You are on page 1of 2

a. What is the article all about?

The article is about the blog post entitled “Privacy Concept” basically the blog is all about security and
privacy, it gives the story of a certain person named Karen Hepp, her image was captured by the
surveillance camera and according to her, was used prurient and illicit purposes that caused serious
permanent and irreparable harm to her, basically her privacy was violated In the second part of the
paragraph talks about why the other country has already implemented a general data protection
regulation. It explains why the digital world really need to be more secure and safe for the users and why
we need a program that protects your personal information in order to avoid loss of data, used by other
people without consent, used for prurient and illicit purposes, and as well as to have better protection
practices. Furthermore, the article talks about what might happen if we don’t implement data protection
regulation in our system, and how the other countries deal with data privacy, and what data privacy
design should we implement, what kind of technique should we use and lastly the blog also discussed
what is the widely accepted definition of data engineering which in fact the idea came from NIST.

b. Explain how privacy by design and privacy engineering operate together.


Privacy engineering talks about bringing tools, technique, metrics and viable approach. It is a practice off
building tools and processes that apply privacy protections to personal data. On the contrary, the privacy
design is the objective, it is an approach taken when creating new technologies and systems. It is when
privacy is incorporated into tech and systems. Both of them operates together. While privacy engineering
is the technique that can be implemented to achieve a privacy design, By building privacy protections at
the core design, privacy engineering aims to reduce privacy risks and to protect privacy at scale. The
developer thinks of ways what privacy engineering technique should he use so he can approach the
correct way of privacy design so he/ she can ensure the protection for the privacy of individuals by
integrating considerations of privacy issues from the very beginning of the development of products,
services, business practices, and physical infrastructures. Basically, privacy by design is an approach while
the privacy engineering is the implementation. Both should operate together. Think of it as the Brain and
the hands, for one must progress, two should work together, privacy by design is the brain, it brings the
idea on how to approach while on the other hand, privacy engineering is the hand, it handles things and
how can it be implemented.

c. Do you agree with the article? Why or why not


Yes, Because why not? It is true that we are currently in technology driven life, it is already the right time
to think of ways on how we can implement privacy and protect people from various illicit and harmful
ways while still focused on achieving freedom of the society. Therefore we need to act in correct manner
and to really implement various factors such as, as we discussed, the privacy by design and privacy
engineering. Our life is evolving faster than we anticipated and thus we should cope with it and adopt
the fast-changing future that we currently have. We should approach things with working technique,
metrics and taxonomy to implement privacy design. By doing so we could reduce the risk and protect the
data of the people living in a society in a large scale. Day by day new technology emerges. And with that
given fact, we should really engineer a plan to protect the data, privacy and etc. of the people while at
the same time giving freedom to the individuals. Because too much protection could result a lack of
freedom and it might overlap to other factors, no one wants too much protection, and thus we should
give space for mistakes of such individuals. So, we should really adopting a suitable technique and
develop something that identify and anonymize data. Actually there is a game, called watchdogs 2,
basically the story goes that the government handles all the data of the people in a promise of data
protection, but in fact they uses it to many illicit ways, such as determining your flow of income, and
giving you no options in your life decisions and etc and the sad part is you don’t know that your life has
been manipulated and as well as your opportunities. My main point here is that its ok to devise a plan to
protect a data as long as it is not invasive as the story in watchdogs 2.

You might also like