GemTALK #2 – How to achieve Privacy by Design and Conduct DPIAs

Over the last few months, the GDPR’s focus on Privacy by Design has encouraged the development of various proactive measures – including designing operations to minimise the use of personal data, building-in consent mechanisms into online services, and facilitating user-centric applications and interfaces.

As requested from our first webinar, the second in our series, looked at the information security landscape, focusing on “How to achieve Privacy by Design and conduct Data Protection Impact Assessments (DPIAs)”.

We hope this webinar unpacked how risk-based methods for Privacy by Design can be deployed, and provided you with a deeper understanding of the following topics:

Privacy by Design

  • Introduction to Privacy by Design
  • Principles for Privacy by Design
  • Privacy by Design Process
  • Examples: Data minimisation
  • Examples: PETs
  • Examples: Security by Design


  • Background to the DPIA process
  • Examples of DPIA assessments
  • Procedures for ongoing monitoring

We found the webinar was a good way of connecting with you all and we hope that you found the event engaging and informative.

Missed the webinar, we’ve got you covered!

If you missed the webinar you can now watch by accessing the link below. This link will also allow you to download the presentation and all of the Q&As.

Webinar Link


Question & Answers

Contact Us

If you would like to speak to our consultants to discuss how we can help you with data protection then please contact the data protection team at or +44(0) 207 090 1091.

Share this...

Share on email
Share on twitter
Share on linkedin
Share on facebook

Find out


Every day our teams of experts are analysing information like this, providing high-level need to know reports for our clients so they can continue to stay ahead and lead their industries.

Get an unfair advantage – subscribe to our mailing list by filling out the form opposite. You can find out how we look after your data in our Data Policy.

About the Authors