Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementPhysical Security

Data Protection by Design: Eight Questions to Help Protect User Data from the Start

How are you reaching your privacy goals for 2020?

By Lisa Phillips
SEC0820-Data-Feat-slide1_900px.jpg
SEC0820-Data-slide2_900px.jpg
SEC0820-Data-Feat-slide1_900px.jpg
SEC0820-Data-slide2_900px.jpg
August 7, 2020

Historically, user data privacy has been considered largely a legal or security concern, and not prioritized until an unfortunate breach or leak. In the not-so-distant past, engineers would often connect with legal or security teams as a final step in the development process to discuss data capture, logging and access parameters, making data protection an afterthought, rather than a roadmap to guide projects from the get go.

Today, we are seeing more technical teams stepping into the spotlight to implement meaningful change, enhancing data protection measures early on to align protocols between engineering, security, legal and data governance perspectives. In 2020 and beyond, responsibility for privacy through data protection will expand beyond security and legal teams to include engineers and product stakeholders, ensuring privacy through data protection becomes a core value across the organization.

However, putting these user-oriented data protections at the core of an organization requires transparency, trust and buy-in from all relevant stakeholders as well as continuous collaboration and optimization. For many organizations, this represents a paradigm shift.

The General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) reflect change in protecting individual consumer privacy online, but they are a result of the game of catch-up that the industry has been forced to play. To successfully make this shift, engineering and legal departments must be prepared to create and commit to a continuous collaborative workflow between their two worlds, in the pursuit of proper data governance and corporate protections that are much better suited for long-term collaboration, trust, and sentiment between companies and users.

Of course, the best way to ensure data protection for privacy is to collect no data in the first place, but if an organization simply cannot operate its core business within a zero-data-collection world, there are some protocols, processes and programs that can help put data protection by design in place.

Effective data protection is more than checking boxes off a list. First, enterprises must determine why they are keeping personal data. For each category of personal data they are collecting, there should be a defined reason that is transparent to the customer. Once agreed upon, they can build a process for the “how” of data protection that goes beyond a simple checklist. A holistic process that informs the entire cross-functional workflow and resulting products and programs is essential.

Most importantly, data use must be balanced against the protection of the individuals whose information is being collected. Architects can then take on a privacy-focused perspective as they review stories with product and develop plans for implementation with engineering.

During the design phase of a new product, service or program, or while making major changes to existing ones, be sure to consider the following eight questions before development begins:

  • What kind of data are you generating, accessing or collecting?
  • Do you need to collect all of this data, and if so, can you mask personally identifiable information (PII), or limit your collection to only what is necessary?
  • What systems will access or share this data, and are those systems appropriately managed with minimum access?
  • When granting access to others, can you limit what data is shared or transmitted?
  • Where and how is the data stored, how long will you keep it and how will you programmatically manage retention and deletion of this data?
  • Are there logs of data access and modification and if so, where? And for how long are they stored?
  • How would your organization satisfy a deletion request when storing PII?
  • What ways can you track and programmatically generate answers to these questions?
  • Answers to, and resulting policies for these questions are a great starting point for teams beginning to think more purposefully about data protection within their organizations. As these discussions ensue, it’s also important to set expectations with all parties involved. A common fear among developers when it comes to implementing data protection is that doing all of these things will slow down their progress. But investing in the creation of a secure process that works for your entire organization results in a better foundation for your product from day one.

 

A Governance Program

Once your organization has answered the “why” and “how” questions for data collection and protection, it’s time to set up an ongoing program that reinforces those processes and policies through regular education and training. Program goals should be organization-wide and cross-functional and should reduce ambiguity wherever possible. Setting clear definitions of personally identifiable data, and establishing and inspiring stewardship and sponsorship, are all critical components for driving understanding of these elements and buy-in by all stakeholders, aka, everyone in the organization.

Ultimately, the program should convey data protection-related information and decisions across the entire organization while clearly communicating these principles and processes with customers and prospects through regular policy reviews.

 

2020 and Beyond

By implementing a data protection by design approach, both before and during product developments, organizations will build more trust with customers and end users, and curtail risk of future privacy-related conflicts.

Data protection by design doesn’t just belong to software designers, developers and operators, but needs to be taken on by the whole organization. As companies shift their perspective on data protection and embrace a model that takes action at the design phase, the web will become a space where users understand and can control more of their data online.

How are you reaching your privacy goals for 2020?

KEYWORDS: COVID-19 Monitoring Solutions retail security risk management security industry

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0820 data slide2 900px

Lisa Phillips is VP of Data Governance at Fastly. She has 18 years of experience in Internet and web technologies with emphasis on systems and database administration, architecture, engineering and management.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data-protection-freepik1170x658v504.jpg

    How a more unified approach to data protection will help in the fight against ransomware

    See More
  • SEC_Web_5Minutes-Amiga-0123_1170x658.jpg

    How to protect company data & preserve user privacy

    See More
  • quantum-tech-freepik1170.jpg

    Quantum computing cybersecurity bill to help strengthen data protection & national security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!