Balance growth with trust. Learn how to share data with appropriate privacy controls, including how to use k-anonymity and l-diversity to protect your users' information.
Overview
Syllabus
Introduction
- Privacy and data sharing
- What you should know about this course
- How data sharing works
- How data sharing can go wrong
- Valid reasons for data sharing
- When data sharing should raise red flags
- Techniques to minimize privacy risk
- Why can't we share anonymized data?
- Encryption and data sharing
- What is k-anonymity?
- K-anonymity: A use case
- K-anonymity: Very coarse data
- K-anonymity: Very granular data
- K-anonymity: Industry best practice
- How l-diversity helps privacy
- K-anonymity versus l-diversity
- Challenge
- Solution
- Identifying and rectifying risk
- Privacy impact assessments
- Technical privacy consulting
- Challenge
- Solution
- Data governance, why it matters
- Your physical fingerprint
- Your digital fingerprint
- The power of joining outside data
- Next steps
Taught by
Nishant Bhajaria