Mitigating Risk While Complying With Data Retention Laws
Association for Computing Machinery (ACM) via YouTube
Overview
Explore a 20-minute conference talk that delves into the challenges of protecting data subject to mandatory retention laws while mitigating the risks of data breaches. Unpack the complexities of the title, examine "obvious" solutions and their shortcomings, and analyze adversarial cases. Discover the innovative Dragchute Escrow approach, including its high-level concept, encryption methods, and the process of creating time windows for data access. Learn about unlocking data, enabling proofs of compliance, and the intricacies of locking and attesting. Compare lock performance to gain insights into the effectiveness of this approach in balancing data protection and legal compliance.
Syllabus
Intro
Unpacking the Title
"Obvious" Solutions
Adversarial Cases
Dragchute Escrow - High Level
How the Encryption Happens
Lock - Creating the Time Window
Unlocking Data
Enabling Proofs of Compliance
Locking and Attesting
Lock Performance Comparison
Taught by
Association for Computing Machinery (ACM)