TwoBlackLabs - Privacy and Data Protection (GDPR) Consultancy Services
  • Home
  • About Us
    • Who are our key people?
    • What makes us different?
    • What do our clients think?
  • GDPR
    • Does GDPR apply to us?
    • What are the key facts?
    • The role of a Data Protection Officer
    • GDPR services
    • Virtual Data Protection Officer services
  • Privacy
    • Privacy Impact Assessments (PIA)
    • Privacy services
    • Information sharing services
    • Privacy by Design workshops
  • Security
  • Contact Us
Picture

Privacy by Design Workshops

2019 Expressions of Interest
Most current approaches to 'privacy by design' are mere Band-Aids, after-the-fact application of either security controls or notice/choice controls. Proper Privacy by Design, embodying the principles of 'privacy embedded into design,' 'privacy by default,' and being 'proactive, not reactive,' requires more analysis, substantially more forethought, and design hinged on the privacy risks rather than current practices.
8ason's workshops sold out completely with a long waiting list in October 2018. We are therefore planning on arranging a return visit in 2019 if we have enough interest.
About the Trainer
Picture
 Jason Cronk CIPP/US, CIPM, CIPT, FIP

Jason Cronk is a leading international expert in Privacy by Design. Jason regularly teaches and presents internationally regarding Privacy by Design and is also the author of a forthcoming book for the IAPP Strategic Privacy by Design.
His focus is on helping companies overcome the socio-technical challenges of privacy through privacy engineering and Privacy by Design. He is an IAPP Fellow of Information Privacy, a Privacy by Design ambassador, a licensed attorney in Florida, an author, blogger, speaker and passionate advocate for understanding privacy. His unique background includes a combination of entrepreneurial ventures, work in small and large businesses, strong information technology experience and legal training.

Jason writes regularly for both his own blog and a monthly column on privacy and big data for BigDataStartups.com. He has been a guest speaker at his alma mater, FSU College of Law, on privacy law and frequently speaks at IAPP events and can be found on Twitter at @privacymaverick.
The Workshop
The workshop consists of four  sessions:

Session 1 - Building a Model: Actors and Violations
In this session, attendees will be introduced to the privacy by design concept and then learn how to identify individuals at risk, threat actors and potential privacy breaches. Attendees will work through an interactive example to explore building a privacy model from scratch.

Session 2 - Controls: Architecture, Strategies and Tactics
This session will examine the available controls to mitigate the risks from privacy breaches. Attendees will first look at system architecture and its role in creating privacy friendly processes. Next will be a systematic walk through of strategies and tactics than can be used.

Session 3  - Analysing Privacy Risks
Attendees will discuss the consequences to individuals of privacy breaches. This will be used to help build a privacy risk model based on FAIR, the Factors Analysis on Information Risk

Session 4  - The Design Process
In this session, all the elements will come together in a cohesive process to architect a privacy friendly system, secure data, supervise the use of data and balance individual interests against organizational activities. Attendees will have the opportunity to apply the design process to real world examples.
Privacy Statement
  • Home
  • About Us
    • Who are our key people?
    • What makes us different?
    • What do our clients think?
  • GDPR
    • Does GDPR apply to us?
    • What are the key facts?
    • The role of a Data Protection Officer
    • GDPR services
    • Virtual Data Protection Officer services
  • Privacy
    • Privacy Impact Assessments (PIA)
    • Privacy services
    • Information sharing services
    • Privacy by Design workshops
  • Security
  • Contact Us