<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Florian+Stahl</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Florian+Stahl"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Florian_Stahl"/>
		<updated>2026-05-01T21:08:19Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=256454</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=256454"/>
				<updated>2019-12-19T12:28:29Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
* [Ongoing] Update of the OWASP Top 10 Privacy Risks&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://groups.google.com/a/owasp.org/forum/#!forum/top-10-privacy-risks-project/join mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Update 2019-2020===&lt;br /&gt;
Impact rating (open discussion): https://docs.google.com/document/d/1VuusvZnhHpWvmPFeAovM68iB_Do3XFZCH2EsITGuAKg/edit&amp;lt;br&amp;gt;&lt;br /&gt;
Privacy Risk Candidate List: https://docs.google.com/document/d/1eEU7TsoaPG56-zhJi4bi1SD53Jto84GQ8dDGTajL8TY/edit&amp;lt;br&amp;gt;&lt;br /&gt;
Method Update: https://docs.google.com/document/d/1AlAg2cybvo5VX-frzF5uHeAcib3X2rTAA2p97XH8fHw/edit&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&amp;lt;br&amp;gt;Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=256452</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=256452"/>
				<updated>2019-12-19T11:25:02Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
* [Ongoing] Update of the OWASP Top 10 Privacy Risks&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://groups.google.com/a/owasp.org/forum/#!forum/top-10-privacy-risks-project/join mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Update 2019-2020===&lt;br /&gt;
Impact rating (open discussion): https://docs.google.com/document/d/1VuusvZnhHpWvmPFeAovM68iB_Do3XFZCH2EsITGuAKg/edit&amp;lt;br&amp;gt;&lt;br /&gt;
Privacy Risk Candidate List: https://docs.google.com/document/d/1eEU7TsoaPG56-zhJi4bi1SD53Jto84GQ8dDGTajL8TY/edit&amp;lt;br&amp;gt;&lt;br /&gt;
Method Update: https://docs.google.com/document/d/1AlAg2cybvo5VX-frzF5uHeAcib3X2rTAA2p97XH8fHw/edit&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&amp;lt;br&amp;gt;Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=256451</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=256451"/>
				<updated>2019-12-19T11:24:20Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: Added link to update impact rating&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
* [Ongoing] Update of the OWASP Top 10 Privacy Risks&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://groups.google.com/a/owasp.org/forum/#!forum/top-10-privacy-risks-project/join mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Update 2019-2020===&lt;br /&gt;
Impact rating (open discussion): https://docs.google.com/document/d/1VuusvZnhHpWvmPFeAovM68iB_Do3XFZCH2EsITGuAKg/edit&lt;br /&gt;
Privacy Risk Candidate List: https://docs.google.com/document/d/1eEU7TsoaPG56-zhJi4bi1SD53Jto84GQ8dDGTajL8TY/edit&lt;br /&gt;
Method Update: https://docs.google.com/document/d/1AlAg2cybvo5VX-frzF5uHeAcib3X2rTAA2p97XH8fHw/edit&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&amp;lt;br&amp;gt;Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=256450</id>
		<title>Projects/OWASP Top 10 Privacy Risks Project/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=256450"/>
				<updated>2019-12-19T11:20:25Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Timeline==&lt;br /&gt;
* 20 February 2014: Project start&lt;br /&gt;
* ...&lt;br /&gt;
* 21 September 2014: Publication of v1.0 of the Top 10 Privacy Risks&lt;br /&gt;
* ...&lt;br /&gt;
* 8 April 2016: Publication of Countermeasures v1.0&lt;br /&gt;
* ...&lt;br /&gt;
* 19 December 2018: Call for Participation to Update the OWASP Top 10 Privacy Risks&lt;br /&gt;
* January 2019: Core Team Established&lt;br /&gt;
* May 2019: Assessment Method Reviewed &amp;amp; Optimized&lt;br /&gt;
* October 2019: Candidate Risks for the Top 10 list identified&lt;br /&gt;
* ~ June 2020: Risks (impact and likelihood) assessed and Top 10 Privacy Risks 2019 published&lt;br /&gt;
* End of 2020: Update of the Countermeasures&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=256449</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=256449"/>
				<updated>2019-12-19T11:17:07Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
* [Ongoing] Update of the OWASP Top 10 Privacy Risks&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://groups.google.com/a/owasp.org/forum/#!forum/top-10-privacy-risks-project/join mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Privacy Risk Candidate List 2019: https://docs.google.com/document/d/1eEU7TsoaPG56-zhJi4bi1SD53Jto84GQ8dDGTajL8TY/edit&amp;lt;br&amp;gt;&lt;br /&gt;
Method Update 2019: https://docs.google.com/document/d/1AlAg2cybvo5VX-frzF5uHeAcib3X2rTAA2p97XH8fHw/edit&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&amp;lt;br&amp;gt;Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=252186</id>
		<title>Projects/OWASP Top 10 Privacy Risks Project/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=252186"/>
				<updated>2019-06-07T08:12:06Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Timeline==&lt;br /&gt;
* 20 February 2014: Project start&lt;br /&gt;
* ...&lt;br /&gt;
* 21 September 2014: Publication of v1.0 of the Top 10 Privacy Risks&lt;br /&gt;
* ...&lt;br /&gt;
* 8 April 2016: Publication of Countermeasures v1.0&lt;br /&gt;
* ...&lt;br /&gt;
* 19 December 2018: Call for Participation to Update the OWASP Top 10 Privacy Risks in 2019&lt;br /&gt;
* 31 January 2019: Core Team Established&lt;br /&gt;
* 31 May 2019: Assessment Method Reviewed &amp;amp; Optimized&lt;br /&gt;
* 31 July 2019: Candidate Risks for the Top 10 list identified&lt;br /&gt;
* 15 December 2019: Risks (impact and likelihood) assessed and Top 10 Privacy Risks 2019 published&lt;br /&gt;
* 2020: Update of the Countermeasures&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=252185</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=252185"/>
				<updated>2019-06-07T08:09:41Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Participate */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [19 December 2018] Call for Participation for the OWASP Top 10 Privacy Risks 2019&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://groups.google.com/a/owasp.org/forum/#!forum/top-10-privacy-risks-project/join mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Privacy Risk Candidate List 2019: https://docs.google.com/document/d/1eEU7TsoaPG56-zhJi4bi1SD53Jto84GQ8dDGTajL8TY/edit&amp;lt;br&amp;gt;&lt;br /&gt;
Method Update 2019: https://docs.google.com/document/d/1AlAg2cybvo5VX-frzF5uHeAcib3X2rTAA2p97XH8fHw/edit&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&amp;lt;br&amp;gt;Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=252184</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=252184"/>
				<updated>2019-06-07T07:34:56Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Current discussions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [19 December 2018] Call for Participation for the OWASP Top 10 Privacy Risks 2019&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Privacy Risk Candidate List 2019: https://docs.google.com/document/d/1eEU7TsoaPG56-zhJi4bi1SD53Jto84GQ8dDGTajL8TY/edit&amp;lt;br&amp;gt;&lt;br /&gt;
Method Update 2019: https://docs.google.com/document/d/1AlAg2cybvo5VX-frzF5uHeAcib3X2rTAA2p97XH8fHw/edit&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&amp;lt;br&amp;gt;Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=248243</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=248243"/>
				<updated>2019-03-04T13:28:36Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [19 December 2018] Call for Participation for the OWASP Top 10 Privacy Risks 2019&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Method Update 2019: https://docs.google.com/document/d/1AlAg2cybvo5VX-frzF5uHeAcib3X2rTAA2p97XH8fHw/edit&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&amp;lt;br&amp;gt;Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=248242</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=248242"/>
				<updated>2019-03-04T13:27:43Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [19 December 2018] Call for Participation for the OWASP Top 10 Privacy Risks 2019&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Method Update 2019: https://docs.google.com/document/d/1AlAg2cybvo5VX-frzF5uHeAcib3X2rTAA2p97XH8fHw/edit&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Feel free to contact us for participation.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&amp;lt;br&amp;gt;Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=248241</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=248241"/>
				<updated>2019-03-04T13:27:13Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [19 December 2018] Call for Participation for the OWASP Top 10 Privacy Risks 2019&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Method Update 2019: https://docs.google.com/document/d/1AlAg2cybvo5VX-frzF5uHeAcib3X2rTAA2p97XH8fHw/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Feel free to contact us for participation.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&amp;lt;br&amp;gt;Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=248240</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=248240"/>
				<updated>2019-03-04T13:01:21Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [19 December 2018] Call for Participation for the OWASP Top 10 Privacy Risks 2019&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Discussion on the assessment method and an update for the OWASP Top 10 Privacy Risks 2019 will start on 1 February 2019. Feel free to contact us for participation.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&amp;lt;br&amp;gt;Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=246153</id>
