Skip to main content

Engineering Privacy on the Scaffolds: An Existentialist Examination of Privacy by Design

  • Chapter
  • First Online:
The Future of Engineering

Part of the book series: Philosophy of Engineering and Technology ((POET,volume 31))

Abstract

What is digital privacy and who in society should be responsible for protecting it? This paper considers the challenges in defining digital privacy as well as the newest movement in privacy law and regulation, the concept of “privacy by design,” which calls upon engineers to integrate privacy into technology throughout the construction process. This paper seeks to advance two objectives. First, it turns the focus of inquiry to the experience and decision-making process of the engineer. Through a combination of contemporary technological thought, an existential philosophical lens, and an informed legal perspective, this paper seeks to understand the relationship between the computer engineer, the user, and privacy. Second, this paper hopes to add to the philosophical debate surrounding the contours of privacy as it relates to the engineer’s role in forging it. This analysis seeks to reveal, in part, the nature of privacy and the necessary conditions for its implementation in technology.

Foreword

All ideas and points of view belong to me, and are no way representative of any of my employers.

In dedication to the future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The IAB provides long-range technical direction for Internet development, a direct evolution of the Interne Configuration Control Board (ICCB), created by the 1979 program manager of DARPA during early development of the Internet.

  2. 2.

    The concept of privacy by design has its roots in the publication of a report on “Privacy Enhancing Technologies” in a joint effort by the Information and Privacy Commissioner of Ontario, Canada and the Dutch Data Protection Authority in 1995.

    Privacy by design is built on 7 Foundational Principles: 1. Proactive not Reactive; Preventative not Remedial; 2. Privacy as the Default Setting; 3. Privacy Embedded into Design; 4. Full Functionality: Positive-Sum, not Zero-Sum; 5. End-to-End Security – Full Lifecycle Protection; 6. Visibility and Transparency – Keep it Open; 7. Respect for User Privacy – Keep it User-Centric.

  3. 3.

    The operationalization of privacy still rests on the premise that privacy can be engineered. As some critics have asserted, not every privacy threat posed by disruptive technology is compatible with being designed or engineered away.

  4. 4.

    Carnegie Mellon University has implemented a Master of Science in Information Technology (MSIT) in Privacy engineering. The program is the first of its kind and aims to integrate privacy perspectives spanning product design, software development, cyber security, human computer interaction, as well as business and legal considerations.

  5. 5.

    Examples of corporations implicated in privacy actions abound. One example can be found in the 2016 Federal Trade Commission settlement with Vulcun under privacy related charges that it unfairly replaced a popular web browser game with a program that installed applications on consumers’ mobile devices without their permission.

  6. 6.

    For example, in the American personal health information sector the Health Insurance Portability and Accountability Act (HIPAA) Breach Notification Rule, 45 CFR §§ 164.400–414, requires HIPAA covered entities and their business associates to provide notification following a breach of unsecured protected health information. A breach under the HIPAA Rules is defined as, “…the acquisition, access, use, or disclosure of PHI in a manner not permitted under the [HIPAA Privacy Rule] which compromises the security or privacy of the PHI.” (See 45 C.F.R. 164.402).

    “Access” to the personal information is broadly construed to encompass situations where electronic protected health information (ePHI) could have only have potentially been viewed. This example is described in regulatory guidance as a breach in incidents where ePHI is encrypted as the result of a ransomware attack, unless the covered entity can overcome the presumption by demonstrating that there is a “…low probability that the PHI has been compromised.” The entity must then comply with the applicable breach notification provisions, including notification to affected individuals without unreasonable delay, to the Secretary of HHS, and to the media (for breaches affecting over 500 individuals) in accordance with HIPAA breach notification requirements. See 45 C.F.R. 164.400–414.

  7. 7.

    Perhaps this is part of the contour of what is private, that which triggers this shift in self-observation.

References

Download references

Acknowledgments

Thank you to the gamut of engineers interviewed in the process of writing this piece. Special thanks to George Jakobsche for sparking my love of technology law, to Greg Pemberton for stoking it, to Santa Clara University School of Law High Technology Law Institute for fostering it, and to my readers Karl Bozicevic, Kyle Psaty, Celine Purcell, Evan Selinger and Andrew Watts. Deep and humble thanks to Jill Gordon, Lydia Moland, Valiere Dionne, and the Colby College Philosophy Department.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Psaty, K. (2018). Engineering Privacy on the Scaffolds: An Existentialist Examination of Privacy by Design. In: Fritzsche, A., Oks, S. (eds) The Future of Engineering. Philosophy of Engineering and Technology, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-319-91029-1_20

Download citation

Publish with us

Policies and ethics