CONCEPT Cited by 1 source
Shift-left privacy¶
Definition¶
Shift-left privacy is the engineering stance of moving privacy enforcement earlier in the data-lifecycle — from after-the-fact audits and periodic reviews into the developer workflow and runtime — so that privacy violations are caught at or near the point of creation rather than discovered downstream.
The name generalizes the widely-used shift-left security / testing stance: tests and security checks that used to run at release or post-production are pulled into CI, and then into the developer's IDE. The analogue here is pulling privacy constraints from external audits and ACL-based gate-keeping into the runtime itself.
Meta's 2024-08-31 statement¶
The 2024-08-31 Meta PAI post frames the shift explicitly:
"PAI is designed to check data flows in real-time during code execution, blocking problematic data flows from occurring, facilitated by UX tooling, thus making it more scalable."
Versus the prior world:
"Traditional point checking controls, combined with data lineage checks, can detect data transfers within a specific time frame but not in real-time. Addressing these risks requires implementing resource-intensive human audits at access points."
The shift is from human audits + ACL gatekeeping to runtime IFC + developer UX tooling (PZM).
Relationship to other shift-left disciplines¶
- Shift-left security — SAST/DAST/SBOM integrated into CI and PR review (e.g. systems/datadog-workload-protection, systems/figma-response-sampling).
- Shift-left testing — unit + integration tests run locally and in PR rather than pre-release.
- Shift-left privacy — privacy constraints enforced at code execution rather than at audit.
All three share the same thesis: cheaper to fix at time-of-write than at time-of-release, and far cheaper than at time-of-incident.
Seen in¶
- sources/2024-08-31-meta-enforces-purpose-limitation-via-privacy-aware-infrastructure — canonical framing on this wiki. Meta's positioning of PAI as a "transformative investment" that embeds privacy into infrastructure rather than bolting it on in audit.
Related¶
- concepts/information-flow-control — the runtime primitive.
- concepts/purpose-limitation — the requirement class pulled left.
- concepts/point-checking-controls — the approach that required audits — what shift-left-privacy replaces.
- systems/meta-policy-zones — the industrial implementation.
- patterns/runtime-information-flow-enforcement — the pattern.
- companies/meta