Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
The Privacy Engineer's Companion: A Workbook of Guidance, Tools, Methodologies, and Templates
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

The Privacy Engineer's Companion: A Workbook of Guidance, Tools, Methodologies, and Templates

The Privacy Engineer's Companion: A Workbook of Guidance, Tools, Methodologies, and Templates

Michelle Finneran / Fox Dennedy

206 pages, parution le 31/12/2019

Résumé

Intermediate-Advanced user levelEngineer privacy into software, systems, and applications. This book is a resource for developers, engineers, architects, and coders. It provides tools, methodologies, templates, worksheets, and guidance on engineering privacy into software-from ideation to release and beyond-for technologies, products, systems, solutions, and applications.
This book can be used in conjunction with the ApressOpen bestseller, The Privacy Engineer's Manifesto . This book trains and equips users to engage in their own privacy scoping requirements workshops, write privacy use cases or "stories" for agile development, document UI privacy patterns, conduct assessments, and align with product and information security teams. And, perhaps most importantly, the book brings clarity to a vitally important need-the protection of personal information-that is often shrouded in mystery during the engineering process. Go from policy to code to QA to value, all within these pages.


What You Will Learn
  • Think of the Fair Information Principles as actionable, normative statements
  • Decode privacy into functional requirements that can be designed and coded
  • Prepare and conduct a privacy scoping requirements workshop
  • Translate privacy requirements into usable stories for agile development
  • Guide user interface designers in creating privacy controls and interfaces
  • Access software, systems, applications, and apps to see if the necessary privacy controls are in place
  • Create privacy engineering documentation (such as data flow diagrams and privacy impact assessments) so that tribal lore is translated into institutional knowledge
  • Access and ready the enterprise to support privacy engineering


Who This Book Is For
Serves multiple stakeholders, including those involved in architecting, designing, developing, deploying, and reviewing systems, products, processes, applications, and apps that process personal information. This workbook will appeal to software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals.

Section 1: Privacy Engineering is Process, Data, and Innovation Centric

Introduction

Characteristics of Privacy Engineering

Privacy Engineering is Process-Centric

Privacy Engineering is Data-Centric

Privacy Engineering is Innovation-Centric

Privacy Engineering builds on PbDTM

Workbook Use Case: MyCareerStages

Conclusion

Section 2: The Six Steps of the Privacy Engineering Process

The Aha! Moment

Step 1: Identifying the Enterprise & User Goals

Step 3: Mapping Requirements to Offering/Data Processes

Step 4: Embedding Privacy through Training, Processes and Technology

Step 5: Verifying Privacy Requirements are Met - Quality Assurance

Step 6: If any changes (and there is always change), go back to Step 1

Conclusion

Section 3: Privacy Engineering Implementation Best Practices

Practice 1: Establish A Privacy Aware Enterprise

Practice 2: Document User Goals with Privacy Aware Use Case(s)

Practice 3: Build and Maintain Your Enterprise Privacy Policy

Practice 4: Embed Privacy Engineering into Your Existing Development and Operational Lifecycle

Practice 5: Build Privacy Requirements into Privacy User Stories

Practice 6: Embed Privacy Controls via Privacy Enhancing Processes and Technologies

Practice 7: Embed Privacy Awareness and Transparency into the Organization

Practice 8: Managing Data with Operationalized Governance, Protection and Privacy

Practice 9: Gathering Requirements and Planning a Privacy Requirements Workshop

Conclusion

Section 4: Workbook Use Case Details

Epic 1: MyJobsFuture

Epic 2: MyRecruitingPlace

Epic 3: MyCareerStages

My FutureJobsRUs Privacy Statement/Policy

Conclusion

Section 5: Exercise Answers for FutureJobsRUs

Exercise 1: Identify PII

Exercise 2: Scoping your Organization Questionnaire Example for FutureJobsRUs

Exercise 3: Draw a Use Case Diagram

Exercise 4: Map Your Enterprise Policy into Privacy Requirements

Exercise 5: Capture the Data Inventory

Exercise 6: Complete Guide for Reviewing a User Diagram for Privacy Requirements

Exercise 7: Develop Privacy User Stories and Map to Agile Epic

Exercise 8: Identify Risk, Threat and Vulnerability

Exercise 9: Scoping Your Enterprise Organization

Exercise 10: Evaluate Your Design and Development Methodology

Exercise 11: Document Existing Privacy Enhancing Processes and Privacy Enhancing Technologies

Exercise 12: Map Privacy User Stories to PETs and PEPs.

Exercise 13: Develop a Privacy Data Sheet for your use case

Exercise 14: Complete a Privacy Impact Assessment for your use case

Exercise 15: Revisit Step 6 for Epic 2

Exercise 16: Revisit Step 6 for Epic 3

Section 6: Supplemental Information

Appendix 1: Terms & Foundational Concepts

Appendix 2: Operational Definition of Privacy

Appendix 3: Twelve Privacy Controls Framework

Appendix 4: Foundational Privacy Actors

Appendix 5: Agile Privacy Engineered User Stories

Appendix 6: Layering Privacy Engineering into Existing Development

Appendix 7: Privacy Requirements Workshop Sample Agenda

Appendix 8: Privacy Requirements Workshop Sample Slides

References

List of Figures

List of Tables

Section 7: Worksheet Pull-Outs

Worksheet 1: Identify PII attributes

Worksheet 2: Scoping your Organization Questionnaire

Worksheet 3: Use Case Diagram

Worksheet 4: Map Enterprise Policy into Privacy Requirements

Worksheet 5: Capture Data Inventory

Worksheet 6: Discussion Guide for Reviewing a Context Diagram for Privacy Requirements

Worksheet 7: Develop Privacy User Stories and Map to Agile Epic

Worksheet 8: Identify Risk, Threat and Vulnerability

Worksheet 9: Scoping Your Enterprise Data Foundation

Worksheet 10: Evaluate Your Design and Development Methodology

Worksheet 11: Document Existing Privacy Enhancing Processes and Privacy Enhancing Technologies

Worksheet 12: Map user stories to controls, PETs and PEPs.

