SlideShare a Scribd company logo
1 of 21
Download to read offline
DATA PRIVACY:
ANONYMIZATION & RE-IDENTIFICATION
Mike Nowakowski
@mike_nowakowski
MARCH 2016
This presentation content is for educational and information purposes only.
BACKGROUND
➔ Assessment
➔ Treatment
➔ Financing
RISK MANAGEMENT
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
De-identification is a process which removes the
association (personal information) between a
subject (person) and another entity (data set).
WHAT IS DE-IDENTIFICATION?
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
WHAT IS DE-IDENTIFICATION?
RISK TREATMENT
CONTROLS
DE-IDENTIFICATION... ...
... ...
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
EXAMPLE
Name Birth Date Postal Code Ice Cream
Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip
Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla
... ... ... ...
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
EXAMPLE
Name Birth Date Postal Code Ice Cream
Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip
Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla
... ... ... ...
Direct Identifier
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
EXAMPLE
Name Birth Date Postal Code Ice Cream
Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip
Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla
... ... ... ...
Indirect (Quasi) Identifiers
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
EXAMPLE
ID Name Birth Date Postal Code Ice Cream
47562 Bob Smith Jan 1, 1976 K1A 0B1 Chocolate Chip
17236 Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla
... ... ... ...
ID Ice Cream
47562 Chocolate Chip
17236 Vanilla
... ...
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
How about images? video?
CHALLENGES
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
➔ Goals
◆ Reduce Risk
◆ Maximize Data Use
WHY IS IT IMPORTANT?
This presentation content is for educational and information purposes only.
DE-IDENTIFICATION
TECHNIQUES
➔ Suppression
➔ Variation / Noise
➔ Swapping
➔ Masking
This presentation content is for educational and information purposes only.
RE-IDENTIFICATION
Re-identification is a process to reassociate a
subject to the original entity in order to determine
the identity of the subject.
WHAT IS RE-IDENTIFICATION?
This presentation content is for educational and information purposes only.
RE-IDENTIFICATION
EXAMPLE
Name Birth Date Postal Code Ice Cream
Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip
Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla
... ... ... ...
This presentation content is for educational and information purposes only.
RE-IDENTIFICATION
LINKAGE
Birth Date
Postal Code
...
Ice Cream
Name
Telephone
...
Secondary
Source
This presentation content is for educational and information purposes only.
RE-IDENTIFICATION
➔ Pattern
◆ Account Numbers
◆ Licence Plates
◆ ...
BRUTE FORCE
This presentation content is for educational and information purposes only.
RE-IDENTIFICATION
➔ 1997 - Governor's medical records
➔ 2006 - AOL Search Data
➔ 2014 - New York City Taxi
HISTORICAL EVENTS
This presentation content is for educational and information purposes only.
ANONYMIZATION
Anonymization is a process which is irreversible and
inhibits the reassociation of the subject to the
original entity.
WHAT IS ANONYMIZATION?
This presentation content is for educational and information purposes only.
ANONYMIZATION
EXAMPLE
ID Name Birth Date Postal Code
47562 Bob Smith Jan 1, 1957 K1A 0B1
17236 Alice Wilson Mar 3, 1963 B1K 1A0
ID Ice Cream
47562 Chocolate Chip
17236 Vanilla
This presentation content is for educational and information purposes only.
RISK MANAGEMENT
➔ Audits
➔ Agreements
◆ Data Use Agreement (DUA)
➔ Policies & Procedures
➔ Education & Training
➔ Limits on Use / Collection
➔ Security
MORE CONTROLS
This presentation content is for educational and information purposes only.
THANK YOU!
QUESTIONS?
This presentation content is for educational and information purposes only.
REFERENCES
Garfinkel L. S. (2015). NIST 8053 De-Identification of Personal
Information. U.S. Department of Commerce. Gaithersburg, MD
Retreived from http://dx.doi.org/10.6028/NIST.IR.8053
Nelson S. G. (2015). Practical Implications of Sharing Data: A Primer on
Data Privacy, Anonymization, and De-Identification. ThotWave
Technologies. Chapel Hill, NC. Retreived from http://suppor
t.sas.com /resources/papers/proceedings15/1884-2015.pdf
Cavoukian A., Emam E. K. (2011). Dispelling the Myths Surrounding
De-identification Anonymization Remains a Strong Tool for
Protecting Privacy. Toronto, Canada. Retreived from https:
//www
.ipc.on.ca/images/Resources/anonymization.pdf

More Related Content

What's hot

What's hot (20)

Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
Lecture 4 confidentiality, disclosure and the law.1
Lecture 4  confidentiality, disclosure and the law.1Lecture 4  confidentiality, disclosure and the law.1
Lecture 4 confidentiality, disclosure and the law.1
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Digital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptxDigital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptx
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
What is Differential Privacy?
What is Differential Privacy?What is Differential Privacy?
What is Differential Privacy?
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
GDPR
GDPRGDPR
GDPR
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymization
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
Data protection
Data protectionData protection
Data protection
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Data security
Data securityData security
Data security
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Data Privacy: Anonymization & Re-Identification

