Scalable Data Privacy Engineering

Scalable Data Privacy Engineering

Balancing scale, with privacy and utility is doable.

GDPR regulations mandate any data processor - that handles user data - must provide two core functions:
1. The data that they have about a user - what do you know about me?
2. Deletion of user data - what I don’t want you to keep.

However, both these mandates are not easy for a data processor to comply with because they require the processor to have robust data management practices from day one of their operations. Making a company GDPR-compliant retrospectively is very hard since architects typically focus on designing for scalability, maintainability and data security in the early stages of a company.

We invite talks from practitioners who have gone through the journey of data engineering and how they have managed to balance the difficult goals of privacy, utility and scale within their organizations.

Who should participate:
1. Data engineering architects
2. Data Privacy Officers
3. Data engineers
4. Product managers

Schedule: https://hasgeek.com/rootconf/scalable-data-privacy-engineering-conf/schedule

Contact information: Join the Rootconf Telegram group at https://t.me/rootconf or follow @rootconf on Twitter.
For inquiries, contact Rootconf at rootconf.editorial@hasgeek.com or call 7676332020.

Hosted by

Rootconf is a forum for discussions about DevOps, infrastructure management, IT operations, systems engineering, SRE and security (from infrastructure defence perspective). more

Supported by

Zeta® is in the business of providing a full-stack, cloud-native, API first neo-banking platform including a digital core and a payment engine for issuance of credit, debit and prepaid products that enable legacy banks and new-age fintech institutions to launch modern retail and corporate fintech p… more

Promoted

We’re the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. As a hyperscale cloud service provider, AWS provides access to highly advanced computing tools on rent for startups and SMEs at affordable prices. We help t… more
Omidyar Network India invests in bold entrepreneurs who help create a meaningful life for every Indian, especially the hundreds of millions of Indians in low-income and lower-middle-income populations, ranging from the poorest among us to the existing middle class. To drive empowerment and social i… more
about.facebook.com/meta
Deep dives into privacy and security, and understanding needs of the Indian tech ecosystem through guides, research, collaboration, events and conferences. Sponsors: Privacy Mode’s programmes are sponsored by: more

GDPR regulations mandate any data processor - that handles user data - must provide two core functions:
1. The data that they have about a user - what do you know about me?
2. Deletion of user data - what I don’t want you to keep.

However, both these mandates are not easy for a data processor to comply with because they require the processor to have robust data management practices from day one of their operations. Making a company GDPR-compliant retrospectively is very hard since architects typically focus on designing for scalability, maintainability and data security in the early stages of a company.

We invite talks from practitioners who have gone through the journey of data engineering and how they have managed to balance the difficult goals of privacy, utility and scale within their organizations.

Who should participate:
1. Data engineering architects
2. Data Privacy Officers
3. Data engineers
4. Product managers

Schedule: https://hasgeek.com/rootconf/scalable-data-privacy-engineering-conf/schedule

Contact information: Join the Rootconf Telegram group at https://t.me/rootconf or follow @rootconf on Twitter.
For inquiries, contact Rootconf at rootconf.editorial@hasgeek.com or call 7676332020.

Featured submissions

See all
  • Sreenath S Kamath

    May I have my data please?

    In a world where we collect as much user data to make their journey as personalized as possible, it’s also important to adhere to compliance requirements where a user can request both deletion (forget) or a dump (access) of their data. As a centralized data-platform team, this was a huge challenge for us at Disney + Hotstar. Owning the platform, while various teams owned the data meant that we ha… more

    09 Apr 2021

  • Rounak Datta

    Protect the pie (PII)

    Core to data-security is the user’s personally identifiable information. As Disney + Hotstar grows internationally, with increasing compliance restrictions, we’ve re-architected our entire data-platform to support differing compliance & security requirements. We make the user’s personally identifiable information impossible to access unless absolutely necessary. In this talk we discuss how we use… more

    09 Apr 2021

  • Bhupendra Jain

    Data Deletion Practices @ Offline Data Lake

    LinkedIn works at exabyte data scale and respecting the privacy of its Members is the top most priority as part of LinkedIn culture and the core value “Members first”. This talk will briefly touch upon some of the practices, tools & technologies used in offline data lake for adherence to GDPR “Right to erasure”. Talk will also cover the lessons learned and challenges faced while talking in detail… more

    01 Jul 2021

  • Biju Nair

    Data Deletion: Explaining the legal requirements: timelines and exceptions and case laws.

    Whether your products and services are B2B or a B2C, you need to be aware of legal requirements that your technological solutions are required and expected to fulfil so that you can design those products and services in accordance with those requirements from the beginning. Right of Deletion is not absolute. To be able to comply with the requirements for deletion of data, one needs to be aware of… more

    24 Jul 2021

Videos

See all
Data Deletion Practices at LinkedIn's Offline Data Lake

Data Deletion Practices at LinkedIn's Offline Data Lake

Bhupendra Jain, Staff Software Engineer at LinkedIn

33 minutes27 August 2021
Data Deletion: Explaining the legal requirements: timelines and exceptions and case laws.

Data Deletion: Explaining the legal requirements: timelines and exceptions and case laws.

Biju Nair, Independent Technology Lawyer

29 minutes27 August 2021
May I have my Data Please?

May I have my Data Please?

Sreenath S Kamath, Data Engineer at Hotstar

29 minutes27 August 2021
Protect the Pie (PII)

Protect the Pie (PII)

Rounak Datta, Software Development Engineer at Hotstar

33 minutes27 August 2021

Hosted by

Rootconf is a forum for discussions about DevOps, infrastructure management, IT operations, systems engineering, SRE and security (from infrastructure defence perspective). more

Supported by

Zeta® is in the business of providing a full-stack, cloud-native, API first neo-banking platform including a digital core and a payment engine for issuance of credit, debit and prepaid products that enable legacy banks and new-age fintech institutions to launch modern retail and corporate fintech p… more

Promoted

We’re the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. As a hyperscale cloud service provider, AWS provides access to highly advanced computing tools on rent for startups and SMEs at affordable prices. We help t… more
Omidyar Network India invests in bold entrepreneurs who help create a meaningful life for every Indian, especially the hundreds of millions of Indians in low-income and lower-middle-income populations, ranging from the poorest among us to the existing middle class. To drive empowerment and social i… more
about.facebook.com/meta
Deep dives into privacy and security, and understanding needs of the Indian tech ecosystem through guides, research, collaboration, events and conferences. Sponsors: Privacy Mode’s programmes are sponsored by: more