Abstract
With the rising awareness of reconstruction attacks and the limitations of ad hoc disclosure limitation techniques, there is growing interest in deploying differentially private solutions to release summaries over personal data in several domains. This talk will outline a checklist for a successful deployment of differential privacy based on my recent experiences deploying differential privacy, with takeaways for practitioners and open challenges for privacy researchers.