Worksheet 13: Develop a Privacy Data Sheet for a User Story

Worksheet 14: Privacy Impact Assessment

Worksheet 15: Revisit Step 6 Questions


Michelle Finneran Dennedy (@mdennedy) is Vice President and Chief Privacy Officer at Cisco, where she works to raise awareness and create tools that promote privacy, quality, integrity, respect, and asset-level possibilities for data. A sought-after technology industry speaker and thought leader, Michelle is passionate about data privacy and protection, and for building better technology that matters. She works closely with families, executives, innovators, and dreamers at all levels and in businesses and organizations at all stages to support the combination of policy, practice, and tools. She is a board member of the International Association of Privacy Professionals (IAPP) and the Committee for Economic Development (CED), and the chair of the IEEE 7002 Working Group on Data Privacy.
Jonathan Fox is Director of Privacy Engineering and Strategy and Planning, a member of Cisco's Chief Privacy Office, and co-author of The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value (ApressOpen). With over 17 years of privacy experience, Jonathan's principal areas of focus have been product development, government relations, mergers and acquisitions, and training. He is a Certified Information Privacy Professional (CIPP/US), a Certified Information Privacy Manager (CIPM), and was a Certified Information Security Manager (CISM). Prior to joining Cisco, he was Senior Privacy Engineer at Intel. His previous roles have included Director of Data Privacy for McAfee, Director of Privacy for eBay, Deputy Chief Privacy Officer for Sun Microsystems, and Editor-in-Chief of sun.com. Jonathan frequently speaks at industry events and is a member of the IEEE P7002 Personal Data Privacy Working Group and the OASIS Privacy by Design Documentation for Software Engineers Technical Committee.
Thomas R. Finneran is a principal consultant for the iDennedy Project. He has proposed an approach to use the Organization for the Advancement of Structured Information Standards (OASIS) UML Standard for privacy analysis. Tom was a consultant for over 25 years for CIBER, Inc. He has acquired over 25 years of experience in the field of information technology. His strengths include: enterprise (including data, information, knowledge, business, and application) architecture, business and data analysis, UML object analysis and design, logical data modeling, database systems design and analysis, information resource management methodologies, CASE and metadata repository tools, project management, and computer law. He is experienced in almost all application system areas, including real-time data collection systems, inventory control, sales and order processing, personnel, all types of financial systems, the use of expert systems, and project management systems. Tom has developed and taught training courses in the areas of use cases, relational concepts, strategic data planning, logical data modeling, and the utilization of CASE tools, among others. He is also an experienced intellectual property patent lawyer. For various companies, he has held titles such as director, MIS; manager, corporate data strategy; manager, data administration; managing consultant; manager, standards and education; and systems designer. These companies include the Standard Oil Company, Corning Glass Works, ITT, ADR, and the US Navy. In addition, he was vice president and general counsel of TOMARK, Inc., and the developer of the highly successful ABEND-AID software package. Tom has a BA degree from Ohio State University, an MBA degree from Roosevelt University, and a JD degree from Cleveland State University. He is a member of the bar of the US Supreme Court and a member of the bar of Ohio, New Jersey, and Connecticut, and a member of the Patent Bar.
Lisa Bobbitt , CISSP, CIPM, CIPP-E, is the lead Privacy Engineering architect in Cisco's Privacy Office. She is passionate about embedding privacy awareness, governance, and technology across Cisco by building on the foundation of years of working and innovating (seven patents) in mainframe connectivity, mobile routing protocols, innovative concepts in 3D, voice/video/data in Stadium Vision, government adaptation, and trustworthy systems. Lisa believes that every person is a digital citizen and should be a privacy advocate, starting with understanding the value of authorized use of our personally identifiable information and that the processors of our personal data are making it easy for each of us to manage our PII. She has a BS degree in Computer Science from North Carolina State University and an MBA degree from Duke University.
Michele D. Guel (@MicheleDGuel) has been an avid speaker, influencer, and evangelist in the cybersecurity industry for 31 years. She joined Cisco in March of 1996 as the founding member of Cisco's internal security team. During her 23+ years at Cisco, she has worked in all facets of cybersecurity and has the established many "firsts" at Cisco. In 2010, Michele was promoted to Distinguished Engineer, one of eight female DEs across Cisco today. In 2014, she co-founded Cisco's Women in Cybersecurity Community which focuses on developing the next generation of women cybersecurity leaders. In 2014, she was named one of the SANS "People Who Make a Difference in Cybersecurity" and in 2016, she received the prestigious Anita Borg 2016 Women of Vision Technology Leadership Award. Her current focus is IoT security strategies.

Caractéristiques techniques

  PAPIER
Éditeur(s) Apress
Auteur(s) Michelle Finneran / Fox Dennedy
Parution 31/12/2019
Nb. de pages 206
EAN13 9781484237052

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription