home.social

#privacy-by-design — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #privacy-by-design, aggregated by home.social.

fetched live
  1. Innovation isn't always about building something entirely new. Sometimes, it’s about opening a closed door. 🔍

    Mobile backups have been treated like forbidden system files for too long. We designed #Keepita to give you back the keys to your own data—clean, accessible, and structured.

    Your data. Your infrastructure.
    Explore the tool: keepita.com/

    #Keepita #DataArchitecture #SoftwareEngineering #DataSovereignty #PrivacyByDesign #OpenSource #FOSS #TechTransparency #BuildInPublic

  2. Innovation isn't always about building something entirely new. Sometimes, it’s about opening a closed door. 🔍

    Mobile backups have been treated like forbidden system files for too long. We designed #Keepita to give you back the keys to your own data—clean, accessible, and structured.

    Your data. Your infrastructure.
    Explore the tool: keepita.com/

    #Keepita #DataArchitecture #SoftwareEngineering #DataSovereignty #PrivacyByDesign #OpenSource #FOSS #TechTransparency #BuildInPublic

  3. Is your organization fully aligned with GDPR requirements? 🇪🇺

    Compliance is a continuous process, not a one-time audit. Key areas to audit include:
    ✅ Data Mapping & Inventory
    ✅ Data Protection Officer (DPO) support
    ✅ Breach Notification protocols
    ✅ Subject Access Request (SAR) management

    Check out Cyborgenic’s breakdown of professional GDPR consulting services to see where your gaps might be: cyborgenic.com/service-post/gd

    #GDPR #DataProtection #TechCompliance #CyberSecurityTips #PrivacyByDesign

  4. La CNIL publie sa recommandation sur l'usage des données personnelles dans l'évaluation de la solvabilité. Un sujet discret mais crucial : quand un algorithme décide de votre accès au crédit, comprendre quelles données l'alimentent devient un droit fondamental. La transparence algorithmique, c'est de la sécurité pour les personnes. #RGPD #PrivacyByDesign #infosec
    cnil.fr/fr/recommandation-octr

  5. Tool descriptions aren’t just marketing—they shape behavior.

    Two risks:
    • Understating capabilities (“just drafting”) when client data is processed
    • Overstating capabilities (implying reliability/automation that isn’t there)

    Both can create privacy risks and professional responsibility issues.

    Clear descriptions help—but they’re not enough without training, policies, and technical controls.

    #AI #DataPrivacy #LegalTech #PrivacyByDesign

  6. Tool descriptions aren’t just marketing—they shape behavior.

    Two risks:
    • Understating capabilities (“just drafting”) when client data is processed
    • Overstating capabilities (implying reliability/automation that isn’t there)

    Both can create privacy risks and professional responsibility issues.

    Clear descriptions help—but they’re not enough without training, policies, and technical controls.

    #AI #DataPrivacy #LegalTech #PrivacyByDesign

  7. Tool descriptions aren’t just marketing—they shape behavior.

    Two risks:
    • Understating capabilities (“just drafting”) when client data is processed
    • Overstating capabilities (implying reliability/automation that isn’t there)

    Both can create privacy risks and professional responsibility issues.

    Clear descriptions help—but they’re not enough without training, policies, and technical controls.

    #AI #DataPrivacy #LegalTech #PrivacyByDesign

  8. Tool descriptions aren’t just marketing—they shape behavior.

    Two risks:
    • Understating capabilities (“just drafting”) when client data is processed
    • Overstating capabilities (implying reliability/automation that isn’t there)

    Both can create privacy risks and professional responsibility issues.

    Clear descriptions help—but they’re not enough without training, policies, and technical controls.

    #AI #DataPrivacy #LegalTech #PrivacyByDesign

  9. Tool descriptions aren’t just marketing—they shape behavior.

    Two risks:
    • Understating capabilities (“just drafting”) when client data is processed
    • Overstating capabilities (implying reliability/automation that isn’t there)

    Both can create privacy risks and professional responsibility issues.

    Clear descriptions help—but they’re not enough without training, policies, and technical controls.

    #AI #DataPrivacy #LegalTech #PrivacyByDesign

  10. Gibt es eventuell irgendwo bereits best practice Sammlungen von "privacy-by-design" patterns für mobile Apps, ähnlich wie "Berechtigungen für ungenutzte App entfernen/ nach 3 Monate entfernen" usw.? #infosec #mobile #apps #privacybydesign #privacy

  11. C'est pas totalement étonnant mais autant saluer les bonnes pratiques : @cnil diffuse les replays de ses webinaires via une instance @peertube qu'elle administre. cc @cnes #PrivacyByDesign #dégafamisation #fediverse

  12. C'est pas totalement étonnant mais autant saluer les bonnes pratiques : @cnil diffuse les replays de ses webinaires via une instance @peertube qu'elle administre. cc @cnes #PrivacyByDesign #dégafamisation #fediverse

  13. C'est pas totalement étonnant mais autant saluer les bonnes pratiques : @cnil diffuse les replays de ses webinaires via une instance @peertube qu'elle administre. cc @cnes #PrivacyByDesign #dégafamisation #fediverse

  14. C'est pas totalement étonnant mais autant saluer les bonnes pratiques : @cnil diffuse les replays de ses webinaires via une instance @peertube qu'elle administre. cc @cnes #PrivacyByDesign #dégafamisation #fediverse

  15. C'est pas totalement étonnant mais autant saluer les bonnes pratiques : @cnil diffuse les replays de ses webinaires via une instance @peertube qu'elle administre. cc @cnes #PrivacyByDesign #dégafamisation #fediverse

  16. You can have both: Privacy AND Collaboration. 🔐🤝
    Just watched and enjoyed a great session by Ludovic Dubost at #FOSSnorth2026. The highlight? Seeing how #CryptPad shatters the myth that working together requires sacrificing your data.
    By using end-to-end encryption by default, CryptPad delivers:
    ✅ Zero-Knowledge Collaboration
    ✅ Full Data Sovereignty
    ✅ Open Source Transparency
    #PrivacyByDesign #OpenSource #FOSSnorth #DigitalSovereignty #GeekoOnTour

  17. You can have both: Privacy AND Collaboration. 🔐🤝
    Just watched and enjoyed a great session by Ludovic Dubost at #FOSSnorth2026. The highlight? Seeing how #CryptPad shatters the myth that working together requires sacrificing your data.
    By using end-to-end encryption by default, CryptPad delivers:
    ✅ Zero-Knowledge Collaboration
    ✅ Full Data Sovereignty
    ✅ Open Source Transparency
    #PrivacyByDesign #OpenSource #FOSSnorth #DigitalSovereignty #GeekoOnTour

  18. You can have both: Privacy AND Collaboration. 🔐🤝
    Just watched and enjoyed a great session by Ludovic Dubost at #FOSSnorth2026. The highlight? Seeing how #CryptPad shatters the myth that working together requires sacrificing your data.
    By using end-to-end encryption by default, CryptPad delivers:
    ✅ Zero-Knowledge Collaboration
    ✅ Full Data Sovereignty
    ✅ Open Source Transparency
    #PrivacyByDesign #OpenSource #FOSSnorth #DigitalSovereignty #GeekoOnTour

  19. You can have both: Privacy AND Collaboration. 🔐🤝
    Just watched and enjoyed a great session by Ludovic Dubost at #FOSSnorth2026. The highlight? Seeing how #CryptPad shatters the myth that working together requires sacrificing your data.
    By using end-to-end encryption by default, CryptPad delivers:
    ✅ Zero-Knowledge Collaboration
    ✅ Full Data Sovereignty
    ✅ Open Source Transparency
    #PrivacyByDesign #OpenSource #FOSSnorth #DigitalSovereignty #GeekoOnTour

  20. You can have both: Privacy AND Collaboration. 🔐🤝
    Just watched and enjoyed a great session by Ludovic Dubost at #FOSSnorth2026. The highlight? Seeing how #CryptPad shatters the myth that working together requires sacrificing your data.
    By using end-to-end encryption by default, CryptPad delivers:
    ✅ Zero-Knowledge Collaboration
    ✅ Full Data Sovereignty
    ✅ Open Source Transparency
    #PrivacyByDesign #OpenSource #FOSSnorth #DigitalSovereignty #GeekoOnTour

