This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Top 10 Privacy Risks Project"

From OWASP
Jump to: navigation, search
(FAQs)
(FAQs)
Line 358: Line 358:
 
==Frequently Asked Questions==
 
==Frequently Asked Questions==
  
<br><br>
+
<br>
 
; Why is this project only about web applications and not about any kind of software?
 
; Why is this project only about web applications and not about any kind of software?
 
: Web applications can easily collect data from users without their permission or informing them about the usage of their data. Trackers and cookies deliberately enable the monitoring of the users behaviour, often for selling those data. That is the reason why this subject is so important, especialy for web applications.  
 
: Web applications can easily collect data from users without their permission or informing them about the usage of their data. Trackers and cookies deliberately enable the monitoring of the users behaviour, often for selling those data. That is the reason why this subject is so important, especialy for web applications.  

Revision as of 11:04, 21 September 2014

OWASP Project Header.jpg

The project in a nutshell

The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications. Privacy and security experts from all over the world are involved and discuss and rate current privacy issues. The result is a list covering technological and organizational aspects focusing on real-life risks and not only legal issues. It uses the OECD Privacy Guidelines as a framework and aims to help developers and web application providers to better understand and improve privacy. The list can also be used to assess privacy risks associated with specific web applications.

Top 10 Privacy Risks 2014

P1    Web Application Vulnerabilities
P2    Operator-sided Data Leakage
P3    Insufficient Data Breach Response
P4    Insufficient Deletion of personal data
P5    Non-transparent Policies, Terms and Conditions
P6    Collection of data not required for the user-consented purpose
P7    Sharing of data with third party
P8    Outdated personal data
P9    Missing or Insufficient Session Expiration
P10  Insecure Data Transfer

Further information is provided in the Top 10 Privacy Risks tab.

Licensing

OWASP Top 10 Privacy Risks Project is free to use. It is licensed under the GNU GPL v3 License.


Contact us


Project Leader

Florian Stahl


Quick Download


News & Events

  • [20 Feb 2014] Project Start
  • [07 Apr 2014] Method draft
  • [26 Aug 2014] Survey results published
  • [21 Sep 2014] Top 10 Privacy Risks v1.0 published
  • [26 Sep 2014] Initial results presentation (IPEN, Berlin)

External Links

OECD Privacy Guidelines Podcast about the project Internet Privacy Engineering Network - IPEN


Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg

Top 10 Privacy Risks 2014

Version 1.0 of the OWASP Top 10 Privacy Risks list. For background information check the Discussions and Documentation section. A more detailed description of the risks will follow soon.

No. Title Frequency Impact Description
P1 Web Application Vulnerabilities High Very high
P2 Operator-sided Data Leakage High Very high
P3 Insufficient Data Breach Response High Very high
P4 Insufficient Deletion of Personal Data Very high High
P5 Non-transparent Policies, Terms and Conditions Very high High
P6 Collection of data not required for the user-consented purpose Very high High
P7 Sharing of Data with Third Party High High
P8 Outdated personal data High Very high
P9 Missing or insufficient Session Expiration Medium Very high
P10 Insecure Data Transfer Medium Very high

Note: The values between 0 to 3 used for frequency and impact rating were replaced by a textual description: 0-1: Low, 1-1.5: Medium, 1.5-2: High, > 2: Very high

Timeline

  • 20 February 2014: Project start
  • ...
  • 21 September 2014: Publication of v1.0 of the Top 10 Privacy Risks
  • 26 September 2014: Initial results presentation at the IPEN Workshop in Berlin State Parliament
  • End of 2014: Define a core team for improvement and further development
  • 2015: Further promotion of the Top 10 Privacy Risks Project
  • 2015: Improvements, development of countermeasures and version 2

Participate

Some ways you can help:

  • Discuss with us in the Discussions and documentation section
  • Tell your colleagues and friends about the project
  • Provide feedback (feel free to contact us)
  • Apply the results in practice to improve web application privacy

Sign up to our mailing list to stay informed.

OWASP Top 10 Privacy Risks Survey

A survey was performed to determine the frequency of occurrence of privacy violations in web applications.

63 people participated in total. The survey was online for 3 weeks from 4 to 25 August 2014.


Here is a summary of the results or you can download the full report.


Part 1:

Q1 Do or did you work as a:

Software Developer 26.98%

Software Designer 12.70%

Legal Practitioner 4.76%

Software Project Manager 11.11%

Data Privacy Expert 33.33%

Security Expert 66.67%

Public Servant 12.70%

Other 11.11%


Q2 In total, how many years of professional experience do you have related to privacy?