  • 1. DATA PRIVACY: ANONYMIZATION & RE-IDENTIFICATION Mike Nowakowski @mike_nowakowski MARCH 2016
  • 2. This presentation content is for educational and information purposes only. BACKGROUND ➔ Assessment ➔ Treatment ➔ Financing RISK MANAGEMENT
  • 3. This presentation content is for educational and information purposes only. DE-IDENTIFICATION De-identification is a process which removes the association (personal information) between a subject (person) and another entity (data set). WHAT IS DE-IDENTIFICATION?
  • 4. This presentation content is for educational and information purposes only. DE-IDENTIFICATION WHAT IS DE-IDENTIFICATION? RISK TREATMENT CONTROLS DE-IDENTIFICATION... ... ... ...
  • 5. This presentation content is for educational and information purposes only. DE-IDENTIFICATION EXAMPLE Name Birth Date Postal Code Ice Cream Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla ... ... ... ...
  • 6. This presentation content is for educational and information purposes only. DE-IDENTIFICATION EXAMPLE Name Birth Date Postal Code Ice Cream Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla ... ... ... ... Direct Identifier
  • 7. This presentation content is for educational and information purposes only. DE-IDENTIFICATION EXAMPLE Name Birth Date Postal Code Ice Cream Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla ... ... ... ... Indirect (Quasi) Identifiers
  • 8. This presentation content is for educational and information purposes only. DE-IDENTIFICATION EXAMPLE ID Name Birth Date Postal Code Ice Cream 47562 Bob Smith Jan 1, 1976 K1A 0B1 Chocolate Chip 17236 Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla ... ... ... ... ID Ice Cream 47562 Chocolate Chip 17236 Vanilla ... ...
  • 9. This presentation content is for educational and information purposes only. DE-IDENTIFICATION How about images? video? CHALLENGES
  • 10. This presentation content is for educational and information purposes only. DE-IDENTIFICATION ➔ Goals ◆ Reduce Risk ◆ Maximize Data Use WHY IS IT IMPORTANT?
  • 11. This presentation content is for educational and information purposes only. DE-IDENTIFICATION TECHNIQUES ➔ Suppression ➔ Variation / Noise ➔ Swapping ➔ Masking
  • 12. This presentation content is for educational and information purposes only. RE-IDENTIFICATION Re-identification is a process to reassociate a subject to the original entity in order to determine the identity of the subject. WHAT IS RE-IDENTIFICATION?
  • 13. This presentation content is for educational and information purposes only. RE-IDENTIFICATION EXAMPLE Name Birth Date Postal Code Ice Cream Bob Smith Jan 1, 1957 K1A 0B1 Chocolate Chip Alice Wilson Mar 3, 1963 B1K 1A0 Vanilla ... ... ... ...
  • 14. This presentation content is for educational and information purposes only. RE-IDENTIFICATION LINKAGE Birth Date Postal Code ... Ice Cream Name Telephone ... Secondary Source
  • 15. This presentation content is for educational and information purposes only. RE-IDENTIFICATION ➔ Pattern ◆ Account Numbers ◆ Licence Plates ◆ ... BRUTE FORCE
  • 16. This presentation content is for educational and information purposes only. RE-IDENTIFICATION ➔ 1997 - Governor's medical records ➔ 2006 - AOL Search Data ➔ 2014 - New York City Taxi HISTORICAL EVENTS
  • 17. This presentation content is for educational and information purposes only. ANONYMIZATION Anonymization is a process which is irreversible and inhibits the reassociation of the subject to the original entity. WHAT IS ANONYMIZATION?
  • 18. This presentation content is for educational and information purposes only. ANONYMIZATION EXAMPLE ID Name Birth Date Postal Code 47562 Bob Smith Jan 1, 1957 K1A 0B1 17236 Alice Wilson Mar 3, 1963 B1K 1A0 ID Ice Cream 47562 Chocolate Chip 17236 Vanilla
  • 19. This presentation content is for educational and information purposes only. RISK MANAGEMENT ➔ Audits ➔ Agreements ◆ Data Use Agreement (DUA) ➔ Policies & Procedures ➔ Education & Training ➔ Limits on Use / Collection ➔ Security MORE CONTROLS
  • 20. This presentation content is for educational and information purposes only. THANK YOU! QUESTIONS?
  • 21. This presentation content is for educational and information purposes only. REFERENCES Garfinkel L. S. (2015). NIST 8053 De-Identification of Personal Information. U.S. Department of Commerce. Gaithersburg, MD Retreived from http://dx.doi.org/10.6028/NIST.IR.8053 Nelson S. G. (2015). Practical Implications of Sharing Data: A Primer on Data Privacy, Anonymization, and De-Identification. ThotWave Technologies. Chapel Hill, NC. Retreived from http://suppor t.sas.com /resources/papers/proceedings15/1884-2015.pdf Cavoukian A., Emam E. K. (2011). Dispelling the Myths Surrounding De-identification Anonymization Remains a Strong Tool for Protecting Privacy. Toronto, Canada. Retreived from https: //www .ipc.on.ca/images/Resources/anonymization.pdf