Book description
Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits.In Data Privacy you will learn how to:
- Classify data based on privacy risk
- Build technical tools to catalog and discover data in your systems
- Share data with technical privacy controls to measure reidentification risk
- Implement technical privacy architectures to delete data
- Set up technical capabilities for data export to meet legal requirements like Data Subject Asset Requests (DSAR)
- Establish a technical privacy review process to help accelerate the legal Privacy Impact Assessment (PIA)
- Design a Consent Management Platform (CMP) to capture user consent
- Implement security tooling to help optimize privacy
- Build a holistic program that will get support and funding from the C-Level and board
Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You’ll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free language. The book’s constant awareness of business requirements will help you balance trade-offs, and ensure your user’s privacy can be improved without spiraling time and resource costs.
About the Technology
Data privacy is essential for any business. Data breaches, vague policies, and poor communication all erode a user’s trust in your applications. You may also face substantial legal consequences for failing to protect user data. Fortunately, there are clear practices and guidelines to keep your data secure and your users happy.
About the Book
Data Privacy: A runbook for engineers teaches you how to navigate the trade-offs between strict data security and real world business needs. In this practical book, you’ll learn how to design and implement privacy programs that are easy to scale and automate. There’s no bureaucratic process—just workable solutions and smart repurposing of existing security tools to help set and achieve your privacy goals.
What's Inside
- Classify data based on privacy risk
- Set up capabilities for data export that meet legal requirements
- Establish a review process to accelerate privacy impact assessment
- Design a consent management platform to capture user consent
About the Reader
For engineers and business leaders looking to deliver better privacy.
About the Author
Nishant Bhajaria leads the Technical Privacy and Strategy teams for Uber. His previous roles include head of privacy engineering at Netflix, and data security and privacy at Google.
Quotes
I wish I had had this text in 2015 or 2016 at Netflix, and it would have been very helpful in 2008–2012 in a time of significant architectural evolution of our technology.
- From the Foreword by Neil Hunt, Former CPO, Netflix
Your guide to building privacy into the fabric of your organization.
- John Tyler, JPMorgan Chase
The most comprehensive resource you can find about privacy.
- Diego Casella, InvestSuite
Offers some valuable insights and direction for enterprises looking to improve the privacy of their data.
- Peter White, Charles Sturt University
Publisher resources
Table of contents
- inside front cover
- Data Privacy
- Copyright
- brief contents
- contents
- front matter
- Part 1. Privacy, data, and your business
-
1 Privacy engineering: Why it’s needed, how to scale it
- 1.1 What is privacy?
- 1.2 How data flows into and within your company
- 1.3 Why privacy matters
- 1.4 Privacy: A mental model
- 1.5 How privacy affects your business at a macro level
- 1.6 Privacy tech and tooling: Your options and your choices
- 1.7 What this book will not do
- 1.8 How the role of engineers has changed, and how that has affected privacy
- Summary
-
2 Understanding data and privacy
- 2.1 Privacy and what it entails
- 2.2 This could be your company
- 2.3 Data, your business growth strategy, and privacy
- 2.4 Examples: When privacy is violated
- 2.5 Privacy and the regulatory landscape
- 2.6 Privacy and the user
- 2.7 After building the tools comes the hard part: Building a program
- 2.8 As you build a program, build a privacy-first culture
- Summary
- Part 2. A proactive privacy program: Data governance
- 3 Data classification
-
4 Data inventory
- 4.1 Data inventory: What it is and why you need it
- 4.2 Machine-readable tags
- 4.3 Creating a baseline
- 4.4 The technical architecture
- 4.5 Understanding the data
- 4.6 When should you start the data inventory process?
- 4.7 A data inventory is not a binary process
- 4.8 What does a successful data inventory process look like?
- Summary
- 5 Data sharing
- Part 3. Building tools and processes
- 6 The technical privacy review
-
7 Data deletion
- 7.1 Why must a company delete data?
- 7.2 What does a modern data collection architecture look like?
- 7.3 How the data collection architecture works
- 7.4 Deleting account-level data: A starting point
- 7.5 Deleting account-level data: Automation and scaling for distributed services
- 7.6 Sensitive data deletion
- 7.7 Who should own data deletion?
- Summary
- 8 Exporting user data: Data Subject Access Requests
- Part 4. Security, scaling, and staffing
- 9 Building a consent management platform
- 10 Closing security vulnerabilities
- 11 Scaling, hiring, and considering regulations
- index
- inside back cover
Product information
- Title: Data Privacy
- Author(s):
- Release date: February 2022
- Publisher(s): Manning Publications
- ISBN: 9781617298998
You might also like
book
Practical Data Privacy
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there …
book
Data Privacy and GDPR Handbook
The definitive guide for ensuring data privacy and GDPR compliance Privacy regulation is increasingly rigorous around …
book
Hands-On Healthcare Data
Healthcare is the next frontier for data science. Using the latest in machine learning, deep learning, …
book
Modern Data Protection
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by …