Kevin Trilli | TRUSTe
Joanne Furtsch| TRUSTe
Dir. Product Policy
The concept of privacy-by-design was first introduced by the Canadian Privacy Commissioner Ann Cavoukian as early as in 1990s. Since then, the importance of it in business has only increased over time. Almost every week, we see companies of all sizes in the news because of some privacy issue. this often times creates brand and reputational damage for these companieseven when the facts are not as alleged.
Assuming most companies are not intentionally doing things wrong, what is happening? The privacy landscape is changing. A combination of governmental, media and academic pressure is changing the way privacy is monitored by the community at large. There are now experts that are proactively looking for violations and using the mainstream media to get their message out quickly in a way to evoke change. It is no longer the average consumer you need to consider in your risk calculation.
So what is really needed to achieve privacy-by-design? TRUSTe has been helping companies to do it since 1997. In this blog I list seven principles when incorporating Privacy by Design into.your product design process.
Consider privacy at the design stage looking at things such as how much information you are collecting and assessing whether you are collecting more information than what is necessary to achieve your business goals.
Incorporating privacy at design stage will reap benefits down the road in terms of earning the trust of your consumers, and potentially keeping your company from incurring the unexpected costs associated with not taking privacy into account. An example of company that had a promising future but did not take privacy into account at the design stage is Ringleader. RingLeader was forced to shut down because they didn’t incorporate privacy into their, otherwise very promising, MediaStamp advertising technology.
Provide consumers mechanisms by which to express their preferences over how tthe information you collect from them is used, and access that information to correct, updated, and/or delete it. Examples of some of the types of controls you can provide to consumers:
- If you collect behavioral data to provide targeted advertising, you should give consumers an easy and effective way to express their preference to recieve targeted ads. (see TRUSTe Trusted Ads program).
- If you collect personally-identifiable information, your company should provide a way a user to correct his/her profile or remove it (see TRUSTe Privacy Seal Program).
- If you distribute software, consumers should have consented to install the softare and then uninstall it completely from their systems (see TRUSTe Trusted Download Program).
Another layer if accountability is having an independent third party review and verify that your actual privacy practices are consistent and comply with stated practices. A third party seal is a good outward indicator that communicates your company’s commitment to privacy and that your company is willing to hold itself accountable to its privacy promises.
Make user you have the processes in place to not only mange the data you collect but also to comply with your stated privacy promises. Things to consider:
- Employee training: such as customer service representatives, who access collected information in order to perform their job function
- Data Retention Policies: how long you need to retain the information you collect. Processes should be in place to periodically purge out-of-date or inactive customer records
- Security Measures: what measures are in place to protect collected information. Consider things such as how you will protect systems from vulnerabilities, whether information needs to be stored in an encrypted format, and who requires access based upon job function.
The processes put in place should be appropriate for size of your business and the level of sensitivity of the information you collect and store on your systems. If you collect and store sensitive information like credit card numbers, you will need to take more stringent measures to protect that information then a company that collects only email addresses.
Partner and vendor management
Know who you work with. Have processes in place to review potential partners and vendors your company uses to provide services such as hosting, payment processing, email management, and advertising. These companies should have policies in place that are similar to yours to ensure the information you entrust to them is processed in a responsible manner. Ultimately your company is responsible for the information it collects, and this includes third parties that are processing information on your company’s behalf.
Develop criteria and have processes in place to review potential partners and vendors looking at how they process and protect the information that will be provided to these companies.
Respect for users