Privacy by design requires proactive, default, and continuous integration of privacy controls across the entire data life cycle (collection through disposal). Limiting to breach response (B) or remediation (C) is reactive, and focusing only on final product development (D) misses earlier phases where most risk originates.
“Embed privacy from the outset and across the full life cycle of processing activities.”
[References: ISACA CDPSE Review Manual – Domain 2: Privacy by Design (End-to-End Security; Proactive not Reactive; Privacy Embedded into Design)., , ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit