Udacity Logo
Log InSign Up

Implementing Privacy in Software Applications

Course

This course is designed with two types of people in mind: 1) Engineers who hadn't really delved into privacy engineering, and 2) those who have only basic technical skills, but a strong interest in privacy engineering. We learn how the basic principles that privacy engineers follow when evaluating and building software. We'll look at some common legal requirements that privacy engineers must reckon with in many parts of the world and how to implement those requirements for your application or platform. As we go over privacy engineering for compliance, we'll learn that an essential step is to first identify, then track or catalog sensitive data within our system. And finally, we will learn how to manage and protect data using data minimization.

This course is designed with two types of people in mind: 1) Engineers who hadn't really delved into privacy engineering, and 2) those who have only basic technical skills, but a strong interest in privacy engineering. We learn how the basic principles that privacy engineers follow when evaluating and building software. We'll look at some common legal requirements that privacy engineers must reckon with in many parts of the world and how to implement those requirements for your application or platform. As we go over privacy engineering for compliance, we'll learn that an essential step is to first identify, then track or catalog sensitive data within our system. And finally, we will learn how to manage and protect data using data minimization.

4 weeks

Real-world Projects

Completion Certificate

Last Updated January 14, 2022

Prerequisites:

No experience required

Course Lessons

Lesson 1

Intro to Privacy Engineering in Software Applications

We introduce the need and importance of the topic, as well as some of the history behind privacy. We'll also take a look at the working environment as well as your final project.

Lesson 2

Privacy Engineering Fundamentals

We will learn how to think like an actual privacy engineer and understand the basic principles that privacy engineers follow when evaluating and building software.

Lesson 3

Privacy Engineering for Compliance

We'll look at some common legal requirements that privacy engineers must reckon with in many parts of the world and how to implement those requirements for your application or platform.

Lesson 4

Tracking Sensitive Data

We'll learn that an essential step is to first identify, then track or catalog sensitive data within our system. We'll learn to write code to put these to practice.

Lesson 5

Data Minimization

We will learn how to manage and protect sensitive data while still making use of it within our applications and platforms, with a set of privacy engineering techniques.

Lesson 6 • Project

Designing a Privacy-Protective Voting-Booth Application

You will build an election voting privacy-protective app that that ensures the election results, while protecting ballot secrecy and the data associated with individual voters.

Taught By The Best

Photo of Mihir Patil

Mihir Patil

Technical Lead, Privacy & Civil Liberties Engineering

Mihir has worked with customers like the World Food Programme, multinational pharmaceutical and telecommunications companies, as well as organizations in the U.S. defense space to implement technical solutions for protecting individual liberties.

Taught By The Best

Photo of Mihir Patil

Mihir Patil

Technical Lead, Privacy & Civil Liberties Engineering

Mihir has worked with customers like the World Food Programme, multinational pharmaceutical and telecommunications companies, as well as organizations in the U.S. defense space to implement technical solutions for protecting individual liberties.

Get Started Today

Implementing Privacy in Software Applications