		<title>Projects/OWASP Top 10 Privacy Risks Project/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=246153"/>
				<updated>2018-12-19T12:04:23Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Timeline==&lt;br /&gt;
* 20 February 2014: Project start&lt;br /&gt;
* ...&lt;br /&gt;
* 21 September 2014: Publication of v1.0 of the Top 10 Privacy Risks&lt;br /&gt;
* ...&lt;br /&gt;
* 8 April 2016: Publication of Countermeasures v1.0&lt;br /&gt;
* ...&lt;br /&gt;
* 19 December 2018: Call for Participation to Update the OWASP Top 10 Privacy Risks in 2019&lt;br /&gt;
* 31 January 2019: Core Team Established&lt;br /&gt;
* 31 March 2019: Assessment Method Reviewed &amp;amp; Optimized&lt;br /&gt;
* 15 June 2019: Candidate Risks for the Top 10 list identified&lt;br /&gt;
* 31 October 2019: Risks (impact and likelihood) assessed and Top 10 Privacy Risks 2019 published&lt;br /&gt;
* 31 December 2019: Update of the Countermeasures&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=246151</id>
		<title>Projects/OWASP Top 10 Privacy Risks Project/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=246151"/>
				<updated>2018-12-19T09:31:06Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Timeline==&lt;br /&gt;
* 20 February 2014: Project start&lt;br /&gt;
* ...&lt;br /&gt;
* 21 September 2014: Publication of v1.0 of the Top 10 Privacy Risks&lt;br /&gt;
* ...&lt;br /&gt;
* 8 April 2016: Publication of Countermeasures v1.0&lt;br /&gt;
* ...&lt;br /&gt;
* 19 December 2018: Call for Participation to Update the OWASP Top 10 Privacy Risks in 2019&lt;br /&gt;
* 31 January 2019: Core Team Established&lt;br /&gt;
* 31 March 2019: Assessment Method Reviewed &amp;amp; Optimized&lt;br /&gt;
* 15 June 2019: Candidate Risks for the Top 10 list identified&lt;br /&gt;
* 31 October 2019: Risks (impact and likelihood) assessed and Top 10 Privacy Risks 2019 published&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=246150</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=246150"/>
				<updated>2018-12-19T09:26:14Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Download Infographic version */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [19 December 2018] Call for Participation for the OWASP Top 10 Privacy Risks 2019&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Discussion on the assessment method and an update for the OWASP Top 10 Privacy Risks 2019 will start on 1 February 2019. Feel free to contact us for participation.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=246149</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=246149"/>
				<updated>2018-12-19T09:24:53Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Participation and Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br /&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [18 May 2017] Presentation at Data Protection Congress, Berlin&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Discussion on the assessment method and an update for the OWASP Top 10 Privacy Risks 2019 will start on 1 February 2019. Feel free to contact us for participation.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;3&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;#D8D8D8&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=246148</id>
		<title>Projects/OWASP Top 10 Privacy Risks Project/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=246148"/>
				<updated>2018-12-19T09:22:27Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Timeline==&lt;br /&gt;
* 20 February 2014: Project start&lt;br /&gt;
* ...&lt;br /&gt;
* 21 September 2014: Publication of v1.0 of the Top 10 Privacy Risks&lt;br /&gt;
* ...&lt;br /&gt;
* 8 April 2016: Publication of Countermeasures v1.0&lt;br /&gt;
* ...&lt;br /&gt;
* 19 December 2018: Call for Participation to Update the OWASP Top 10 Privacy Risks in 2019&lt;br /&gt;
* 31 January 2019: Core Team Established&lt;br /&gt;
* 31 March 2019: Assessment Method Reviewed &amp;amp; Optimized&lt;br /&gt;
* 15 June 2019: Candidate Risks for the Top 10 list identified&lt;br /&gt;
* 31 October 2019: Risks Assessed and Top 10 Privacy Risks 2019 published&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=246147</id>
		<title>Projects/OWASP Top 10 Privacy Risks Project/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Top_10_Privacy_Risks_Project/Roadmap&amp;diff=246147"/>
				<updated>2018-12-19T09:20:07Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Timeline==&lt;br /&gt;
* 20 February 2014: Project start&lt;br /&gt;
* ...&lt;br /&gt;
* 21 September 2014: Publication of v1.0 of the Top 10 Privacy Risks&lt;br /&gt;
* ...&lt;br /&gt;
* 8 April 2016: Publication of Countermeasures v1.0&lt;br /&gt;
* ...&lt;br /&gt;
* 19 December 2018: Call for Participation to Update the OWASP Top 10 Privacy Risks in 2019&lt;br /&gt;
* 31 January 2019: Core Team Established&lt;br /&gt;
* 31 March 2019: Assessment Process Reviewed &amp;amp; Optimized&lt;br /&gt;
* 15 June 2019: Candidate Risks for the Top 10 list identified&lt;br /&gt;
* 31 October 2019: Risks Assessed and Top 10 Privacy Risks 2019 published&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Florian_Stahl&amp;diff=240703</id>
		<title>User:Florian Stahl</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Florian_Stahl&amp;diff=240703"/>
				<updated>2018-05-14T14:06:22Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: Updated current position&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Florian Stahl is a German security and privacy consultant and evangelist. He achieved his master’s with honors in information systems science at the University of Regensburg in Germany and his master's in computer science at Växjö Universitet in Sweden. Florian started his professional career at the Swedish security software vendor Cryptzone in Gothenburg in 2006. He came back to Germany in 2009 and worked as consultant for Ernst &amp;amp; Young in Munich before moving on to msg systems in 2011 where he held positions as Lead Consultant and Senior Manager. Since 2018 he is working as Senior Cyber Security Expert for AVL. Florian has CISSP, CISM and CIPT certifications and speaks fluent German, English and Swedish. His aim is to follow a holistic approach by combining technical, organisational and social measures to protect information. He is regular speaker at conferences, member of the Internet Privacy Engineering Network (IPEN) and writes articles on his blog [http://securitybydesign.de/ securitybydesign.de]. He leads the [[OWASP_Top_10_Privacy_Risks_Project]].&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2014-I5_Privacy_Concerns&amp;diff=240702</id>
		<title>Top 10 2014-I5 Privacy Concerns</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2014-I5_Privacy_Concerns&amp;diff=240702"/>
				<updated>2018-05-14T13:59:47Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=1|impact=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider anyone who has access to the device itself, the network the device is connected to, the mobile application and the cloud connection including external and internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Attacker uses multiple vectors such as insufficient authentication, lack of transport encryption or insecure network services to view personal data which is not being properly protected or is being collected unnecessarily. Attack could come from external or internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Privacy concerns generated by the collection of personal data in addition to the lack of proper protection of that data is prevalent. Privacy concerns are easy to discover by simply reviewing the data that is being collected as the user sets up and activates the device. Automated tools can also look for specific patterns of data that may indicate collection of personal data or other sensitive data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Collection of personal data along with a lack of protection of that data can lead to compromise of a user's personal data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider the business impact of personal data that is collected unnecessarily or isn't protected properly. Data could be stolen.  Could your customers be harmed by having this personal data exposed?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Does My Device Present Privacy Concerns?|position=firstLeft|year=2013|language=en}}&lt;br /&gt;
Checking for Privacy Concerns includes:&lt;br /&gt;
* Identifying all data types that are being collected by the device, its mobile application and any cloud interfaces&lt;br /&gt;
* The device and it's various components should only collect what is necessary to perform its function&lt;br /&gt;
* Personally identifiable information can be exposed when not properly encrypted while at rest on storage mediums and during transit over networks&lt;br /&gt;
* Reviewing who has access to personal information that is collected&lt;br /&gt;
* Determining if data collected can be de-identified or anonymized&lt;br /&gt;
* Determining if data collected is beyond what is needed for proper operation of the device (Does the end-user have a choice for this data collection?)&lt;br /&gt;
* Determining if a data retention policy is in place&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Prevent Privacy Concerns?|position=right|year=2013|language=en}}&lt;br /&gt;
Minimizing privacy concerns requires:&lt;br /&gt;
