SlideShare a Scribd company logo
1 of 21
Download to read offline
DATA PRIVACY:
ANONYMIZATION & RE-IDENTIFICATION
Mike Nowakowski
@mike_nowakowski
MARCH 2016
This presentation content is for educational and information purposes only.
BACKGROUND
➔ Assessment
➔ Treatment
➔ Financing
RISK MANAGEMENT
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
De-identification is a process which removes the
association (personal information) between a
subject (person) and another entity (data set).
WHAT IS DE-IDENTIFICATION?
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
WHAT IS DE-IDENTIFICATION?
RISK TREATMENT
CONTROLS
DE-IDENTIFICATION... ...
... ...
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
EXAMPLE
Name Birth Date Postal Code Ice Cream
Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip
Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla
... ... ... ...
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
EXAMPLE
Name Birth Date Postal Code Ice Cream
Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip
Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla
... ... ... ...
Direct Identifier
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
EXAMPLE
Name Birth Date Postal Code Ice Cream
Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip
Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla
... ... ... ...
Indirect (Quasi) Identifiers
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
EXAMPLE
ID Name Birth Date Postal Code Ice Cream
47562 Bob Smith Jan 1, 1976 K1A 0B1 Chocolate Chip
17236 Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla
... ... ... ...
ID Ice Cream
47562 Chocolate Chip
17236 Vanilla
... ...
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
How about images? video?
CHALLENGES
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
➔ Goals
◆ Reduce Risk
◆ Maximize Data Use
WHY IS IT IMPORTANT?
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
TECHNIQUES
➔ Suppression
➔ Variation / Noise
➔ Swapping
➔ Masking
This presentation content is for educational and information purposes only.
RE-IDENTIFICATION
Re-identification is a process to reassociate a
subject to the original entity in order to determine
the identity of the subject.
WHAT IS RE-IDENTIFICATION?
This presentation content is for educational and information purposes only.
RE-IDENTIFICATION
EXAMPLE
Name Birth Date Postal Code Ice Cream
Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip
Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla
... ... ... ...
This presentation content is for educational and information purposes only.
RE-IDENTIFICATION
LINKAGE
Birth Date
Postal Code
...
Ice Cream
Name
Telephone
...
Secondary
Source
This presentation content is for educational and information purposes only.
RE-IDENTIFICATION
➔ Pattern
◆ Account Numbers
◆ Licence Plates
◆ ...
BRUTE FORCE
This presentation content is for educational and information purposes only.
RE-IDENTIFICATION
➔ 1997 - Governor's medical records
➔ 2006 - AOL Search Data
➔ 2014 - New York City Taxi
HISTORICAL EVENTS
This presentation content is for educational and information purposes only.
ANONYMIZATION
Anonymization is a process which is irreversible and
inhibits the reassociation of the subject to the
original entity.
WHAT IS ANONYMIZATION?
This presentation content is for educational and information purposes only.
ANONYMIZATION
EXAMPLE
ID Name Birth Date Postal Code
47562 Bob Smith Jan 1, 1957 K1A 0B1
17236 Alice Wilson Mar 3, 1963 B1K 1A0
ID Ice Cream
47562 Chocolate Chip
17236 Vanilla
This presentation content is for educational and information purposes only.
RISK MANAGEMENT
➔ Audits
➔ Agreements
◆ Data Use Agreement (DUA)
➔ Policies & Procedures
➔ Education & Training
➔ Limits on Use / Collection
➔ Security
MORE CONTROLS
This presentation content is for educational and information purposes only.
THANK YOU!
QUESTIONS?
This presentation content is for educational and information purposes only.
REFERENCES
Garfinkel L. S. (2015). NIST 8053 De-Identification of Personal
Information. U.S. Department of Commerce. Gaithersburg, MD
Retreived from http://dx.doi.org/10.6028/NIST.IR.8053
Nelson S. G. (2015). Practical Implications of Sharing Data: A Primer on
Data Privacy, Anonymization, and De-Identification. ThotWave
Technologies. Chapel Hill, NC. Retreived from http://suppor
t.sas.com /resources/papers/proceedings15/1884-2015.pdf
Cavoukian A., Emam E. K. (2011). Dispelling the Myths Surrounding
De-identification Anonymization Remains a Strong Tool for
Protecting Privacy. Toronto, Canada. Retreived from https:
//www
.ipc.on.ca/images/Resources/anonymization.pdf

More Related Content

What's hot

Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataOpenAIRE
 
Palantir Foundry Introduction
Palantir Foundry IntroductionPalantir Foundry Introduction
Palantir Foundry IntroductionRanjeet202050
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explainedrtp2009
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREADchuckbt
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymizationarx-deidentifier
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationPatric Dahse
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 

What's hot (20)

Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Data security
Data securityData security
Data security
 
Data security
Data securityData security
Data security
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
SC-900 Intro
SC-900 IntroSC-900 Intro
SC-900 Intro
 
Information Security
Information SecurityInformation Security
Information Security
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
Palantir Foundry Introduction
Palantir Foundry IntroductionPalantir Foundry Introduction
Palantir Foundry Introduction
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Data Cleaning Techniques
Data Cleaning TechniquesData Cleaning Techniques
Data Cleaning Techniques
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREAD
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymization
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data Anonymization
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Information security
Information securityInformation security
Information security
 
