review
- 7 Data deletion
- 8 Exporting user data: Data Subject Access Requests
- Part 4. Security, scaling, and staffing
- 9 Building a consent management platform
- 10 Closing security vulnerabilities
- 11 Scaling, hiring, and considering regulations
- index
- inside back cover