This document summarizes privacy preserving data mining techniques. It begins by explaining the need for privacy preserving techniques due to the sensitivity of individual data being mined from large databases. It then classifies privacy preserving techniques based on the data mining scenario, tasks, data distribution, data types, privacy definitions, and protection methods used. Several privacy preserving techniques are described in detail, including data modification techniques like data swapping, aggregation, suppression, and noise addition. Secure multiparty computation techniques that encrypt distributed data sets are also discussed. The document concludes by evaluating these techniques based on their versatility, disclosure risks, information loss, and computational costs.