# Ensuring only data critical to the functionality of the device is collected&lt;br /&gt;
# Ensuring that any data collected is of a less sensitive nature (i.e., try not to collect sensitive data)&lt;br /&gt;
# Ensuring that any data collected is de-identified or anonymized&lt;br /&gt;
# Ensuring any data collected is properly protected with encryption&lt;br /&gt;
# Ensuring the device and all of its components properly protect personal information&lt;br /&gt;
# Ensuring only authorized individuals have access to collected personal information&lt;br /&gt;
# Ensuring that retention limits are set for collected data&lt;br /&gt;
# Ensuring that end-users are provided with &amp;quot;Notice and Choice&amp;quot; if data collected is more than what would be expected from the product&lt;br /&gt;
# Ensuring the role based access control/authorization to the collected data/analyzed data is applied&lt;br /&gt;
# Ensuring that the analyzed data is de-identified&lt;br /&gt;
&lt;br /&gt;
Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer]&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}}&lt;br /&gt;
'''Scenario #1:''' Collection of personal data.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Date of birth, home address, phone number, etc.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' Collection of financial and/or health information.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Credit card data and bank account information.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
In the cases above, exposure of any of the data examples could lead to identity theft or compromise of accounts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure Top 10 2013-A6-Sensitive Data Exposure]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Top_10_Privacy_Risks_Project Top 10 Privacy Risks Project]&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate}} &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.ftc.gov/tips-advice/business-center/guidance/careful-connections-building-security-internet-things FTC: Careful Connections: Building Security in the Internet of Things]&lt;br /&gt;
[https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf FTC: Internet of Things, Privacy &amp;amp; Security in a Connected World]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=233774</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=233774"/>
				<updated>2017-09-26T12:07:56Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: Added link to PRIVACYSCORE&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [18 May 2017] Presentation at Data Protection Congress, Berlin&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyscore.org/ Check your website with PRIVACYSCORE]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=230176</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=230176"/>
				<updated>2017-06-01T04:44:54Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [18 May 2017] Presentation at Data Protection Congress, Berlin&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Security_Guidance&amp;diff=226350</id>
		<title>IoT Security Guidance</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Security_Guidance&amp;diff=226350"/>
				<updated>2017-02-14T09:45:06Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project Back To The Internet of Things Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Manufacturer IoT Security Guidance''' ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The goal of this section is help manufacturers build more secure products in the Internet of Things space. The guidance below is at a basic level, giving builders of products a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any web interface in the product disallows weak passwords&lt;br /&gt;
* Ensure that any web interface in the product has an account lockout mechanism&lt;br /&gt;
* Ensure that any web interface in the product has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that any web interface has the ability to use HTTPS to protect transmitted information&lt;br /&gt;
* Include web application firewalls to protect any web interfaces&lt;br /&gt;
* Ensure that any web interface allows the owner to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any access requiring authentication requires strong passwords&lt;br /&gt;
* Ensure that user roles can be properly segregated in multi-user environments&lt;br /&gt;
* Implement two-factor authentication where possible&lt;br /&gt;
* Ensure password recovery mechanisms are secure&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all devices operate with a minimal number of network ports active&lt;br /&gt;
* Ensure all devices do not make network ports and/or services available to the internet via UPnP for example&lt;br /&gt;
* Review all required network services for vulnerabilities such as buffer overflows or denial of service&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all communication between system components is encrypted as well as encrypting traffic between the system or device and the internet&lt;br /&gt;
* Use recommended and accepted encryption practices and avoid proprietary protocols&lt;br /&gt;
* Ensure SSL/TLS implementations are up to date and properly configured&lt;br /&gt;
* Consider making a firewall option available for the product&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure only the minimal amount of personal information is collected from consumers&lt;br /&gt;
* Ensure all collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Ensure only authorized individuals have access to collected personal information&lt;br /&gt;
* Ensure only less sensitive data is collected&lt;br /&gt;
* Ensuring data is de-identified or anonymized&lt;br /&gt;
* Ensuring a data retention policy is in place&lt;br /&gt;
* Ensuring end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all cloud interfaces are reviewed for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Ensure that any cloud-based web interface disallows weak passwords&lt;br /&gt;
* Ensure that any cloud-based web interface has an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for cloud-based web interfaces&lt;br /&gt;
* Ensure that all cloud interfaces use transport encryption&lt;br /&gt;
* Ensure that any cloud-based web interface has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any mobile application disallows weak passwords&lt;br /&gt;
* Ensure that any mobile application has an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for mobile applications (e.g Apple's Touch ID)&lt;br /&gt;
* Ensure that any mobile application uses transport encryption&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure password security options are made available (e.g. Enabling 20 character passwords or enabling two-factor authentication)&lt;br /&gt;
* Ensure encryption options are made available (e.g. Enabling AES-256 where AES-128 is the default setting)&lt;br /&gt;
* Ensure secure logging is available for security events&lt;br /&gt;
* Ensure alerts and notifications are available to the user for security events&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all system devices have update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Ensure update files are encrypted and that the files are also transmitted using encryption&lt;br /&gt;
* Ensure that update files are signed and then validated by the device before installing&lt;br /&gt;
* Ensure update servers are secure&lt;br /&gt;
* Ensure the product has the ability to implement scheduled updates&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure the device is produced with a minimal number of physical external ports (e.g. USB ports)&lt;br /&gt;
* Ensure the firmware of Operating System can not be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Ensure the product is tamper resistant&lt;br /&gt;
* Ensure the product has the ability to limit administrative capabilities in some fashion, possibly by only connecting locally for admin functions&lt;br /&gt;
* Ensure the product has the ability to disable external ports such as USB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendation for all Internet of Things products:&lt;br /&gt;
* Avoid the potential for persistent vulnerabilities in devices that have no update capability by ensuring that all devices and systems are built with the ability to be updated when vulnerabilities are discovered&lt;br /&gt;
* Rebranded devices used as part of a system should be properly configured so that unnecessary or unintended services do not remain active after the rebranding&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Developer IoT Security Guidance''' ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this section is help developers build more secure applications in the Internet of Things space. The guidance below is at a basic level, giving developers of applications a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.  Strongly consider using a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Framework_Assessment Secure IoT Framework] in order to proactively address many of the concerns listed below.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:left;&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
! Recommendations&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any web interface coding is written to prevent the use of weak passwords&lt;br /&gt;
* Ensure that any web interface coding is written to include an account lockout mechanism&lt;br /&gt;
* Ensure that any web interface coding has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that any web interface has the ability to use HTTPS to protect transmitted information&lt;br /&gt;
