De-Identifying data

Introduction to Data Privacy

Tiffany Lewis

Security and Privacy Instructor

Protecting sensitive information

  • Protecting sensitive information
    • Internal employees
    • External actors
  • Compliance implications
  • Several layers of security

Protcting information

Introduction to Data Privacy

De-identification techniques

  • Anonymization and pseudonymization
  • Methods and tools used to make data unreadable
  • Different use cases for each

Undercover spy hidden from view

Introduction to Data Privacy

Pseudonymization

  • False name
  • Data is made unrecognizable, but can be returned to its original state
  • Batman and Bruce Wayne

Batman

Introduction to Data Privacy

Pseudonymization example

Pseudonymization

Introduction to Data Privacy

Anonymization

  • Irreversible state change
  • Removal of personal identifiers
  • A human transforming into a zombie

Zombie

Introduction to Data Privacy

Anonymization example

Anonymization

Introduction to Data Privacy

Let's practice!

Introduction to Data Privacy

Preparing Video For Download...