Privacy
Core principles and measures for protecting personal data that guide technical and organizational decisions.
Classification
- ComplexityMedium
- Impact areaOrganizational
- Decision typeArchitectural
- Organizational maturityAdvanced
Technical context
Principles & goals
Use cases & scenarios
Compromises
- Incomplete data inventory leads to compliance breaches.
- Missing or poor consent processes can trigger fines.
- Overly restrictive measures can impair analytics and product features.
- Apply Privacy by Design and Privacy by Default.
- Introduce automated deletion and retention processes.
- Perform regular Data Protection Impact Assessments.
I/O & resources
- Data inventories and processing records
- Legal requirements and policies
- Technical architecture and data flows
- Privacy policy, DPIAs and technical migration plans
- Configuration and implementation requirements
- Audit reports and evidence documentation
Description
Privacy describes principles and measures to protect personal data and preserve confidentiality, integrity, and availability. Concepts such as data minimization, purpose limitation, pseudonymization, and Privacy by Design guide technical and organizational decisions. It affects system architecture, processes, compliance, and user interactions.
✔Benefits
- Reduced legal risk and compliance assurance.
- Higher user trust through transparency and control.
- Better data quality through targeted collection and storage.
✖Limitations
- Technical limitations for retroactive anonymization.
- Additional development effort and operational costs.
- Legal uncertainties for cross-border data transfers.
Trade-offs
Metrics
- Number of reported privacy incidents
Measure incidents per period to assess risk level.
- Time to fulfill a data access request
Average time from request to delivery of data to requester.
- Share of minimized / pseudonymized datasets
Percentage of sensitive data that is minimized or pseudonymized.
Examples & implementations
GDPR compliance in an EU product
Implementation of data minimization, rights management and processing register to meet regulatory requirements.
Privacy by Design for mobile apps
Architecture opts for local storage, limited telemetry and opt-in for analytics.
Pseudonymization in analytics pipelines
Identifiers are replaced before aggregation and access to raw data is restricted.
Implementation steps
Create and prioritize a data inventory.
Integrate privacy requirements into architecture and design.
Implement technical measures (pseudonymization, encryption).
Establish processes for access, deletion and monitoring.
⚠️ Technical debt & bottlenecks
Technical debt
- Legacy systems without deletion mechanisms and missing metadata.
- Ad-hoc workarounds for consent management instead of stable solutions.
- Missing automated tests for privacy features.
Known bottlenecks
Misuse examples
- Insufficient anonymization leads to re-identification.
- Missing access logging prevents traceability.
- Consents are hard to find and presented unclearly.
Typical traps
- Focusing only on legal requirements and neglecting technical implementation.
- Planning one-off measures without long-term governance.
- Complex pseudonymization without recoverability for legitimate purposes.
Required skills
Architectural drivers
Constraints
- • Legal requirements vary by region and change over time.
- • Third-party technical dependencies may impose constraints.
- • Performance requirements must not be unreasonably impaired by privacy measures.