Tornar al Blog Seguretat

Privacitat per Disseny — Com Construir Sistemes amb Protecció de Dades Integrada

Zespół ESKOM.AI 2026-04-20 Temps de lectura: 7 min

What Is Privacy by Design and Why It Matters

Privacy by Design is a concept proposed by Ann Cavoukian — the Canadian Privacy Commissioner — and today enshrined in Article 25 of GDPR as a legal requirement. Its essence is simple: privacy protection is not a feature that can be added after the fact. It must be an integral part of system design from the very beginning.

For enterprises, this is a paradigm shift. Instead of asking "Is this GDPR-compliant?" at deployment, engineers ask "How do we design this so that privacy is guaranteed by definition?" — at the stage of selecting architecture, data models, and information flows.

Seven Principles of Privacy by Design in Practice

Cavoukian's original framework defines seven fundamental principles. They translate into concrete technical decisions:

  • Proactive, not reactive — identify privacy threats before they occur. In practice: Privacy Impact Assessment (PIA) before the project begins.
  • Privacy as the default setting — the user does not need to take any action to be protected. By default, you collect minimum data with the shortest retention period.
  • Privacy embedded in design — not as an intermediary layer, but as an integral part of system architecture.
  • Full functionality — privacy does not come at the expense of usability. You protect data and deliver business value — you do not have to choose.
  • Security throughout the entire data lifecycle — protection from the moment of collection to permanent deletion. Encryption at rest and in transit, retention policies, automatic cleanup.
  • Visibility and transparency — users and supervisory authorities can verify what you do with data.
  • Respect for user privacy — easy consent management, rights to access and delete data without bureaucratic barriers.

Automated Anonymization as an Architectural Pillar

One of the most effective tools of Privacy by Design is automated data anonymization — particularly important in AI systems processing documents, email messages, conversation transcripts, and customer data.

Personal data (PII — Personally Identifiable Information) is not limited to names and surnames. It includes national identification numbers, IP addresses, phone numbers, correspondence fragments, location data, and even combinations of seemingly anonymous attributes that together identify a specific individual. A well-designed system automatically detects and anonymizes this data before passing it on for further processing — for example, before sending content to an external language model.

ESKOM.AI has built this mechanism directly into its data processing infrastructure. Before any information leaves the client's controlled environment, it passes through a PII detection and anonymization layer. This enables organizations to leverage AI models without the risk of sensitive data leakage.

Data Minimization — Collect Only What Is Necessary

The principle of data minimization is seemingly obvious, but in practice requires architectural discipline. AI systems have a natural tendency to accumulate as much data as possible — because "it might be useful." This approach contradicts Privacy by Design and generates unnecessary risk.

Practical data minimization tools:

  • Data schema as requirements documentation — every field in the database must have a business justification and a legal basis for processing.
  • Automated retention policies — data deleted automatically after the retention period expires, without manual intervention.
  • Pseudonymization in development environments — testing and development on production data replaced with realistic but synthetic data.
  • Tokenization — sensitive identifiers (e.g., payment card numbers) replaced with tokens that have no value outside the tokenizing system.

Privacy by Design in Multi-Agent AI Systems

Multi-agent architectures introduce new privacy challenges. Dozens of specialized AI agents process data in parallel — each in a different context and with a different scope of access. Without a well-thought-out architecture, personal data can flow through agents that do not need access to it, creating unnecessary risk points.

The proper approach is the least privilege principle applied to AI agents — each agent has access only to the data necessary to perform its task. Anonymization occurs before data reaches a general-purpose agent. An audit trail records every access to sensitive data.

How to Implement Privacy by Design in Your Organization

Implementing Privacy by Design is not a one-time project, but a shift in organizational culture. It requires engagement from technical, legal, business, and HR teams alike.

Key steps:

  • Privacy Impact Assessment for every new project processing personal data — before the first line of code is written.
  • Developer training — programmers must understand not only the technology, but also the legal and ethical aspects of data processing.
  • Privacy champions in project teams — individuals responsible for verifying that designed solutions comply with Privacy by Design principles.
  • Automated privacy testing — tools that scan code for potential violations (e.g., logging sensitive data, missing encryption).

The investment in Privacy by Design pays for itself many times over — through reduced GDPR penalty risk (up to 4% of global turnover), building customer trust, and lowering long-term compliance costs.

#privacy by design #data protection #architecture #GDPR #PII