https://www.enisa.europa.eu/publications/data-protection-engineering
Table of content:
1. INTRODUCTION
1.1 DATA PROTECTION BY DESIGN
1.2 SCOPE AND OBJECTIVES
1.3 STRUCTURE OF THE DOCUMENT
2. ENGINEERING DATA PROTECTION
2.1 FROM DATA PROTECTION BY DESIGN TO DATA PROTECTION ENGINEERING
2.2 CONNECTION WITH DPIA
2.3 PRIVACY ENHANCING TECHNOLOGIES
3. ANONYMISATION AND PSEUDONYMISATION
3.1 ANONYMISATION
3.2 k-ANONYMITY
3.3 DIFFERENTIAL PRIVACY
3.4 SELECTING THE ANONYMISATION SCHEME
4. DATA MASKING AND PRIVACY-PRESERVING COMPUTATIONS
4.1 HOMOMORPHIC ENCRYPTION
4.2 SECURE MULTIPARTY COMPUTATION
4.3 TRUSTED EXECUTION ENVIRONMENTS
4.4 PRIVATE INFORMATION RETRIEVAL
4.5 SYNTHETIC DATA
5. ACCESS. COMMUNICATION AND STORAGE
5.1 COMMUNICATION CHANNELS
5.1.1 End to End Encryption
5.1.2 Proxy & Onion Routing
5.2 PRIVACY PRESERVING STORAGE
5.3 PRIVACY-ENHANCING ACCESS CONTROL, AUTHORIZATION AND AUTHENTICATION
5.3.1 Privacy-enhancing attribute-based credentials
5.3.2 Zero Knowledge Proof
6. TRANSPARENCY, INTERVENABILITY AND USER CONTROL TOOLS
6.1 PRIVACY POLICIES
6.2 PRIVACY ICONS
6.3 STICKY POLICIES
6.4 PRIVACY PREFERENCE SIGNALS
6.5 PRIVACY DASHBOARDS
6.5.1 Services-side privacy dashboards
6.5.2 User-side privacy dashboards
6.6 CONSENT MANAGEMENT
6.7 CONSENT GATHERING
6.8 CONSENT MANAGEMENT SYSTEMS
6.9 EXERCISING RIGHT OF ACCESS
6.9.1 Delegation of Access Rights Requests
6.10EXERCISING RIGHT TO ERASURE, RIGHT TO RECTIFICATION
7. CONCLUSIONS
7.1 DEFINING THE MOST APPLICABLE TECHNIQUE
7.2 ESTABLISHING THE STATE-OF-THE-ART
7.3 DEMONSTRATE COMPLIANCE AND PROVIDE ASSURANCE
8. REFERENCES