(see instructions in the PRIPARE Educational Material Page).
These pages address the need for privacy protection education for a range of stakeholders, including all sectors of the General Public, as well as Practitioners, Policy makers, and governmental and non-governmental bodies acting for human rights protection, and Students in related disciplines. The educational and reference material provided by WP4 participants will cover the relevant socio-ethical, legal and technical issues that privacy-by-design raise for these stakeholders across society.
The General Public is a heterogeneous group made up of users of digital technology who may or may not be aware that privacy protection is an issue when they turn on their tablets or Smartphone. The General Public also includes certain non-users of digital technology, such as some elderly, whose personal information is embedded in information technology systems, often without their knowledge. In order to provide educational material that speaks to this highly varied group, we will first identify subsets of the General Public (e.g. children, youth, the elderly), before targeting salient ethical issues raised by privacy violations, the legal ramifications of these violations, and how these violations may occur, may be prevented, or remedied. Educational materials and references for these subsets shoul be clear, easy to access and function as stand-alone pieces or as a series of materials that interact with one another.
Practitioners are those industry specialists whose work may involve them in one or more phases of the lifecycle of an information technology system or piece of software. Whether IT designers or IT users, whether managers or developers, these specialists require educational materials that explain the legal and policy framework on privacy, as well as the risks and benefits inherent in a privacy-by-design approach. System designers and implementers will also require an in-depth introduction to the technical foundations of privacy-by-design (PbD), from cryptography, over protocols, privacy-preserving data processing, to privacy-friendly human-machine interaction, so that they are familiar with the “privacy toolbox” available to be deployed during a PbD engineering project. Learning materials and references for practitioners will provide a privacy-by-design methodology that enables individuals and teams to incorporate PbD at the outset of IT projects.
Students are tomorrow’s designers, regulators and users of digital technology and their professional success will require a sophisticated understanding of the challenges inherent in PbD. Students in the fields of computer science and information technology should have a deep knowledge of the technologies enabling PbD as listed above as well as a robust understanding of the legal obligations on privacy while being familiar with the EU regulatory framework on privacy protection. Students in the fields of law and public policy should be digitally literate, with a solid understanding of how IT systems function and the challenges faced by software and IT systems designers in delivering PbD. Learning materials and references for students will be aimed at both undergraduates and graduates, and require critical thinking on the trade-offs inherent in PbD for digital technology.
Policymakers, as well as governmental and non-governmental bodies specializing in human rights protection cover a wide-range of regulatory issues relating to digital technology. The educational materials and references should aim at encouraging the creation of a normative framework of privacy by default in all regulatory matters. These materials should also enable the design of clear-cut operational standards that distinguish between risk management for certain populations (adult IT users) and strict protection for others (children, for example). In all cases, the materials should promote the European Human Rights Framework as the baseline for regulatory behaviour by government and watchdog agencies with respect to privacy by design. Furthermore, all target groups will benefit from at least a high-level awareness of the technical progress in Privacy Enhancing Technologies from recent years as this will create awareness about what is possible and that there are very often no technical excuses for designing privacy-unfriendly systems.