* Ensure that any web interface coding is written to allow the owner to change the username and password&lt;br /&gt;
* Consider the use of web application firewalls to protect any web interfaces&lt;br /&gt;
|&lt;br /&gt;
When building a web interface consider implementing lessons learned from web application security.  Employ a [https://www.owasp.org/index.php/OWASP_Periodic_Table_of_Vulnerabilities#Generic_Application_Frameworks framework] that utilizes security controls to ensure that vulnerabilities are mitigated in code.  Be sure to plan for eventual upgrades or security fixes to the framework as well.  If you use optional plugins to the framework be sure to review them for security.&lt;br /&gt;
&lt;br /&gt;
Deploy and protect the web interface in the same way you would any web application.  Utilize encrypted transport protocols if possible, being sure to validate certificates.  Limit access in whatever ways possible.  Assume users will not change configuration so deploy in a secure manner with strong credentials already in place.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that applications are written to require strong passwords where authentication is needed&lt;br /&gt;
* Ensure the application takes into account multi-user environments and includes functionality for role separation&lt;br /&gt;
* Implement two-factor authentication where possible&lt;br /&gt;
* Ensure password recovery mechanisms are written to function in a secure manner&lt;br /&gt;
* Ensure that applications are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that applications are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that applications are written to include the option to change the default username and password&lt;br /&gt;
|&lt;br /&gt;
Refer to the [https://www.owasp.org/index.php/Authentication_Cheat_Sheet OWASP Authentication Cheat Sheet]&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications that use network services don't respond poorly to buffer overflow, fuzzing or denial of service attacks&lt;br /&gt;
* Ensure applications test ports are taken out of service before going to production&lt;br /&gt;
|&lt;br /&gt;
Try to utilize tested, proven, networking stacks and interfaces that handle exceptions gracefully.  Be sure that any test or maintenance interfaces are disabled or properly protected.  Avoid exposing unauthenticated protocols (such as TFTP) or unencrypted channels (such as telnet) if possible.  Consider the attack surface that device network services present.  Turn off unnecessary services and deploy measures to protect required services, detect malicious activity, and react to an attack with measures such as lock-outs or temporary firewall rules.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all applications are written to make use of encrypted communication between devices and between devices and the internet&lt;br /&gt;
* Use recommended and accepted encryption practices and avoid proprietary protocols&lt;br /&gt;
* Consider making a firewall option available for the application&lt;br /&gt;
|&lt;br /&gt;
Utilize encrypted protocols wherever possible to protect all data in transit.  Where protocol encryption is not possible consider encrypting data before transfer.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure only the minimal amount of personal information is collected from consumers&lt;br /&gt;
* Ensure all collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Ensuring data is de-identified or anonymized&lt;br /&gt;
* Ensuring end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|&lt;br /&gt;
Data can present unintended privacy concerns when aggregated.  As a rule collect the minimal amount of data possible.  Consult with data scientists, legal and compliance teams to determine risk of data collection and storage.  Consider implications of consent and the fact that IoT devices may not present an interface for collecting consent and may passively collect data about people other than owners and operators.  IoT may collect information about individuals who cannot provide consent (such as minors) and data collection should be modified accordingly.&lt;br /&gt;
&lt;br /&gt;
Also refer to the [https://www.owasp.org/index.php/OWASP_Top_10_Privacy_Risks_Project OWASP Top 10 Privacy Risks]. &lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all cloud interfaces are reviewed for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Ensure that any cloud-based web interface coding is written to disallows weak passwords&lt;br /&gt;
* Ensure that any cloud-based web interface coding is written to include an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for cloud-based web interfaces&lt;br /&gt;
* Ensure that any cloud interface coding has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that all cloud interfaces use transport encryption&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to change the default username and password&lt;br /&gt;
|&lt;br /&gt;
Cloud security presents unique security considerations, as well as countermeasures.  Be sure to consult your cloud provider about options for security mechanisms.  Consult the OWASP [https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project Cloud Top 10 Security Risks] documents.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any mobile application coding is written to disallows weak passwords&lt;br /&gt;
* Ensure that any mobile application coding is written to include an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for mobile applications (e.g Apple's Touch ID)&lt;br /&gt;
* Ensure that any mobile application uses transport encryption&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to change the default username and password&lt;br /&gt;
* Ensure that mobile interfaces only collect the minimum amount of personal information needed&lt;br /&gt;
|&lt;br /&gt;
Mobile interfaces to IoT ecosystems require targeted security.  Consult the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Project] for further guidance.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications are written to include password security options (e.g. Enabling 20 character passwords or enabling two-factor authentication)&lt;br /&gt;
* Ensure applications are written to include encryption options (e.g. Enabling AES-256 where AES-128 is the default setting)&lt;br /&gt;
* Ensure all applications are written to produce logs for security events&lt;br /&gt;
* Ensure all applications are written to produce alerts and notifications to the user for security events&lt;br /&gt;
|&lt;br /&gt;
Security can be a value proposition.  Design should take into consideration a sliding scale of security requirements.  Architect projects with secure defaults and allow consumers to select options to be enabled or disabled.  IoT design should be forward compatible with respect to security - as cipher suites increase and new security technologies become widely available IoT design should be able to adopt these new technologies.&lt;br /&gt;
&lt;br /&gt;
Remember the security lifecycle of protect, detect, and react.  Design systems to allow for the detection of malicious activity as well as self defending capabilities and a reaction plan should a compromise be detected.  Design all stages of the lifecycle to be evolutionary so improvements can be added to a system or device future releases, updates, or patches.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all applications are written to include update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Ensure all applications are written to process encrypted update files and that the files are transmitted using encryption&lt;br /&gt;
* Ensure all applications are written to process signed files and then validate that file before installation&lt;br /&gt;
|&lt;br /&gt;
Many IoT deployments are either brownfield (i.e. applied over existing infrastructure) and/or have an extremely long deployment cycle.  To maintain the security of devices over time it is critical to plan for patches and updates.&lt;br /&gt;
&lt;br /&gt;
Confidentiality, Integrity, and Availability (CIA) are primary concerns when providing binaries and updates to edge devices.  Encrypt updates before distribution, providing decryption keys along with download instructions to authorized devices.  Updates should have cryptographic signatures using public key cryptography that can be verified by devices.  A cryptographic signature allows for distribution of updates over untrusted channels, such as Content Delivery Network (CDN), peer-to-peer, or machine to machine (M2M).&lt;br /&gt;
&lt;br /&gt;
Devices should always validate cryptographic certificates and discard updates that are not properly delivered or signed.  If unencrypted updates are utilized be sure that a cryptographic hash of the update is provided over an encrypted channel so the device can detect tampering.&lt;br /&gt;
&lt;br /&gt;
Provide a mechanism for issuing, updating and revoking cryptographic keys as well.  Key management and lifecycle should be taken into consideration prior to deployment.  This includes the SSL trust store, or root trust, on a device, which may have to be modified over the lifespan of the device.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications are written to utilize a minimal number of physical external ports (e.g. USB ports) on the device&lt;br /&gt;
* Ensure all applications can not be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Ensure all applications are written to allow for disabling of unused physical ports such as USB&lt;br /&gt;
