Please log in to watch this conference skillscast.
You live in a world of poorly protected persistent data silos, the digital equivalent of a rusty tin box tied up with string and buried in a somewhat disheveled flowerbed. The owners of these silos hoard a bewildering array of personal data on everyone who interacts with them on the off chance that some of this might be useful to them in the future or have concrete resale value. A vast industry exists to help secure these silos once they exist, but rarely does anyone asks the key existential question: do you need all that data in the first place?
In most cases, the answer is no, and by collecting and storing this personal data you’re endangering both your systems and the people who use them.
Across the developed world, the outcry over high-profile data breaches has forced legislators to take action, introducing strict new regulations on how personal data can be stored and the rights of individuals both to control their data and to be forgotten. So how as IT professionals can we deal with this new reality? And what are the implications as the IoT expands the scope of personal data and new analytic tools make it increasingly transparent?
Join Eleanor to explore the relationship between privacy and identity, the slippery nature of consent, and how you can prove after the event that our applications acted correctly. Can you really design all this into your processing systems from their very inception? And if so, how?
YOU MAY ALSO LIKE:
Don't Ask, Don't Tell the Virtues of Privacy by Design
Eleanor McHugh has a passion for the esoteric corners of programming stretching back to her misspent teenage years. During the course of her career she’s worked on mission critical systems ranging from avionics to banking security and digital trust arbitration. Ellie now devotes her time to writing digital romances in Ruby, Go & Crystal, exploring the complex relationship between anonymity and trust in digital spaces.