Information security
Information securityInformation security
Information security
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Data Privacy: Anonymization & Re-Identification

  • 1. DATA PRIVACY: ANONYMIZATION & RE-IDENTIFICATION Mike Nowakowski @mike_nowakowski MARCH 2016
  • 2. This presentation content is for educational and information purposes only. BACKGROUND ➔ Assessment ➔ Treatment ➔ Financing RISK MANAGEMENT
  • 3. This presentation content is for educational and information purposes only. DE-IDENTIFICATION De-identification is a process which removes the association (personal information) between a subject (person) and another entity (data set). WHAT IS DE-IDENTIFICATION?
  • 4. This presentation content is for educational and information purposes only. DE-IDENTIFICATION WHAT IS DE-IDENTIFICATION? RISK TREATMENT CONTROLS DE-IDENTIFICATION... ... ... ...
  • 5. This presentation content is for educational and information purposes only. DE-IDENTIFICATION EXAMPLE Name Birth Date Postal Code Ice Cream Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla ... ... ... ...
  • 6. This presentation content is for educational and information purposes only. DE-IDENTIFICATION EXAMPLE Name Birth Date Postal Code Ice Cream Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla ... ... ... ... Direct Identifier
  • 7. This presentation content is for educational and information purposes only. DE-IDENTIFICATION EXAMPLE Name Birth Date Postal Code Ice Cream Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla ... ... ... ... Indirect (Quasi) Identifiers
  • 8. This presentation content is for educational and information purposes only. DE-IDENTIFICATION EXAMPLE ID Name Birth Date Postal Code Ice Cream 47562 Bob Smith Jan 1, 1976 K1A 0B1 Chocolate Chip 17236 Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla ... ... ... ... ID Ice Cream 47562 Chocolate Chip 17236 Vanilla ... ...
  • 9. This presentation content is for educational and information purposes only. DE-IDENTIFICATION How about images? video? CHALLENGES
  • 10. This presentation content is for educational and information purposes only. DE-IDENTIFICATION ➔ Goals ◆ Reduce Risk ◆ Maximize Data Use WHY IS IT IMPORTANT?
  • 11. This presentation content is for educational and information purposes only. DE-IDENTIFICATION TECHNIQUES ➔ Suppression ➔ Variation / Noise ➔ Swapping ➔ Masking
  • 12. This presentation content is for educational and information purposes only. RE-IDENTIFICATION Re-identification is a process to reassociate a subject to the original entity in order to determine the identity of the subject. WHAT IS RE-IDENTIFICATION?
  • 13. This presentation content is for educational and information purposes only. RE-IDENTIFICATION EXAMPLE Name Birth Date Postal Code Ice Cream Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla ... ... ... ...
  • 14. This presentation content is for educational and information purposes only. RE-IDENTIFICATION LINKAGE Birth Date Postal Code ... Ice Cream Name Telephone ... Secondary Source
  • 15. This presentation content is for educational and information purposes only. RE-IDENTIFICATION ➔ Pattern ◆ Account Numbers ◆ Licence Plates ◆ ... BRUTE FORCE
  • 16. This presentation content is for educational and information purposes only. RE-IDENTIFICATION ➔ 1997 - Governor's medical records ➔ 2006 - AOL Search Data ➔ 2014 - New York City Taxi HISTORICAL EVENTS
  • 17. This presentation content is for educational and information purposes only. ANONYMIZATION Anonymization is a process which is irreversible and inhibits the reassociation of the subject to the original entity. WHAT IS ANONYMIZATION?
  • 18. This presentation content is for educational and information purposes only. ANONYMIZATION EXAMPLE ID Name Birth Date Postal Code 47562 Bob Smith Jan 1, 1957 K1A 0B1 17236 Alice Wilson Mar 3, 1963 B1K 1A0 ID Ice Cream 47562 Chocolate Chip 17236 Vanilla
  • 19. This presentation content is for educational and information purposes only. RISK MANAGEMENT ➔ Audits ➔ Agreements ◆ Data Use Agreement (DUA) ➔ Policies & Procedures ➔ Education & Training ➔ Limits on Use / Collection ➔ Security MORE CONTROLS
  • 20. This presentation content is for educational and information purposes only. THANK YOU! QUESTIONS?
  • 21. This presentation content is for educational and information purposes only. REFERENCES Garfinkel L. S. (2015). NIST 8053 De-Identification of Personal Information. U.S. Department of Commerce. Gaithersburg, MD Retreived from http://dx.doi.org/10.6028/NIST.IR.8053 Nelson S. G. (2015). Practical Implications of Sharing Data: A Primer on Data Privacy, Anonymization, and De-Identification. ThotWave Technologies. Chapel Hill, NC. Retreived from http://suppor t.sas.com /resources/papers/proceedings15/1884-2015.pdf Cavoukian A., Emam E. K. (2011). Dispelling the Myths Surrounding De-identification Anonymization Remains a Strong Tool for Protecting Privacy. Toronto, Canada. Retreived from https: //www .ipc.on.ca/images/Resources/anonymization.pdf