* Consider writing applications to limit administrative capabilities to a local interface only&lt;br /&gt;
|&lt;br /&gt;
Plan on having IoT edge devices fall into malicious hands.  Utilize whatever physical security protections are available.  Disable any testing or debugging interfaces, utilize Hardware Security Modules (HSM's), cryptographic co-processors, and Trusted Platform Modules (TPM's) wherever possible.  &lt;br /&gt;
&lt;br /&gt;
Consider the implications of a compromised device.  Do not share credentials, application or cryptographic keys across multiple devices to limit the scope of damage due to a physical compromise.&lt;br /&gt;
&lt;br /&gt;
Plan for the transfer of ownership of devices and ensure that data is not transferable along with the ownership.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendations for all user interfaces (local device, cloud-based and mobile):&lt;br /&gt;
* Avoid potential Account Harvesting issues by:&lt;br /&gt;
** Ensuring valid user accounts can't be identified by interface error messages&lt;br /&gt;
** Ensuring strong passwords are required by users&lt;br /&gt;
** Implementing account lockout after 3 - 5 failed login attempts&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
== '''Consumer IoT Security Guidance''' ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this section is help consumers purchase secure products in the Internet of Things space. The guidance below is at a basic level, giving consumers a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly aid the consumer in purchasing a secure IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has web application firewall option, ensure that it is enabled&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has the option to set user privileges, consider setting user privileges to the minimal needed for operation&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has a firewall option available, enable it and ensure that it can only be accessed from your client systems&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Do not enter sensitive information into the system that is not absolutely required, e.g. address, DOB, CC, etc.&lt;br /&gt;
* Deny data collection if it appears to be beyond what is needed for proper operation of the device (If provided the choice)&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has web application firewall option, ensure that it is enabled&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If the mobile application has the option to require a PIN or password, consider using it for extra security (on client and server)&lt;br /&gt;
* If the mobile application has the option to use two factory authentication such as Apple's Touch ID, ensure it is enabled&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
* Do not enter sensitive information into the mobile application that is not absolutely required, e.g. address, DOB, CC, etc.&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option, enable any logging functionality for security-related events&lt;br /&gt;
* If your system has the option, enable any alert and notification functionality for security-related events&lt;br /&gt;
* If your system has security options for passwords, ensure they are enabled for strong passwords&lt;br /&gt;
* If your system has security options for encryption, ensure they are set for an accepted standard such as AES-256&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to verify updates, ensure it is enabled&lt;br /&gt;
* If your system has the option to download updates securely, ensure it is enabled&lt;br /&gt;
* If your system has the ability to schedule updates on a regular cadence, consider enabling it&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the ability to limit administrative capabilities possible by connecting locally, consider enabling that feature&lt;br /&gt;
* Disable any unused physical ports through the administrative interface&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
If you are looking to purchase a device or system, consider the following recommendations:&lt;br /&gt;
* Include security in feature considerations when evaluating a product&lt;br /&gt;
* Place Internet of Things devices on a separate network if possible using a firewall&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Florian_Stahl&amp;diff=226017</id>
		<title>User:Florian Stahl</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Florian_Stahl&amp;diff=226017"/>
				<updated>2017-02-06T07:04:44Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Florian Stahl is a German security and privacy consultant and evangelist. He achieved his master’s with honors in information systems science at the University of Regensburg in Germany and his master's in computer science at Växjö Universitet in Sweden. Florian started his professional career at the Swedish security software vendor Cryptzone in Gothenburg in 2006. He came back to Germany in 2009 and worked as consultant for Ernst &amp;amp; Young in Munich before moving on to msg systems where he currently holds the position as Senior Manager. Florian has CISSP and CIPT certifications and speaks fluent German, English and Swedish. His aim is to follow a holistic approach by combining technical, organisational and social measures to protect information. He is regular speaker at conferences and writes articles for magazines and on his blog [http://securitybydesign.de/ securitybydesign.de]. He leads the [[OWASP_Top_10_Privacy_Risks_Project]].&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=226016</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=226016"/>
				<updated>2017-02-06T06:58:59Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [18 May 2017] Presentation at Data Protection Congress, Berlin&lt;br /&gt;
* [31 May 2017] Presentation at EuroCACS 2017, Munich&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=225998</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=225998"/>
				<updated>2017-02-04T14:06:09Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* News &amp;amp; Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [29 March 2017] Presentation at IT-Trends Sicherheit, Bochum]&lt;br /&gt;
* [18 May 2017] Presentation at Data Protection Congress, Berlin&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=225997</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=225997"/>
				<updated>2017-02-04T14:04:43Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* News &amp;amp; Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [18 May 2017] Presentation at Data Protection Congress, Berlin&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=222409</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=222409"/>
				<updated>2016-10-14T05:30:48Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [17-18 May 2017] Presentation at Data Protection Congress, Berlin&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=222408</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=222408"/>
				<updated>2016-10-14T05:30:25Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
* [https://www.owasp.org/images/2/27/Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf Presentation of countermeasures from IAPP Data Protection Intensive 2016&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [17-18 May 2017] Presentation at Data Protection Congress, Berlin&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf&amp;diff=222407</id>
		<title>File:Presentation HowToBoostPrivacy IAPP Intensive 2016.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Presentation_HowToBoostPrivacy_IAPP_Intensive_2016.pdf&amp;diff=222407"/>
				<updated>2016-10-14T05:28:45Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: Presentation of the countermeasures for the OWASP Top 10 Privacy Risks at the IAPP Data Protection Intensive in London&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Presentation of the countermeasures for the OWASP Top 10 Privacy Risks at the IAPP Data Protection Intensive in London&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=222406</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=222406"/>
				<updated>2016-10-14T05:22:49Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [17-18 May 2017] Presentation at Data Protection Congress, Berlin&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=222391</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=222391"/>
				<updated>2016-10-13T06:54:47Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* News &amp;amp; Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
* [17-18 May 2017] Presentation at Data Protection Congress, Berlin&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=222389</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=222389"/>
				<updated>2016-10-13T06:51:12Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
* [17-18 May 2017] Presentation at German &amp;quot;Datenschutzkongress&amp;quot;, Berlin&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=221241</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=221241"/>
				<updated>2016-09-11T05:26:10Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Translation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
==Japanese==&lt;br /&gt;
[https://speakerdeck.com/owaspjapan/introducing-owasp-top10-privacy-risks-number-owasp-night-21th Link to slidedeck]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212717</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212717"/>
