German DPAs: DSK: Expert Opinion US surveillance law and authorities

Expert Opinion on the Current State of U.S. Surveillance Law and Authorities
from Prof. Stephen I. Vladeck,
University of Texas School of Law
from 15 November 2021

https://www.datenschutzkonferenz-online.de/weitere_dokumente.html

in English
https://www.datenschutzkonferenz-online.de/media/weitere_dokumente/Vladek_Rechtsgutachten_DSK_en.pdf


Also DLA Piper summary:
https://blogs.dlapiper.com/privacymatters/3606-2/

Cookies/Trackers – EDPS website evidence collector

https://github.com/EU-EDPS/website-evidence-collector

FAQ at https://github.com/EU-EDPS/website-evidence-collector/blob/master/FAQ.md – also make sure that your node.js is at version 14!

with a good intro at https://medium.com/rincon-security/getting-started-with-the-edps-website-evidence-collector-tool-7be921a49e9e

with add-ons

CNIL on trackers and cookies

NIST: SP 800-53A Rev. 5 Assessing Security and Privacy Controls in Information Systems and Organizations

https://csrc.nist.gov/publications/detail/sp/800-53a/rev-5/final

Abstract
“This publication provides a methodology and set of procedures for conducting assessments of security and privacy controls employed within systems and organizations within an effective risk management framework. The assessment procedures, executed at various phases of the system development life cycle, are consistent with the security and privacy controls in NIST Special Publication 800-53, Revision 5. The procedures are customizable and can be easily tailored to provide organizations with the needed flexibility to conduct security and privacy control assessments that support organizational risk management processes and are aligned with the stated risk tolerance of the organization. Information on building effective security and privacy assessment plans is also provided with guidance on analyzing assessment results.”

ENISA: Data Protection Engineering Report (January 2022)

https://www.enisa.europa.eu/publications/data-protection-engineering

Table of content:
1. INTRODUCTION
1.1 DATA PROTECTION BY DESIGN
1.2 SCOPE AND OBJECTIVES
1.3 STRUCTURE OF THE DOCUMENT
2. ENGINEERING DATA PROTECTION
2.1 FROM DATA PROTECTION BY DESIGN TO DATA PROTECTION ENGINEERING
2.2 CONNECTION WITH DPIA
2.3 PRIVACY ENHANCING TECHNOLOGIES
3. ANONYMISATION AND PSEUDONYMISATION
3.1 ANONYMISATION
3.2 k-ANONYMITY
3.3 DIFFERENTIAL PRIVACY
3.4 SELECTING THE ANONYMISATION SCHEME
4. DATA MASKING AND PRIVACY-PRESERVING COMPUTATIONS
4.1 HOMOMORPHIC ENCRYPTION
4.2 SECURE MULTIPARTY COMPUTATION
4.3 TRUSTED EXECUTION ENVIRONMENTS
4.4 PRIVATE INFORMATION RETRIEVAL
4.5 SYNTHETIC DATA
5. ACCESS. COMMUNICATION AND STORAGE
5.1 COMMUNICATION CHANNELS
5.1.1 End to End Encryption
5.1.2 Proxy & Onion Routing
5.2 PRIVACY PRESERVING STORAGE
5.3 PRIVACY-ENHANCING ACCESS CONTROL, AUTHORIZATION AND AUTHENTICATION
5.3.1 Privacy-enhancing attribute-based credentials
5.3.2 Zero Knowledge Proof
6. TRANSPARENCY, INTERVENABILITY AND USER CONTROL TOOLS
6.1 PRIVACY POLICIES
6.2 PRIVACY ICONS
6.3 STICKY POLICIES
6.4 PRIVACY PREFERENCE SIGNALS
6.5 PRIVACY DASHBOARDS
6.5.1 Services-side privacy dashboards
6.5.2 User-side privacy dashboards
6.6 CONSENT MANAGEMENT
6.7 CONSENT GATHERING
6.8 CONSENT MANAGEMENT SYSTEMS
6.9 EXERCISING RIGHT OF ACCESS
6.9.1 Delegation of Access Rights Requests
6.10EXERCISING RIGHT TO ERASURE, RIGHT TO RECTIFICATION
7. CONCLUSIONS
7.1 DEFINING THE MOST APPLICABLE TECHNIQUE
7.2 ESTABLISHING THE STATE-OF-THE-ART
7.3 DEMONSTRATE COMPLIANCE AND PROVIDE ASSURANCE
8. REFERENCES