{"id":265,"date":"2016-04-08T14:01:45","date_gmt":"2016-04-08T14:01:45","guid":{"rendered":"http:\/\/securitybydesign.de\/?p=265"},"modified":"2016-04-08T14:01:45","modified_gmt":"2016-04-08T14:01:45","slug":"how-to-boost-application-privacy","status":"publish","type":"post","link":"https:\/\/securitybydesign.de\/?p=265","title":{"rendered":"How to boost application privacy"},"content":{"rendered":"<p>Privacy engineering is on the run and the upcoming EU Data Protection Regulation further pushes the requirement of Privacy by Design (PbD). So there is a need for guidelines and patterns on how to implement PbD and there are some recent developments and publications. The OWASP Top 10 Privacy Risks Project <a href=\"https:\/\/www.owasp.org\/images\/0\/0a\/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf\">published hints and best practices<\/a> on how to avoid privacy risks in web applications. On <a href=\"http:\/\/privacypatterns.eu\">privacypatterns.eu<\/a> you can read about how to implement pseudonymous messaging or protection against tracking among others. Also <a href=\"http:\/\/privacypatterns.org\/\">privacypatterns.org<\/a> provides valuable\u00a0information.<\/p>\n<div class=\"shariff\" data-title=\"How to boost application privacy\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/securitybydesign.de\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"gftlx\" data-services='[\"googleplus\",\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"info\"]' data-image=\"\" data-url=\"https:\/\/securitybydesign.de\/?p=265\" data-lang=\"en\" data-theme=\"round\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Privacy engineering is on the run and the upcoming EU Data Protection Regulation further pushes the requirement of Privacy by Design (PbD). So there is a need for guidelines and patterns on how to implement PbD and there are some &hellip; <a href=\"https:\/\/securitybydesign.de\/?p=265\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,4],"tags":[],"class_list":["post-265","post","type-post","status-publish","format-standard","hentry","category-law-politics","category-privacy"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=265"}],"version-history":[{"count":1,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/265\/revisions"}],"predecessor-version":[{"id":266,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/265\/revisions\/266"}],"wp:attachment":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}