				<updated>2016-04-08T02:30:56Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Top 10 Privacy Risks 2014 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and related countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212716</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212716"/>
				<updated>2016-04-08T02:30:31Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Top 10 Privacy Risks 2014 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. Further information and countermeasures are provided in [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf this PDF document].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212715</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212715"/>
				<updated>2016-04-08T02:29:07Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212714</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212714"/>
				<updated>2016-04-08T02:28:46Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* News &amp;amp; Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks with Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212713</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212713"/>
				<updated>2016-04-08T02:28:10Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Top 10 Privacy Risks 2014 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks with Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [18 March 2016] Presentation at BeNeLux OWASP Day&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212712</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212712"/>
				<updated>2016-04-08T02:27:35Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* News &amp;amp; Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks with Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [18 March 2016] Presentation at BeNeLux OWASP Day&lt;br /&gt;
* [8 April 2016] Countermeasures v1.0 published&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212711</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212711"/>
				<updated>2016-04-08T02:26:58Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf Top 10 Privacy Risks with Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [18 March 2016] Presentation at BeNeLux OWASP Day&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212710</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212710"/>
				<updated>2016-04-08T02:26:15Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf OWASP Top 10 Privacy Risks with Countermeasures v1.0 (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [18 March 2016] Presentation at BeNeLux OWASP Day&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212709</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212709"/>
				<updated>2016-04-08T02:25:58Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf OWASP Top 10 Privacy Risks with Countermeasures v1.0 (PDF)&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [18 March 2016] Presentation at BeNeLux OWASP Day&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf&amp;diff=212708</id>
		<title>File:OWASP Top 10 Privacy Countermeasures v1.0.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf&amp;diff=212708"/>
				<updated>2016-04-08T02:23:34Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: OWASP Top 10 Privacy Risks including countermeasures.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Top 10 Privacy Risks including countermeasures.&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212707</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212707"/>
				<updated>2016-04-08T02:19:42Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Current discussions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing Countermeasures in Google Docs (working draft version)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [18 March 2016] Presentation at BeNeLux OWASP Day&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no ongoing discussions. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212706</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=212706"/>
				<updated>2016-04-08T02:19:21Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Participation and Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing Countermeasures in Google Docs (working draft version)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [18 March 2016] Presentation at BeNeLux OWASP Day&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Currently no discussions ongoing. Feel free to contact us for feedback and ideas.&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Countermeasures document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=207496</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=207496"/>
				<updated>2016-01-26T06:42:02Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* News &amp;amp; Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing Countermeasures in Google Docs (working draft version)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [18 March 2016] Presentation at BeNeLux OWASP Day&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Countermeasures draft document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=207495</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=207495"/>
				<updated>2016-01-26T06:39:05Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing Countermeasures in Google Docs (working draft version)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [21 May 2015] Presentation at AppSecEU, Amsterdam&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [18 March 2016] Presentation at BeNeLux OWASP Day&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Countermeasures draft document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=207264</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=207264"/>
				<updated>2016-01-22T12:02:21Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing Countermeasures in Google Docs (working draft version)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [21 May 2015] Presentation at AppSecEU, Amsterdam&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [21 October 2015] Presentation at (ISC)² EMEA Congress, Munich&lt;br /&gt;
* [20 April 2016] Presentation at IAPP Privacy Intensive, London&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Countermeasures draft document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=206369</id>
		<title>OWASP Top 10 Privacy Risks Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Privacy_Risks_Project&amp;diff=206369"/>
				<updated>2016-01-14T09:53:18Z</updated>
		
		<summary type="html">&lt;p&gt;Florian Stahl: /* Participation and Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The project in a nutshell==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
:P1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Web Application Vulnerabilities&lt;br /&gt;
:P2&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Operator-sided Data Leakage&lt;br /&gt;
:P3&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Data Breach Response&lt;br /&gt;
:P4&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Insufficient Deletion of personal data&lt;br /&gt;
:P5&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Non-transparent Policies, Terms and Conditions&lt;br /&gt;
:P6&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Collection of data not required for the primary purpose&lt;br /&gt;
:P7&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Sharing of data with third party&lt;br /&gt;
:P8&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Outdated personal data&lt;br /&gt;
:P9&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Missing or Insufficient Session Expiration&lt;br /&gt;
:P10&amp;amp;nbsp;&amp;amp;nbsp;Insecure Data Transfer&lt;br /&gt;
Further information is provided in the Top 10 Privacy Risks tab.&lt;br /&gt;
&lt;br /&gt;
== Contact us ==&lt;br /&gt;
&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Florian Stahl&lt;br /&gt;
| email = florian.stahl@owasp.org&lt;br /&gt;
| username = Florian_Stahl&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
Stefan Burgmair [mailto:Stefan.Burgmair@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/d/df/OWASP_Top10PrivacyRisks_20150529.pptx Top 10 Privacy Risks Presentation (PPTX)]&lt;br /&gt;
* [https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing Countermeasures in Google Docs (working draft version)]&lt;br /&gt;
* [https://www.owasp.org/images/6/6f/OWASPTop10PrivacyRisks_20141209.pdf Results presentation at German OWASP Day 2014]&lt;br /&gt;
* [https://www.owasp.org/images/c/c3/Top10PrivacyRisks_IAPP_Summit_2015.pdf Presentation from IAPP Global Privacy Summit 2015]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the Creative Commons CC-BY-SA v3.0 License.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Download Infographic version ==&lt;br /&gt;
[[File:Top_10_Risks.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News &amp;amp; Events ==&lt;br /&gt;
* [20 Feb 2014] Project Start&lt;br /&gt;
* [21 Sep 2014] Top 10 Privacy Risks v1.0 published&lt;br /&gt;
* [5 Mar 2015] Presentation at IAPP Global Privacy Summit, Washington DC&lt;br /&gt;
* [21 May 2015] Presentation at AppSecEU, Amsterdam&lt;br /&gt;
* [1 July 2015] German Translation available&lt;br /&gt;
* [21 October 2015] Presentation at (ISC)² EMEA Congress, Munich&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf OECD Privacy Guidelines]&lt;br /&gt;
[https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN Internet Privacy Engineering Network - IPEN]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=mO7bjmUAq-Q Video from IPEN workshop at Berlin state parliament]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=6SEdnWlSZyk Video from panel discussion at CPDP 2015 in Brussels]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://privacyassociation.org/news/a/on-how-owasp-identifies-privacy-risks-in-web-applications IAPP blogs about the project]&lt;br /&gt;