  21. 🔧 Fine-tunable on domain-specific data — adapts to medical, legal or enterprise environments where generic rules fail. Based on the open #gptoss model family. Available on #HuggingFace under Apache 2.0

    🚨 Caveat: #PrivacyFilter is a redaction & data minimization aid — NOT a compliance guarantee. It should be one layer in a holistic #privacybydesign approach. Always combine with human review for high-stakes use cases
    openai.com/index/introducing-o

  22. 🔧 Fine-tunable on domain-specific data — adapts to medical, legal or enterprise environments where generic rules fail. Based on the open #gptoss model family. Available on #HuggingFace under Apache 2.0

    🚨 Caveat: #PrivacyFilter is a redaction & data minimization aid — NOT a compliance guarantee. It should be one layer in a holistic #privacybydesign approach. Always combine with human review for high-stakes use cases
    openai.com/index/introducing-o

  23. 🔧 Fine-tunable on domain-specific data — adapts to medical, legal or enterprise environments where generic rules fail. Based on the open #gptoss model family. Available on #HuggingFace under Apache 2.0

    🚨 Caveat: #PrivacyFilter is a redaction & data minimization aid — NOT a compliance guarantee. It should be one layer in a holistic #privacybydesign approach. Always combine with human review for high-stakes use cases
    openai.com/index/introducing-o

  24. 🔧 Fine-tunable on domain-specific data — adapts to medical, legal or enterprise environments where generic rules fail. Based on the open #gptoss model family. Available on #HuggingFace under Apache 2.0

    🚨 Caveat: #PrivacyFilter is a redaction & data minimization aid — NOT a compliance guarantee. It should be one layer in a holistic #privacybydesign approach. Always combine with human review for high-stakes use cases
    openai.com/index/introducing-o

  25. 🔧 Fine-tunable on domain-specific data — adapts to medical, legal or enterprise environments where generic rules fail. Based on the open #gptoss model family. Available on #HuggingFace under Apache 2.0

    🚨 Caveat: #PrivacyFilter is a redaction & data minimization aid — NOT a compliance guarantee. It should be one layer in a holistic #privacybydesign approach. Always combine with human review for high-stakes use cases
    openai.com/index/introducing-o

  26. 🚪 Where privacy meets poetry in pure HTML.
    I crafted a tracker-free corner of the web: no ads, no bloat, no surveillance. Just 5 trusted European sources for knowledge & privacy, with built-in listen/copy/save tools.
    You’re a guest here. Never a product.
    🔗 doors.mom/doors-eu.html
    #DigitalPrivacy #CleanCode #OpenWeb #PrivacyByDesign #Eu #security
    🤍🧊🪷🦋🌊🐟🌳🌸🍷🌷🍃

  27. 🚪 Where privacy meets poetry in pure HTML.
    I crafted a tracker-free corner of the web: no ads, no bloat, no surveillance. Just 5 trusted European sources for knowledge & privacy, with built-in listen/copy/save tools.
    You’re a guest here. Never a product.
    🔗 doors.mom/doors-eu.html
    #DigitalPrivacy #CleanCode #OpenWeb #PrivacyByDesign #Eu #security
    🤍🧊🪷🦋🌊🐟🌳🌸🍷🌷🍃

  28. Tracking Pixels in Email: The Italian DPA Guidelines and the Consent Puzzle

    A commentary on Decision No. 284 of April 17, 2026, by the Italian Data Protection Authority. Two systemic questions: privacy by design under Art. 25 GDPR, and consent specificity under EDPB Guidelines 05/2020.

    🇬🇧 nicfab.eu/en/posts/tracking-pi
    🇮🇹 nicfab.eu/it/posts/tracking-pi

    Newsletter: nicfab.eu/en/pages/newsletter/

    #GDPR #ePrivacy #PrivacyByDesign #DPO #DataProtection #EDPB #AI #privacy #DataprivacyDay #pixel_tracking

  29. Tracking Pixels in Email: The Italian DPA Guidelines and the Consent Puzzle

    A commentary on Decision No. 284 of April 17, 2026, by the Italian Data Protection Authority. Two systemic questions: privacy by design under Art. 25 GDPR, and consent specificity under EDPB Guidelines 05/2020.

