2025-09-04
For many software companies, and most business in general, data is now recognized as a competitive advantage. How does Facebook, and others, make money offering you a ‘free’ service? It sells your data - about your web habits, your friends, even your menstrual cycles - to advertisers.
What are the tradeoffs in apps that use this advertising-based approach, from their perspective?
As a CTO, we would have to balance the revenue generation piece, including our ability to improve our products internally, with the potential fall-out if people’s medical or other information was released or obtained. At UVic for example there are strict data protection policies in place.
It is less clear what financial impact privacy breaches have on for profit companies. A breach of credit cards at Target seems to have cost about 300 million.
On the positive side, this is a major revenue source: for Facebook and Google, advertising and personal information are the vast majority of their revenue. This arguably allows them to provide benefits, such as free email, free search engines, etc.
Private information is defined to be “any information relating to an individual, whether it relates to his or her private, professional or public life.” This is often abbreviated as PII, personally identifiable information. But it is not just about your direct info, like SIN, Address, Height/Weight.
Think about a table that collected HIV positive individuals per postal code. How many HIV positive records would you need to guarantee anonymity? Even if the individual’s name was redacted, there’s a good chance we could figure it out by inference (e.g., a nurse stops at that house every day), or by joining it with other records (e.g., amazon purchase history).
Thus an emerging QA has become the need to consider privacy of the people whose data you collect. There are at least three legal frameworks to think about here.
If an organization is found to violate the GDPR, the organization could face a maximum fine the greater of either four percent of annual revenue or 20 million euros.
Reports leading up to the deadline (when the bill became law) show that a significant number of organizations were woefully unprepared for the GDPR. On the official day of GDPR enforcement, many organizations simply shut down violating aspects of their system because there was no other remedy to comply with the GDPR by the deadline.
Like the GDPR, the California Consumer Privacy Act CCPA applies to such a large set of companies and individuals that in many cases compliance, regardless of where you live/headquarter is irrelevant.
GDPR Mandates:
In addition, the GDPR also bestows a plethora of rights to each data subject, such as
We brainstormed some scenarios.
#Privacy Tactics
One thing to emphasize is that it is really hard to add privacy - or security, for that matter - after a breach. Thus, effective design for privacy (or security) is often “build privacy in” from day one.
There is no existing tactics tree for privacy, so let’s create a quick one.
As input we have (Q) - something like “attempt to obtain PII” and our response should be (Q) “system detects, reacts and repairs breach”. See the security tactics in the book, which are similar. We will rely on Hoepman’s Strategies book in the following discussion.
Minimise : Limit as much as possible the processing of personal data.
Separate: Separate the processing of personal data as much as possible.
Abstract: Limit as much as possible the detail in which personal data is processed.
Hide : Protect personal data, or make it unlinkable or unobservable. Make sure it does not become public or known.
Inform: Inform data subjects about the processing of their personal data in a timely and adequate manner.
Control : Provide data subjects adequate control over the processing of their personal data.
Enforce: Commit to processing personal data in a privacy-friendly way, and adequately enforce this.
Demonstrate : Demonstrate you are processing personal data in a privacy-friendly way.
Look through the HomeAssistant source code. Identify 2 examples of PII and privacy scenarios, and see if the developers have done anything to mitigate this (hint: what happens to stored camera footage?)

Neil Ernst ©️ 2024-5