De-Identifying data
Introdução à Privacidade de Dados
Tiffany Lewis
Security and Privacy Instructor
Protecting sensitive information
Protecting sensitive information
Internal employees
External actors
Compliance implications
Several layers of security
De-identification techniques
Anonyization and pseudonymization
Methods and tools used to make data unreadable
Different use cases for each
Pseudonymization
False name
Data is made unrecognizable, but can be returned to its original state
Batman and Bruce Wayne
Pseudonymization example
Anonymization
Irreversible state change
Removal of personal identifiers
A human transforming into a zombie
Anonymization example
Let's practice!
Introdução à Privacidade de Dados
Preparing Video For Download...