    🇬🇧 nicfab.eu/en/posts/tracking-pi
    🇮🇹 nicfab.eu/it/posts/tracking-pi

    Newsletter: nicfab.eu/en/pages/newsletter/

  30. Tracking Pixels in Email: The Italian DPA Guidelines and the Consent Puzzle

    A commentary on Decision No. 284 of April 17, 2026, by the Italian Data Protection Authority. Two systemic questions: privacy by design under Art. 25 GDPR, and consent specificity under EDPB Guidelines 05/2020.

    🇬🇧 nicfab.eu/en/posts/tracking-pi
    🇮🇹 nicfab.eu/it/posts/tracking-pi

    Newsletter: nicfab.eu/en/pages/newsletter/

    #GDPR #ePrivacy #PrivacyByDesign #DPO #DataProtection #EDPB #AI #privacy #DataprivacyDay #pixel_tracking

  31. Tracking Pixels in Email: The Italian DPA Guidelines and the Consent Puzzle

    A commentary on Decision No. 284 of April 17, 2026, by the Italian Data Protection Authority. Two systemic questions: privacy by design under Art. 25 GDPR, and consent specificity under EDPB Guidelines 05/2020.

    🇬🇧 nicfab.eu/en/posts/tracking-pi
    🇮🇹 nicfab.eu/it/posts/tracking-pi

    Newsletter: nicfab.eu/en/pages/newsletter/

    #GDPR #ePrivacy #PrivacyByDesign #DPO #DataProtection #EDPB #AI #privacy #DataprivacyDay #pixel_tracking

  32. Tracking Pixels in Email: The Italian DPA Guidelines and the Consent Puzzle

    A commentary on Decision No. 284 of April 17, 2026, by the Italian Data Protection Authority. Two systemic questions: privacy by design under Art. 25 GDPR, and consent specificity under EDPB Guidelines 05/2020.

    🇬🇧 nicfab.eu/en/posts/tracking-pi
    🇮🇹 nicfab.eu/it/posts/tracking-pi

    Newsletter: nicfab.eu/en/pages/newsletter/

    #GDPR #ePrivacy #PrivacyByDesign #DPO #DataProtection #EDPB #AI #privacy #DataprivacyDay #pixel_tracking

  33. "According to the audit from privacy search engine webXray, 55 percent of the sites it checked set ad cookies in a user’s browser even if they opted out of tracking." www.404media.co/google-micro... #privacybydesign

    Google, Microsoft, Meta All Tr...

  34. "According to the audit from privacy search engine webXray, 55 percent of the sites it checked set ad cookies in a user’s browser even if they opted out of tracking." www.404media.co/google-micro... #privacybydesign

    Google, Microsoft, Meta All Tr...

  35. "According to the audit from privacy search engine webXray, 55 percent of the sites it checked set ad cookies in a user’s browser even if they opted out of tracking." www.404media.co/google-micro... #privacybydesign

    Google, Microsoft, Meta All Tr...

  36. "Data is the new oil" Stop dan eens met data uit scholen te pompen, en stap over op privacy-by-design diensten!

    #NextCloudEnterpriseday #privacy #school #PrivacyByDesign

  37. "Data is the new oil" Stop dan eens met data uit scholen te pompen, en stap over op privacy-by-design diensten!

    #NextCloudEnterpriseday #privacy #school #PrivacyByDesign

  38. "Data is the new oil" Stop dan eens met data uit scholen te pompen, en stap over op privacy-by-design diensten!

    #NextCloudEnterpriseday #privacy #school #PrivacyByDesign

  39. "Data is the new oil" Stop dan eens met data uit scholen te pompen, en stap over op privacy-by-design diensten!

    #NextCloudEnterpriseday #privacy #school #PrivacyByDesign

  40. "Data is the new oil" Stop dan eens met data uit scholen te pompen, en stap over op privacy-by-design diensten!

