Designing privacy-by-design

Jeroen van Rest, Daniel Boonstra, Maarten Everts, Martin van Rijn, Ron van Paassen

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

30 Citations (Scopus)


The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these privacy risks. In this vision paper, we describe how design patterns may be used to make the principle of Privacy by Design specific for relevant application domains. We identify a number of privacy design patterns as examples and we argue that the art is in finding the right level of abstraction to describe a privacy design pattern: the level where the data holder, data subject and privacy risks are described. We give an extended definition of Privacy by Design and, taking Solove’s model for privacy invasions as structuring principle, we describe a tool and method to use that tool to generate trust in systems by citizens.

Original languageEnglish
Title of host publicationPrivacy Technologies and Policy
Subtitle of host publicationFirst Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers
EditorsBart Preneel, Demosthenes Ikonomou
Place of PublicationBerlin, Heidelberg
Number of pages18
ISBN (Electronic)978-3-642-54069-1
ISBN (Print)978-3-642-54068-4
Publication statusPublished - 2014
Externally publishedYes
Event1st Annual Privacy Forum, APF 2012: Closing the loop from research to policy - Limassol, Cyprus
Duration: 10 Oct 201211 Oct 2012
Conference number: 1

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference1st Annual Privacy Forum, APF 2012
Abbreviated titleAPF 2012


  • Privacy
  • Privacy design pattern
  • Privacy-by-design
  • System engineering
  • Tooling
  • Trust
  • n/a OA procedure


Dive into the research topics of 'Designing privacy-by-design'. Together they form a unique fingerprint.

Cite this