ENISA proposes PETs maturity assessment methodology

Xavier León
ENISA has produced a report on maturity (i.e. quality and technology readiness) assessment of Privacy Enhancing Technologies (PETs). The report firstly, sketches a methodology for gathering expert opinions and measurable indicators as evidence for a two dimensional rating scale. Secondly, the report

Importance for Trustworthiness

Total votes: 208

Challenge

This report aims at developing a methodology that allows to compare different Privacy Enhancing Tech-nologies (PETs) with regard to their maturity, i.e., their technology readiness and their quality concerning the provided privacy notion. The report firstly sketches a methodology for gathering expert opinions and measurable indicators as evidence for a two dimensional rating scale. Secondly, this report reviews two pilots to test the proposed scales and methodology. The results of these pilots are presented in this study. Finally, a list of necessary steps towards a PET maturity repository is made available.

More information on the report here: https://www.enisa.europa.eu/publications/pets

Comments

Manel Medina's picture

The PETs assessment repository can be found here: - http://94.23.106.129/#/home
It can be freely used to make (self-)assessment of the Privacy of your tools.

Danny Guamán's picture

It is an initiative that has great value. This catalogue, as well as others such as the catalogues of privacy design patterns (e.g. privacypatterns.eu ), become essential inputs for developers when building privacy-friendly applications and services.
While having a catalogue of PETs (with the level of implementation and quality assessed by experts) is of great help in building privacy-friendly systems, it is only one step. Other tools/methods are needed to include these PETs in a more systematic and intuitive way during the design and implementation of privacy-friendly systems since in some cases PETs appear as isolated solutions, initiated by users as a self-defence mechanism. Some barriers/challenges in this direction are mentioned in https://truessec.eu/sites/default/files/evidence/d5.2_technical_gap_analysis.pdf

Add comment

Log in or register to post comments