Whitney Merrill Profile picture
Dec 6 16 tweets 3 min read Twitter logo Read on Twitter
As an engineer and lawyer, I’m often asked by young aspiring individuals how they can be successful in privacy, and whether they should also become technical and learn to code.

Here are my thoughts on skills I think make the best privacy experts:

/1
1. Be infinitely curious. Ask a lot of questions. You’ll never know everything.

/2
2. Embed privacy in to your culture & judgment. Global privacy is changing so quickly and because it’s so grey—a lot of the field requires using your best judgement about what is best practice. For some this is a natural ability, others it’s a learned skill.

/3
3. Try to read the tea leaves. Look at the trends, and try to advise so that by the time the project or objective is finished, and the law/standards have changed, you don’t have to catch up again.

/4
4. Strive to do the right thing. It goes a long way. See #2 on how to know what the right thing is in many cases.

/5
5. Coding doesn’t necessarily help. Computer, network & systems architecture, UI/UX design, and a general understanding of security and developer vocabulary goes a long way. You’ll know when you’re asking engineers to solve a hard problem and how to ask the right questions.

/6
6. Want to know how things work. I cannot emphasize this one enough. If you understand how the technology works and you understand the data flows, you will give infinitely better advice. You’ll issue spot much better.

/7
7. Be aware of your weaknesses. Privacy is one of the most cross disciplinary/cross functional fields. You won’t be great at all of it. Know where you excel and where you struggle. Help find and hire people who have strengths where you have weaknesses.

/8
8. As you become more senior, don’t get too far from the work. Be able to speak to the details for the important things. You’ll want to be able to translate difficult concepts for executive teams and board members. Which leads me to #9.

/9
9. Be the translator. As you get good at all the things above, especially #3, 5 & 6, you’ll need to explain the concepts & the why behind what you’re doing to folks who either don’t care, don’t get why it’s important, or just aren’t as close to the work. Help them understand.
/10
10. Be empathetic and patient. You’re often asking someone to change the way they’re doing something. This may slow them down or create confusion. Along these lines- give A LOT of heads up about major changes needed (if you can). For major asks I try to give 6mts/1 year heads up.
11. Understand and drive data governance. Data governance is a key component of privacy. Privacy drives good data governance.
Care about it, understand it, do it. You can’t do privacy without it.

/12
12. Empower non privacy experts to be privacy champions. They’re your superpower. Build these relationships (don’t force it) and…They’ll see things you don’t, they’ll loop you into conversations you’re not in, and they’ll speak up when you’re not there.

/13
13. Be the calm during the storm. Incident response is part of the job. Sorry? Or congrats! Everyone will be panicking around you. People want to find someone or something to blame. Step back, be thoughtful, be blameless & don’t panic. See #7 if this is a struggle for you.

/14
14. Ask for help. You can’t do it alone. Building a culture of privacy, building a privacy program, or getting something privacy complaint isn’t something you can do alone. It doesn’t only sit on your shoulders.

/15
15. Incorporate diversity and advocate. You need to speak to & learn from diverse voices to understand the norms and harms against different minority, cultural, and regional groups. Technology affects these groups differently. Raise their voices. Incorporate what you learn.

/16

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Whitney Merrill

Whitney Merrill Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @wbm312

May 23
100% agree. Everyone. It will either change the way the internet works forever or widely be ignored as a result. It upends how 99% of global companies operate.

Remember access to data = a transfer of data. Global support and engineering teams will be siloed to regions.
Everyone is in the same boat & there’s nothing you can do to comply w/o drastically change the way your company operates.
1. Cease to operate in the EU
2. Localize completely in the EU (including supporting staff that needs to access that data)
3. E2E encryption (very difficult)
In some ways E2E feels like the best bet, but good luck making search work, implementing it correctly (every time it’s not = prob a breach), some services just can’t offer certain features, we will hit some limits of what cryptography can actually do.
Read 17 tweets
Nov 23, 2022
I want to recount what I believe to be the best theory on the Max Headroom Broadcast Signal Intrusion that happened 35 years ago. It was shared with me recently, & I believe it to be the most probable account of what happened.

I have no idea if this story is already out there.
I wanted to make this thread on 11/22, but was on the fence as to whether or not to put it on Twitter. Thanks to the person who sought me out to tell me. I'm not sure if they're on Twitter (so DM me if you see this & I'll credit you).
I've added some research of my own. And some details are filled in. But here's the story that I believe to be true. There are some unknowns, that are ultimately not important, but if folks know how older TV equipment in 1987 worked - I'm all ears.

Ok here we go:
Read 25 tweets
Feb 26, 2022
A full account of the way the internet has responded to the last week and the way world leaders have leveraged the internet over the last week will be a fantastic book to read. Remarkable and history making.
Here are some of the things that stand out: 🧵
Use of Wikipedia to cover the events as they unfold
Read 34 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(