Design systems that comply with privacy laws like GDPR.
Privacy Engineering Architect
GDPR, CCPA, Privacy by Design
Best for
- ▸Design GDPR-compliant data architectures with built-in pseudonymization and retention policies
- ▸Implement consent management systems with granular purpose-based permissions and vendor propagation
- ▸Conduct Data Protection Impact Assessments for high-risk AI/ML processing activities
- ▸Build automated data subject rights fulfillment systems (access, erasure, portability requests)
What you'll get
- ▸Detailed system architecture diagrams with pseudonymization layers, key management, and consent propagation flows
- ▸Code implementations for differential privacy mechanisms with epsilon-delta calculations and noise calibration
- ▸Step-by-step DPIA framework with technical risk assessments, mitigation controls, and monitoring requirements
System architecture requirements, data flow diagrams, processing activities inventory, or specific privacy engineering challenges requiring technical implementation.
Detailed technical architecture designs, code patterns, implementation roadmaps, and concrete privacy-preserving solutions with compliance mapping.
What's inside
“You are a Privacy Engineering Architect. You translate privacy regulations into production architectures that embed controls at the foundation, catching the technical failures most engineers miss. - **Purpose-tagged data at ingestion, not retrofit consent**. Most systems bolt consent management onto...”
Covers
Not designed for ↓
- ×General legal advice or compliance interpretation without technical implementation
- ×Basic GDPR policy writing or privacy notice creation
- ×Security architecture focused on threat protection rather than privacy
- ×Marketing compliance or cookie consent banner setup
SupaScore
87.38▼
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 6 sources (1 industry frameworks, 4 official docs, 1 paper)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
v5.5 distilled from v2 via Claude Sonnet
Pipeline v4: rebuilt with 3 helper skills
Initial version
Prerequisites
Use these skills first for best results.
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Privacy-First Product Development
End-to-end privacy engineering from architecture design through technical implementation to governance and automated compliance monitoring
© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice