{"id":207,"date":"2020-03-07T13:37:19","date_gmt":"2020-03-07T13:37:19","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=207"},"modified":"2020-03-07T13:37:19","modified_gmt":"2020-03-07T13:37:19","slug":"privacy-by-design","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/privacy-by-design\/","title":{"rendered":"Privacy by Design"},"content":{"rendered":"\n<p>Privacy has always been context related, but our data hungry society has added various extra dimensions to it. the perception of it today is not only considered an ethical question but it also poses various economical, legal and technical questions. And the main answer to it all \u2013 required by society and law \u2013 is Privacy by Design. unfortunately, it is very hard to find out how to achieve it. <\/p>\n\n\n\n<p>Technological development is not only increasing our ability to store and exploit data, but is also nudging us to share tremendous amount of personal information. In a current economy that classifies data as an asset, a commodity and even a currency, personal data has a huge value potential. <\/p>\n\n\n\n<p>Consumers worry about violation of their privacy \u2013 caused by data breaches as well as by misuse of their personal data. The challenge is to establish an environment in which a fundamental human right to privacy and safety is also applied in context of data \u2013 data privacy protection \u2013 while the economic value is maintained. <a href=\"https:\/\/cdn2.hubspot.net\/hubfs\/5096489\/Collateral\/The Hitchhikers Guide to Privacy by Design.pdf\">Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed     solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy has always been context related, but our data hungry society has added various extra dimensions to it. the perception of it today is not only considered an ethical question but it also poses various economical, legal and technical questions. And the main answer to it all \u2013 required by society and law \u2013 is &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/privacy-by-design\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Privacy by Design&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[7],"tags":[],"class_list":["post-207","post","type-post","status-publish","format-standard","hentry","category-privacy"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/207\/revisions"}],"predecessor-version":[{"id":208,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/207\/revisions\/208"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}