[https://www.youtube.com/watch?v=WXSZiWNyPZA Video from presentation at AppSec EU 2015]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Top 10 Privacy Risks=&lt;br /&gt;
&lt;br /&gt;
==Top 10 Privacy Risks 2014==&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the documents in the Participation and Discussions section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;No.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Frequency&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Impact&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Description&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Web Application Vulnerabilities&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Vulnerability is a key problem in any system that guards or operates on sensitive user data. Failure to suitably design and implement an application, detect a problem or promptly apply a fix (patch) is likely to result in a privacy breach. This risk also encompasses the OWASP Top 10 List of web application vulnerabilities and the risks resulting from them.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Operator-sided Data Leakage&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Introduced either due to intentional malicious breach or unintentional mistake e.g. caused by insufficient access management controls, insecure storage, duplication of data or a lack of awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Data Breach Response&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not informing the affected persons (data subjects) about a possible breach or data leak, resulting either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insufficient Deletion of Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively and/or timely delete personal data after termination of the specified purpose or upon request.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Non-transparent Policies, Terms and Conditions&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Not providing sufficient information to describing how data is processed, such as its collection, storage, and processing. Failure to make this information easily-accessible and understandable for non-lawyers.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collection of data not required for the primary purpose&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Collecting descriptive, demographic or any other user-related data that are not needed for the purposes of the system. Applies also to data for which the user did not provide consent. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sharing of Data with Third Party&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Providing user data to any third-party, without obtaining the user’s consent. Sharing results either due to transfer or exchanging for a monetary compensation or otherwise due to inappropriate use of third-party resources included in the web site like widgets (e.g. maps, social networks buttons), analytics or web bugs (e.g. beacons). &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Outdated personal data&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;The use of outdated, incorrect or bogus user data. Failure to update or correct the data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Missing or insufficient Session Expiration&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to effectively enforce session termination. May result in collection of additional user-data without the user’s consent or awareness.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Insecure Data Transfer&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Failure to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failure of enforcing mechanisms limiting the leak surface, e.g. allowing to infer any user data out of the mechanics of Web application operation.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, &amp;gt; 2: Very high&lt;br /&gt;
&lt;br /&gt;
= Participation and Discussion =&lt;br /&gt;
&lt;br /&gt;
==Participate==&lt;br /&gt;
&lt;br /&gt;
Some ways you can help:&lt;br /&gt;
* Discuss with us in the mailing list or Google docs&lt;br /&gt;
* Tell your colleagues and friends about the project&lt;br /&gt;
* Provide feedback (feel free to contact us)&lt;br /&gt;
* Apply the results in practice to improve web application privacy&lt;br /&gt;
&lt;br /&gt;
Sign up to our [https://lists.owasp.org/mailman/listinfo/owasp_top_10_privacy_risks_project mailing list] to stay informed.&lt;br /&gt;
&lt;br /&gt;
==Discussions and Documentation==&lt;br /&gt;
&lt;br /&gt;
To avoid overwriting issues we use Google Docs for our discussions.&lt;br /&gt;
&lt;br /&gt;
===Current discussions===&lt;br /&gt;
Countermeasures draft document: https://docs.google.com/document/d/1GaoJDPtyXMv09wIw9xXTVPYTR_6fQROlptszPhxVc1s/edit?usp=sharing&lt;br /&gt;
&lt;br /&gt;
===Closed discussions and documents=== &lt;br /&gt;
Method: https://docs.google.com/document/d/1nHM9LH2rP6ac3DvJ7lehDNb9qVP5YADOQGNEuiy5okg/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Privacy Risk list 2014: https://docs.google.com/document/d/1ufAuGtW42gUHtJF-9_VOzNZEegZJnMyqDcyfzmsjJeQ/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Draft list: https://docs.google.com/document/d/1WMljvy09nulPnzv5XkFc2uxn1bSR-ftKqx5VoayTzW8/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Impact rating: https://docs.google.com/a/owasp.org/document/d/1Gjd5XVJyGWHryUA2WyPSRQ0gQuaD5zWUCHU76_FHMKU/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Calculation of the complete Privacy Risks list v1.0: https://docs.google.com/spreadsheets/d/1q7Xh4gclSieXNpVbdvyFwsZMENo2r3BoN2S3ww_W5-M/edit&lt;br /&gt;
&amp;lt;br&amp;gt;Brainstorming for countermeasures: https://docs.google.com/a/owasp.org/document/d/1g4Q_XDVGEAbVR_7DLNIbDN2men57BQ0pNn8CyRc2od8/edit&lt;br /&gt;
&lt;br /&gt;
==Survey Results==&lt;br /&gt;
&lt;br /&gt;
A survey was performed to determine the frequency of occurrence of privacy violations in web applications.&lt;br /&gt;
&lt;br /&gt;
63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a summary of the results or you can [https://www.owasp.org/images/c/c8/PrivacyTop10Survey.pdf download the full report].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1:&lt;br /&gt;
&lt;br /&gt;
Q1 Do or did you work as a:&lt;br /&gt;
&lt;br /&gt;
Software Developer		26.98% &lt;br /&gt;
&lt;br /&gt;
Software Designer		12.70% &lt;br /&gt;
&lt;br /&gt;
Legal Practitioner		 4.76% &lt;br /&gt;
&lt;br /&gt;
Software Project Manager	11.11%&lt;br /&gt;
&lt;br /&gt;
Data Privacy Expert		33.33%&lt;br /&gt;
&lt;br /&gt;
Security Expert			66.67%&lt;br /&gt;
&lt;br /&gt;
Public Servant			12.70% &lt;br /&gt;
&lt;br /&gt;
Other				11.11%&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q2 In total, how many years of professional experience do you have related to privacy?&lt;br /&gt;
&lt;br /&gt;
Average: 6.2 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q3 In total, how many years of professional experience do you have related to web applications?&lt;br /&gt;
&lt;br /&gt;
Average: 8.1 years&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 2:&lt;br /&gt;
&lt;br /&gt;
The following ratings are between 1 and 4.&lt;br /&gt;
&lt;br /&gt;
The possible choices for answers where:&lt;br /&gt;
&lt;br /&gt;
[1] Up to one out of four web applications. (0-25%)&lt;br /&gt;
&lt;br /&gt;
[2] Up to ev ery second web application. (26-50%)&lt;br /&gt;
&lt;br /&gt;
[3] Up to three out of four web applications. (51-75%)&lt;br /&gt;
&lt;br /&gt;
[4] More than three out of four web applications. (76-100%)&lt;br /&gt;
&lt;br /&gt;
[excluded] N/A &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
01. Collection of data not required for main purpose&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
02. Collection of Incorrect Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
03. Collection without consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
04. Problems with getting Consent&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
05. Outdated Personal Data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
06. Inability of users to modify stored data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07. Insufficient deletion of personal data&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08. Unrelated use&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09. Data Aggregation and Profiling&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Sharing of data with third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Operator-sided Data Leakage&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insecure data transfer&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Insufficient Data Breach Response&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Form field design issues&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Missing or Insufficient Session Expiration&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.4&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. Misleading Content&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. Non-transparent Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 3.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. Inappropriate Policies, Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.7&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20. Transfer or processing through third party&lt;br /&gt;
&lt;br /&gt;
