Please log in to watch this conference skillscast.
In most cases, the answer is no, and by collecting and storing this personal data you’re endangering both your systems and the people who use them.
Across the developed world, the outcry over high-profile data breaches has forced legislators to take action, introducing strict new regulations on how personal data can be stored and the rights of individuals both to control their data and to be forgotten. So how as IT professionals can we deal with this new reality? And what are the implications as the IoT expands the scope of personal data and new analytic tools make it increasingly transparent?
Join Eleanor to explore the relationship between privacy and identity, the slippery nature of consent, and how you can prove after the event that our applications acted correctly. Can you really design all this into your processing systems from their very inception? And if so, how?
YOU MAY ALSO LIKE:
Don't Ask, Don't Tell the Virtues of Privacy by Design
Eleanor McHugh
Eleanor McHugh has a passion for the esoteric corners of programming stretching back to her misspent teenage years. During the course of her career she’s worked on mission critical systems ranging from avionics to banking security and digital trust arbitration. Ellie now devotes her time to writing digital romances in Ruby, Go & Crystal, exploring the complex relationship between anonymity and trust in digital spaces.