    #NextCloudEnterpriseday #privacy #school #PrivacyByDesign

  41. AMNYX MESSENGER BLACK BOX
    Your data.
    Your device.
    Zero exceptions.
    Meet the AmnyX Black Box — 100% local processing, 0% cloud.
    Everything stays on-device, always. 🔒📦
    Privacy is not a feature, it's a foundation.
    @AmnyX
    #AmnyX #BlackBox #DataPrivacy #LocalFirst #nocloud #EdgeComputing #OwnYourData #privacybydesign

  42. AMNYX MESSENGER BLACK BOX
    Your data.
    Your device.
    Zero exceptions.
    Meet the AmnyX Black Box — 100% local processing, 0% cloud.
    Everything stays on-device, always. 🔒📦
    Privacy is not a feature, it's a foundation.
    @AmnyX
    #AmnyX #BlackBox #DataPrivacy #LocalFirst #nocloud #EdgeComputing #OwnYourData #privacybydesign

  43. "En un telèfon Jolla o Sailfish OS, no cal que feu un compte d'usuari per utilitzar el telèfon, de manera que ja és força excepcional. Si el sistema operatiu no té un compte d'usuari, res va enlloc d'aquest sistema operatiu. El nostre model de negoci no es basa de cap manera en la recollida de dades, diu Pienimäki"
    #jolla #sailfishos #privacyByDesign

    L'opció de telèfon mòbil de Jolla per a aquells que volen deixar empreses gegants? | Notícies MTV

    mtvuutiset.fi/artikkeli/suomal

  44. "En un telèfon Jolla o Sailfish OS, no cal que feu un compte d'usuari per utilitzar el telèfon, de manera que ja és força excepcional. Si el sistema operatiu no té un compte d'usuari, res va enlloc d'aquest sistema operatiu. El nostre model de negoci no es basa de cap manera en la recollida de dades, diu Pienimäki"
    #jolla #sailfishos #privacyByDesign

    L'opció de telèfon mòbil de Jolla per a aquells que volen deixar empreses gegants? | Notícies MTV

    mtvuutiset.fi/artikkeli/suomal

  45. "En un telèfon Jolla o Sailfish OS, no cal que feu un compte d'usuari per utilitzar el telèfon, de manera que ja és força excepcional. Si el sistema operatiu no té un compte d'usuari, res va enlloc d'aquest sistema operatiu. El nostre model de negoci no es basa de cap manera en la recollida de dades, diu Pienimäki"
    #jolla #sailfishos #privacyByDesign

    L'opció de telèfon mòbil de Jolla per a aquells que volen deixar empreses gegants? | Notícies MTV

    mtvuutiset.fi/artikkeli/suomal

  46. "En un telèfon Jolla o Sailfish OS, no cal que feu un compte d'usuari per utilitzar el telèfon, de manera que ja és força excepcional. Si el sistema operatiu no té un compte d'usuari, res va enlloc d'aquest sistema operatiu. El nostre model de negoci no es basa de cap manera en la recollida de dades, diu Pienimäki"
    #jolla #sailfishos #privacyByDesign

    L'opció de telèfon mòbil de Jolla per a aquells que volen deixar empreses gegants? | Notícies MTV

    mtvuutiset.fi/artikkeli/suomal

  47. "En un telèfon Jolla o Sailfish OS, no cal que feu un compte d'usuari per utilitzar el telèfon, de manera que ja és força excepcional. Si el sistema operatiu no té un compte d'usuari, res va enlloc d'aquest sistema operatiu. El nostre model de negoci no es basa de cap manera en la recollida de dades, diu Pienimäki"
    #jolla #sailfishos #privacyByDesign

    L'opció de telèfon mòbil de Jolla per a aquells que volen deixar empreses gegants? | Notícies MTV

    mtvuutiset.fi/artikkeli/suomal

  48. Regulatory update: The Federal Trade Commission issues COPPA enforcement clarification on age verification technologies.
    Operators may collect and process personal data strictly for age determination without prior parental consent — if compliance controls include:
    • Purpose limitation
    • Data minimization + prompt deletion
    • Security safeguards
    • Third-party contractual assurances
    • Transparency notice
    • Reasonable accuracy validation

    Formal COPPA Rule review forthcoming.
    For security leaders:
    Age verification systems must be architected with privacy-by-design, limited retention, and robust vendor risk management.

    How are you validating accuracy while minimizing data exposure?

    Source: ftc.gov/news-events/news/press

    Engage below and follow us for regulatory + cybersecurity intelligence.

    #COPPA #PrivacyByDesign #DataGovernance #CyberPolicy #FTC #Compliance #RiskManagement #InfoSec #SecurityArchitecture #OnlineSafety