The rise and fall of the DPO (Data Protection Officer)

Maybe you have noticed it. Privacy is an issue. A bit strange since there are only 20 days left until the new EU General Data Protection Regulation (GDPR) will become fully enforceable throughout the European Union.

So before end of May 2018 all organizations that process data of EU citizens must comply with this General Data Protection Regulation. Determining how to handle the GDPR is not straightforward. The 261 pages long is not known for its clarity. There is e.g. some confusion on the DPO. Continue reading “The rise and fall of the DPO (Data Protection Officer)”

Do you still use fingerprinting?

Maybe you have noticed it. Privacy is an issue. A bit strange since there are only 21 days left until the new EU General Data Protection Regulation (GDPR) will become fully enforceable throughout the European Union.

So before end of May 2018 all organizations that process data of EU citizens must comply with this General Data Protection Regulation. Determining how to design your systems to meet the GDPR is not straightforward. Especially when you make use of third-party services.

But tools and methods that can detect if you track users can help you when creating new Internet facing systems. Continue reading “Do you still use fingerprinting?”

GDPR: How to store personal data?

Maybe you have noticed it. Privacy is an issue. A bit strange since there are only 22 days left until the new EU General Data Protection Regulation (GDPR) will become fully enforceable throughout the European Union.

So before end of May 2018 all organizations that process data of EU citizens must comply with this General Data Protection Regulation. Determining how you should store private data is not straightforward. The GDPR has some guiding principles and you can find several documents with a title like ‘Privacy by Design’. Continue reading “GDPR: How to store personal data?”

No more confusion: An IP address is personal information

Maybe you have noticed it. Privacy is an issue. A bit strange since there are only 23 days left until the new EU General Data Protection Regulation (GDPR) will become fully enforceable throughout the European Union.

So before end of May 2018 all organizations that process data of EU citizens must comply with this General Data Protection Regulation. Determining exactly what private data is not straightforward. What does not help is that a lot of information on many sites regarding on what is allowed under the GDPR is plain wrong. E.g. there is a lot of confusion about the object ‘IP address’. Is an IP address personal information or not? Continue reading “No more confusion: An IP address is personal information”

The GDPR core principles

Maybe you have noticed it. Privacy is becoming an issue. A bit strange since there are only 24 days left until the new EU General Data Protection Regulation (GDPR) will become fully enforceable throughout the European Union.

Retrieving requirements and principles using the official GDPR document is crucial to make sure you apply to the regulation. Luckily the GDPR contains besides (a lot of) requirements also some key principles. Continue reading “The GDPR core principles”

How Security Personas will help you

One of the tools of IT architects and UX designers is to work with so called ‘Personas’. Personas are fictional characters created to represent the different user types that might use a system, website, product or service. Using personas is common practice when dealing with UX design. But when developing a security architecture for a new system, service or website security personas are also valuable to use. Security Personas force you to think different about the goals and behaviour of attackers that are going to hit your system. Continue reading “How Security Personas will help you”

Complex attack vectors

Good security is goal oriented. A good security architecture is tailored to your situation.
When defining a product or new (IT) service one of the key activities is to define your specific security requirements. Defining requirements is known to be hard, time consuming and complex. Especially when you have an iterative development cycles and you do not have yet a clear defined view of your final product or service to be created. Continue reading “Complex attack vectors”