Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Data Privacy.

Slides:



Advertisements
Similar presentations
1 Constraints, Triggers and Active Databases Chapter 9.
Advertisements

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Privacy Authorization Languages.
21-1 Last time Database Security  Data Inference  Statistical Inference  Controls against Inference Multilevel Security Databases  Separation  Integrity.
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
1 Privacy in Microdata Release Prof. Ravi Sandhu Executive Director and Endowed Chair March 22, © Ravi Sandhu.
File Management Chapter 12. File Management A file is a named entity used to save results from a program or provide data to a program. Access control.
UTEPComputer Science Dept.1 University of Texas at El Paso Privacy in Statistical Databases Dr. Luc Longpré Computer Science Department Spring 2006.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Fair Information.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Maintenance Modifying the data –Add records –Delete records –Update records Modifying the design –Add fields into tables –Remove fields from a table –Change.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Engineering Privacy November 6, 2008.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Privacy Week 6 - February 20,
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Design for Privacy February 20,
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Web Privacy.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Data Privacy October 30, 2008.
The Relational Database Model:
C MU U sable P rivacy and S ecurity Laboratory Philosophical definitions of privacy Lorrie Faith Cranor October 19, 2007.
Attacks against K-anonymity
Malicious parties may employ (a) structure-based or (b) label-based attacks to re-identify users and thus learn sensitive information about their rating.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Search Engines.
Institute of Information Systems, Humboldt University, 2006· Privacy Engineering Sarah Spiekermann & Lorrie Faith Cranor DIMACS Workshop, Rutgers University.
Supportive Services for Veteran Families (SSVF) Data
BUSINESS DRIVEN TECHNOLOGY
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Design for Privacy February.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Privacy Policy.
MS Access 2007 IT User Services - University of Delaware.
CyLab Usable Privacy and Security Laboratory 1 CyLab Usable Privacy and Security Laboratory Design for.
LESSON 17 PREPARED BY MANJU. database A database is a collection of related information Access is the Microsoft Office database program that enables you.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Enforcing Policies on Social Media Data Extracted from the Web Nicoletta Fornara and Truc-Vien T. Nguyen Università della Svizzera italiana Lugano, Switzerland.
XP Chapter 1 Succeeding in Business with Microsoft Office Access 2003: A Problem-Solving Approach 1 Level 3 Objectives: Identifying and Eliminating Database.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Privacy and technology Week.
6-1 DATABASE FUNDAMENTALS Information is everywhere in an organization Information is stored in databases –Database – maintains information about various.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Li Xiong CS573 Data Privacy and Security Healthcare privacy and security: Genomic data privacy.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
RFID Technology: When innovation brings along data protection challenges Eleni Kosta ICRI – K.U.Leuven.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Identity and biometrics.
Lesson 17 Getting Started with Access Essentials
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.
Storing Organizational Information - Databases
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Data Privacy Week 9 - October.
DAY 15: ACCESS CHAPTER 1 Rahul Kavi October 6,
1 Patron Data Management and Library Systems: A Vendor Perspective ALA Conference Summer, 2004.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Law Enforcement.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
Wil Haywood Rossana Bua Rhishi Katoch Kelvyn Araujo-Valdez Steve Kim.
File Systems. 2 What is a file? A repository for data Is long lasting (until explicitly deleted).
Fundamentals, Design, and Implementation, 9/e Appendix B The Semantic Object Model.
CSCI 6962: Server-side Design and Programming Shopping Carts and Databases.
Unraveling an old cloak: k-anonymity for location privacy
Biomedical Informatics Research Network DATA SHARING HIPAA Compliance & IRB Approvals Martha Payne, Jeffrey Grethe October 10, nd Annual All Hands.
TRANSACTIONAL DATA. TRANSACTION DATA THE COLLECTED INFORMATION ABOUT THE SELL AND PURCHASE TRANSACTION IS THE ACTIVITIES THAT OCCUR EVERY TIME YOU BUY.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Ide kerülhet az előadás címe Julia Sziklay: Facial recognition – a relevant example of biometric data collection Sarajevo,
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
CIS 155 Table Relationship
Database Relationships
$1.26 million value of claims 14 claims 8 accidents 5 new policies
By (Group 17) Mahesha Yelluru Rao Surabhee Sinha Deep Vakharia
PHP and MySQL.
Overview August 28, 2007.
Keeping Member Data Safe
PERSON objects in the RIPE Database
Presented by : SaiVenkatanikhil Nimmagadda
Presented by: Steve Gerdes 26 January 2019
Presentation transcript:

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Data Privacy October 30, 2007

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 2 k-anonymity “A release provides k-anonymity protection if the information for each person contained in the release cannot be distinguished from at least k-1 individuals whose information also appears in the release.”

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 3 De-identification and re-identification Simplistic de-identification: remove obvious identifiers Better de-identification: also k-anonymize and/or use statistical confidentiality techniques Re-identification can occur through linking entries within the same database or to entries in external databases

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 4 Examples When RFID tags are sewn into every garment, how might we use this to identify and track people? What if the tags are partially killed so only the product information is broadcast, not a unique ID? How can a cellular provider identify an anonymous pre-paid cell phone user? Other examples?

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 5 Techniques for protecting privacy Best No collection of contact information No collection of long term person characteristics k-anonymity with large value of k Good No unique identifiers across databases No common attributes across databases Random identifiers Contact information stored separately from profile or transaction information Collection of long term personal characteristics on a low level of granularity Technically enforced deletion of profile details at regular intervals