Privacy by Design

Privacy by Design is in our blood. We believe that every project should start with this first step, which is Privacy for Design. This is not only to protect personal data, but once personal data is protected, personal data can be used to optimize automated campaign flows.

And therefore, the better you take care of your data, the easier it will be to use.

Privacidad por diseño

How Does Privacy By Design Work?

Privacy by Design promotes the view that the future of privacy cannot be guaranteed just by complying with regulatory frameworks; rather, ideally privacy assurance should become an organization’s default mode of operation.

Design Privacy principles may apply to all types of personal information, but should be applied with special force to sensitive data such as medical information and financial data. The robustness of privacy measures tends to be corresponding to the sensitivity of the data.

Privacy by Design extends to a “Trilogy” of applications that encompass:

  1. information technology systems
  2. responsible business practices and
  3. physical design and networked infrastructure.

The 7 Fundamental Principles

The objectives of Privacy by Design – to ensure privacy and gain personal control of their own information, and for organizations, to gain a sustainable competitive advantage – can be achieved by practicing the 7 Fundamental Principles:

The Privacy by Design (PbD) approach is characterized by proactive, rather than reactive, measures. Anticipate and prevent privacy invasion events before they occur. PbD does not wait for the risks to materialize, nor does it offer remedies to resolve privacy violations once they have already occurred – their purpose is to prevent them from occurring.

In short, Privacy by Design arrives before the event, not after.

We can all be sure of one thing – the default is what it commands! Design Privacy seeks to deliver the highest degree of privacy by ensuring that personal data is automatically protected in any given IT system or in any business practice. If a person doesn’t take an action, privacy still remains intact. No action is required from the person to protect privacy – it is interconnected in the system, as a default setting.

Privacy by Design is embedded in the design and architecture of Information Technology systems and business practices. It is not hung as a supplement, after the event. The result is that privacy becomes an essential component of the core functionality being delivered. Privacy is an integral part of the system, without diminishing its functionality.

Privacy by Design seeks to accommodate all legitimate interests and objectives in a “win-win” way, not through an outdated “if someone wins, someone loses” method, where unnecessary concessions are made.

“Everyone wins,” not “If someone wins, another loses”

Privacy by Design avoids the hypocrisy of false dualities, such as privacy versus security, proving that it is possible to have both at the same time.

Having been embedded in the system before the first piece of information has been collected. Privacy by Design extends securely through the entire lifecycle of the data involved – robust security measures are essential for privacy, from start to finish. This ensures that all data is securely retained, and then safely destroyed at the end of the process, without delay.

Full Lifecycle Protection

Therefore, Privacy by Design ensures secure management of the information lifecycle, from the cradle to the grave, from one end to the other.

Privacy by Design seeks to assure everyone involved that whatever business practice or technology involved, it is actually operating according to the stated promises and objectives, subject to independent verification.

Keeping It Open

Its component parts and operations remain visible and transparent, to users and suppliers. Remember, trust but check.

Maintaining a User-Centered Approach Above all, Privacy by Design requires architects and operators to keep people’s interests in a higher position, offering measures such as robust privacy presets, appropriate notification, and empowering user-friendly options. The user must be kept at the center of the priorities.

How can Mediascope help

If you are active in digital marketing, you are constantly dealing with confidential customer data. The question is: how do you handle it?

We believe that privacy should be central to the development of new systems and the maintenance of existing ones. Not just because of the laws and regulations. If you respect privacy, the quality of your contacts' personal data will increase considerably. Which is very useful for an optimal campaign with maximum conversion.

We can help you verify existing processing processes, clean the database, and set up automated campaigns, all within privacy laws and regulations.

We can analyze the various aspects together with our partners. Each partner has its specialty, which produces better and faster results.

It is not only the automation of communication flows. The best channel will also have to be chosen for each message. Each channel has its advantages and idiosyncrasies.

We make sure that your existing systems are linked. This means that you do not have to make expensive investments. We work with all known systems for the most effective communication with the client.

With our solutions, you are complying with the protection of personal data. We ensure that all customer data is always kept secure.

featured

The history of Privacy by Design

Privacy by Design is a concept I developed back in the 90’s, to address the ever-increasing and systematic effects of Information and Communications Technologies, and large-scale network data systems.

Initially the development of Privacy Enhancement Technologies (PET) was seen as a solution.

Today, we realize that a more substantial approach is required – extending the use of PETs to PETs Plus – by taking a “everyone win” method (total functionality), rather than “if someone wins, another loses”. This is the “Plus” in the PETs Plus: “everyone wins”, not a condition of “one thing or the other” of the model “if someone wins, another loses” (a false duality).

The better you care your data,
the easier it will be to use them.