Average Rating: 2.6&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==Frequently Asked Questions==&lt;br /&gt;
&lt;br /&gt;
===Why is this project only about web applications and not about any kind of software?===&lt;br /&gt;
Web applications can easily collect data from users without their permission or without adequately informing them how their data is used. Cookies, and other trackers, enable the monitoring of user's behaviour, and this information may be used for a variety of commercial purposes, including targeted advertising, profiling, and the sale of aggregated data. This is why the subject is so important, especially for web applications.&lt;br /&gt;
&lt;br /&gt;
===Are the Top 10 Privacy Risks applicable for mobile apps as well?===&lt;br /&gt;
Privacy risks for mobile apps are very similar. The rating might be slightly different and there might be some additional risks related to the loss of devices and the use of location data, but in general the Top 10 Privacy Risks are applicable for mobile apps as well.   &lt;br /&gt;
&lt;br /&gt;
===What is the difference between this project and the OWASP Top 10?===&lt;br /&gt;
There are two main differences. First, the OWASP Top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP Top 10 do not address software such as cookies or trackers, or organisational issues like privacy notices, profiling, or the sharing of data with third parties.&lt;br /&gt;
&lt;br /&gt;
===Why should companies and other organisations be concerned about privacy risks?===&lt;br /&gt;
Privacy risks may have serious consequences for an organisation, such as: &lt;br /&gt;
* perceived harm to privacy;&lt;br /&gt;
* a failure to meet public expectations on both the use and protection of personal information;&lt;br /&gt;
* retrospective imposition of regulatory conditions;&lt;br /&gt;
* low adoption rates or poor participation in the scheme from both the public and partner organisations;&lt;br /&gt;
* the costs of redesigning the system or retro-fitting solutions;&lt;br /&gt;
* failure of a project or completed system;&lt;br /&gt;
* withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or&lt;br /&gt;
* failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.&lt;br /&gt;
(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)&lt;br /&gt;
&lt;br /&gt;
= Translation =&lt;br /&gt;
Currently project documentation is available in English and German. If you are interested in helping to translate to another language, please contact the project leaders.  &lt;br /&gt;
==German==&lt;br /&gt;
===Top 10 Datenschutzrisiken===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; style=&amp;quot;background-color:#FFFFFF;border-collapse:collapse;border:1px solid #000000;color:#000000;width:100%&amp;quot; cellpadding=&amp;quot;3&amp;quot; cellspacing=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Nr.&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Titel&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Häufigkeit&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Schaden&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=#D8D8D8&amp;gt;&amp;lt;b&amp;gt;Beschreibung&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;		&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P1&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen in Webanwendungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Schwachstellen sind ein zentrales Problem in jedem System, mit dem sensible Nutzerdaten erhoben, verarbeitet und genutzt werden. Bestehen Fehler im Design oder in der Implementierung der Applikation, werden Probleme nicht entdeckt oder Sicherheitspatches nicht unverzüglich eingespielt, führt dies mit hoher Wahrscheinlichkeit zu einer Verletzung des Persönlichkeitsrechts. Dieses Risiko wird bereits in anderen Projekten behandelt, wie der OWASP Top 10 Liste der häufigsten Sicherheitsrisiken für Webanwendungen.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P2&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Datenabfluss beim Betreiber&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Wird die unerwünschte Preisgabe personenbezogener oder personenbeziehbarer Daten an nicht autorisierte Personen nicht wirksam verhindert, ist dies ein Verlust der Vertraulichkeit. Ursachen sind entweder ein vorsätzlich durchgeführter Datenabzug oder unbeabsichtigte Fehler wie beispielsweise unzureichendes Zugriffsmanagement, unsichere Datenablage, Datendopplung oder fehlendes Problembewusstsein (Awareness).&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P3&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Reaktion bei einer Datenpanne&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Betroffene werden nicht &amp;amp;uuml;ber m&amp;amp;ouml;gliche Pannen oder Datenlecks benachrichtigt, die durch Angriffe oder unbeabsichtigte Ereignisse entstehen. Angemessene Abhilfemaßnahmen zum Schließen der Lücken und Beseitigung der Ursache fehlen.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P4&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichende Löschung personenbezogener Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden nicht termingerecht oder nicht effektiv nach Zweckablauf bzw. aufgrund einer L&amp;amp;ouml;schanfrage gelöscht.&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P5&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Intransparente Nutzungsbedingungen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Very high&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Informationen zur Datenverarbeitung wie Erhebung, Speicherung und Nutzung personenbezogener Daten sind unzureichend. Diese Informationen sind nicht leicht zugänglich oder für juristische Laien nicht verständlich aufbereitet.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P6&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Sammeln von Daten, die über den eigentlichen Zweck hinaus gehen&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden Beschreibungsdaten, demographische Daten oder sonstige personenbezogene Daten gesammelt, die nicht für den vereinbarten Zweck der Anwendung benötigt werden. Ebenso werden Daten gesammelt, für deren Erhebung der Nutzer keine Einverständniserklärung abgegeben hat. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P7&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Weitergabe von Daten an Dritte&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Personenbezogene Daten werden ohne Einverständnis des Nutzers an Dritte weiter gegeben bzw. diesen zur Verfügung gestellt. Die Weitergabe von Daten und Erkenntnissen erfolgt entweder direkt oder auf Anfrage, gegen Zahlung oder auch durch unsachgemäßen Einsatz von Diensten Dritter wie beispielsweise Widgets für Webseiten (z.B. Landkarten, Buttons von sozialen Netzwerken), Analysetools oder Web Bugs (z.B. Beacons).&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P8&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Veraltete personenbezogene Daten&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=orange&amp;gt;Hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Es werden veraltete, inkorrekte oder gefälschte personenbezogene Daten genutzt. Datenaktualisierungen oder -korrekturen finden nicht in ausreichendem Maße statt.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P9&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Fehlendes oder unzureichendes Session-Ende&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unzureichendes Beenden von Sessions. Dies kann dazu führen, dass zusätzliche Nutzerdaten ohne Einverständnis oder Wissen des Nutzers gesammelt werden.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;P10&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Unsichere Datenübertragung&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=yellow&amp;gt;Mittel&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td bgcolor=red&amp;gt;Sehr hoch&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td&amp;gt;Die Datenübermittlung erfolgt nicht auf verschlüsselten und sicheren Kanälen, so dass ein unautorisierter Zugriff nicht verhindert wird. Mechanismen zum Verringern der Angriffsfläche, werden nicht umgesetzt. Hierzu gehört es zu verhindern, dass durch das Verhalten der Webanwendung Rückschlüsse auf Nutzerdaten möglich sind.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
===Presentation===&lt;br /&gt;
[https://www.it-sa.de/de/events/2/2015-10-06/forum-rot-management/11939/#12089 Video and presentation] from it-sa Security Expo and Congress 2015 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Flyer===&lt;br /&gt;
[[File:Top_10_Privacy_Risks_German.png | 200px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Stefan Burgmair&lt;br /&gt;
* R. Jason Cronk&lt;br /&gt;
* Edward Delaporte&lt;br /&gt;
* Tim Gough&lt;br /&gt;
* Prof. Hans-Joachim Hof&lt;br /&gt;
* Lukasz Olejnik&lt;br /&gt;
* Florian Stahl&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
* [http://www.cs.hm.edu/en/home/index.en.html University of Applied Sciences Munich]&lt;br /&gt;
* [https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/IPEN European Data Protection Supervisory's Internet Privacy Engineering Network (IPEN)]&lt;br /&gt;
* [http://privacyassociation.org/ International Association of Privacy Professionals (IAPP)]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
* [http://www.msg-systems.com/ msg systems]&lt;br /&gt;
&lt;br /&gt;
Feel free to contact us in case you are also interested to support the OWASP Top 10 Privacy Risks project.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Top_10_Privacy_Risks_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Florian Stahl</name></author>	</entry>

	</feed>