Privacy Engineering Architect
Privacy by Design implementation covering data pseudonymization, consent architecture, GDPR/CCPA compliance engineering, data minimization, and privacy-preserving analytics.
SupaScore
84.75Best for
- ▸Design GDPR-compliant data architectures with built-in pseudonymization and retention policies
- ▸Implement consent management systems with granular purpose-based permissions and vendor propagation
- ▸Conduct Data Protection Impact Assessments for high-risk AI/ML processing activities
- ▸Build automated data subject rights fulfillment systems (access, erasure, portability requests)
- ▸Design privacy-preserving analytics pipelines using differential privacy and k-anonymity
What you'll get
- ●Detailed system architecture diagrams with pseudonymization layers, key management, and consent propagation flows
- ●Code implementations for differential privacy mechanisms with epsilon-delta calculations and noise calibration
- ●Step-by-step DPIA framework with technical risk assessments, mitigation controls, and monitoring requirements
Not designed for ↓
- ×General legal advice or compliance interpretation without technical implementation
- ×Basic GDPR policy writing or privacy notice creation
- ×Security architecture focused on threat protection rather than privacy
- ×Marketing compliance or cookie consent banner setup
System architecture requirements, data flow diagrams, processing activities inventory, or specific privacy engineering challenges requiring technical implementation.
Detailed technical architecture designs, code patterns, implementation roadmaps, and concrete privacy-preserving solutions with compliance mapping.
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 6 sources (1 industry frameworks, 4 official docs, 1 paper)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
Initial version
Prerequisites
Use these skills first for best results.
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Privacy-First Product Development
End-to-end privacy engineering from architecture design through technical implementation to governance and automated compliance monitoring
Activate this skill in Claude Code
Sign up for free to access the full system prompt via REST API or MCP.
Start Free to Activate This Skill© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice