What privacy by design is
Privacy by design means building privacy protections into systems and processes from the start—so privacy is a default outcome, not an afterthought. It’s closely related to “data protection by design and by default” in GDPR, and it aligns well with Swiss DSG expectations.
Practically, privacy by design is the combination of:
- Product decisions: what data you truly need and why.
- Engineering patterns: how you isolate, protect, and delete data.
- Governance: how changes are reviewed, approved, and evidenced.
Privacy by design vs security by design
Security focuses on protection (confidentiality, integrity, availability). Privacy adds purpose and proportionality: even perfectly secure data processing can be “too much” if it violates minimization or purpose limitation.
Core building blocks
These building blocks are the fastest way to operationalize privacy across teams.
| Building block | What it means | Example control |
|---|---|---|
| Data minimization | Collect only what’s required for the purpose. | Remove optional fields; avoid collecting IDs unless necessary. |
| Purpose limitation | Use data only for defined, compatible purposes. | Purpose registry + change review for new use-cases. |
| Storage limitation | Keep data only as long as needed. | Retention schedules + automated deletion jobs. |
| Access control | Only authorized people/systems can access data. | Least privilege + quarterly access reviews. |
| Transparency | People can understand what happens to their data. | Contextual notices + clear privacy policy with versioning. |
| Vendor governance | Processors meet security/privacy requirements. | DPA clauses + sub-processor visibility + data location controls. |
| Accountability | Prove decisions and controls exist. | RoPA + DPIA decisions + release evidence + audit trails. |
How to implement privacy by design (step-by-step)
Use this lightweight implementation model: inventory → classify risk → design controls → ship with evidence → monitor.
Step 1: Create a data map (inventory)
- What personal data is collected?
- Where is it stored (systems, databases, vendors)?
- Who can access it and where is it transferred?
Step 2: Classify risk (what needs extra rigor)
- Sensitive data, children’s data, location data, biometrics
- Large scale processing, cross-border transfers, profiling/automation
- High-impact features (identity, payments, health, employment)
Step 3: Choose controls based on the risk
- Minimize fields and events (don’t collect “just in case”).
- Encrypt data at rest and in transit.
- Restrict access, log sensitive operations, and test incident response.
- Implement retention and deletion behaviors early.
Step 4: Embed privacy into delivery workflows
- Product discovery: add a “purpose + necessity” check before specs are final.
- Engineering: add privacy checks to PR/release templates.
- Procurement: require vendor privacy/security review before purchase.
- Operations: build DSAR and incident playbooks with owners.
Step 5: Monitor and improve
- Alert on unexpected data flows and access anomalies.
- Review tracking and vendors quarterly.
- Run tabletop exercises for incidents and DSAR requests.
Practical design patterns (what to do in systems)
Minimize and separate
- Collect the smallest dataset needed for the feature.
- Separate identifiers from event data where possible.
- Prefer aggregation and anonymization for analytics.
Limit access and log sensitive actions
- Role-based access control (RBAC) with least privilege.
- Audit logs for exports, admin actions, and high-risk queries.
- Time-bound elevated access (“break glass”) with review.
Make deletion real (not theoretical)
- Retention jobs that run automatically and are monitored.
- Clear behavior for backups and archives (documented and defensible).
- Deletion workflows that propagate to processors where required.
Privacy by default (secure defaults)
“Privacy by default” means that the default configuration should be the most privacy-preserving option consistent with the purpose. Users shouldn’t have to hunt for settings to stop unnecessary collection or sharing.
Default rules that work in most organizations
- Opt-in for non-essential tracking where applicable.
- Least privilege by default: new users have minimal access until approved.
- Short retention defaults: extend only with a documented reason.
- No third-party sharing by default: enable only when reviewed and contracted.
Helpful tools (optional)
If you need traceable approvals, secure documentation, and audit trails to operationalize privacy-by-design workflows:
Disclaimer: Links are for convenience; choose tools based on your requirements and compliance needs.
Privacy by design checklist (copy/paste)
Use this checklist in product discovery, vendor review, and release gates.
- We documented the purpose and necessity of personal data collected for the feature/process.
- We minimized data collection (fields/events) and avoided sensitive data unless required.
- We mapped data flows (systems, recipients, processors, cross-border transfers).
- We set retention rules and deletion triggers (including downstream systems and backups policy).
- We applied secure defaults: least privilege, logging, and no unnecessary sharing.
- We ensured transparency: notices and privacy policy updates are versioned.
- We assessed risk and performed a DPIA / risk review where processing is high risk.
- We documented decisions and stored evidence (approvals, release notes, configs).
- We defined incident and DSAR readiness for the affected data.
FAQ
What is privacy by design?
What is the difference between privacy by design and privacy by default?
Do we need DPIAs for privacy by design?
How do we implement privacy by design without slowing product delivery?
Sources & further reading
Prefer primary sources and widely used standards for privacy engineering and governance.
- EU GDPR — Article 25 (Data protection by design and by default)
- EDPB — Guidelines (general GDPR guidance)
- FDPIC / EDÖB — Swiss Federal Data Protection and Information Commissioner
- ISO/IEC 27701 — Privacy Information Management
- ISO/IEC 27001 — Information Security Management
Last updated: February 22, 2026 • Version: 1.0