Average: 6.2 years


Q3 In total, how many years of professional experience do you have related to web applications?

Average: 8.1 years


Part 2:

The following ratings are between 1 and 4.

The possible choices for answers where:

[1] Up to one out of four web applications. (0-25%)

[2] Up to ev ery second web application. (26-50%)

[3] Up to three out of four web applications. (51-75%)

[4] More than three out of four web applications. (76-100%)

[excluded] N/A


01. Collection of data not required for main purpose

Average Rating: 3.1


02. Collection of Incorrect Data

Average Rating: 2.0


03. Collection without consent

Average Rating: 3.0


04. Problems with getting Consent

Average Rating: 2.6


05. Outdated Personal Data

Average Rating: 2.6


06. Inability of users to modify stored data

Average Rating: 2.3


07. Insufficient deletion of personal data

Average Rating: 3.3


08. Unrelated use

Average Rating: 2.7


09. Data Aggregation and Profiling

Average Rating: 2.4


10. Sharing of data with third party

Average Rating: 2.8


11. Operator-sided Data Leakage

Average Rating: 2.7


12. Insecure data transfer

Average Rating: 2.3


13. Web Application Vulnerabilities

Average Rating: 2.9


14. Insufficient Data Breach Response

Average Rating: 2.6


15. Form field design issues

Average Rating: 2.2


16. Missing or Insufficient Session Expiration

Average Rating: 2.4


17. Misleading Content

Average Rating: 2.3


18. Non-transparent Policies, Terms and Conditions

Average Rating: 3.2


19. Inappropriate Policies, Terms and Conditions

Average Rating: 2.7


20. Transfer or processing through third party

Average Rating: 2.6

Frequently Asked Questions


Why is this project only about web applications and not about any kind of software?
Web applications can easily collect data from users without their permission or informing them about the usage of their data. Trackers and cookies deliberately enable the monitoring of the users behaviour, often for selling those data. That is the reason why this subject is so important, especialy for web applications.
What is the difference between this project and the OWASP top 10?
There are two main differences. First, the OWASP top 10 describes technical risks, that are not primarily affecting privacy. Second, the OWASP top 10 does neither regard intended parts of the software like cookies or trackers nor organisational issues like privacy agreements or profiling.
Why should companys and other organisations be concerned about privacy risks?
Privacy risks may have serious consequences for an organisation, such as:
  • perceived harm to privacy;
  • a failure to meet public expectations on the protection of personal information;
  • retrospective imposition of regulatory conditions;
  • low adoption rates or poor participation in the scheme from both the public and partner organisations;
  • the costs of redesigning the system or retro-fitting solutions;
  • collapse of a project or completed system;
  • withdrawal of support from key supporting organisations due to perceived privacy harms; and/ or
  • failure to comply with the law, leading to enforcement action from the regulator or compensation claims from individuals.

(Source: http://ico.org.uk/pia_handbook_html_v2/html/1-Chap2-2.html)

Volunteers

The Top 10 Privacy Risk list is developed by a team of volunteers. The primary contributors to date have been:

  • Stefan Burgmair
  • R. Jason Cronk
  • Edward Delaporte
  • Prof. Hans-Joachim Hof
  • Florian Stahl

Partners

Sponsors


PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP Top 10 Privacy Risks Project (home page)
Purpose: The OWASP Top 10 Privacy Risks Project provides a top 10 list for privacy risks in web applications and related countermeasures. It covers technological and organizational aspects that focus on real-life risks, not just legal issues. The Project provides tips on how to implement privacy by design in web applications with the aim of helping developers and web application providers to better understand and improve privacy. The list uses the OECD Privacy Guidelines as a framework and can also be used to assess privacy risks associated with specific web applications.
License: Creative Commons Attribution Share Alike 3.0
who is working on this project?
Project Leader(s):
  • Florian Stahl @
  • Stefan Burgmair @
how can you learn more?
Project Pamphlet: View
Project Presentation: View
Mailing list: Mailing List Archives
Project Roadmap: View
Key Contacts
  • Contact Florian Stahl @ to contribute to this project
  • Contact Florian Stahl @ to review or sponsor this project
current release
Top 10 Privacy Risks v1 - September 2014 (risk list / final, v1.0) & June 2015 (countermeasures / alpha) - (no download available)
Release description: N/A
Rating: Projects/OWASP Top 10 Privacy Risks Project/GPC/Assessment/Top 10 Privacy Risks v1
last reviewed release
Not Yet Reviewed


other releases