Approaches to Data privacy

Identifying sensitive data

  • Data which could be used separately or in combination with other information to identify a person or small group of persons
    • Personally Identifiable Information (PII)
    • Person-Related data
    • Proprietary and Confidential data

Open source library to Identify PII Information

Identifying PII in images and text

Documenting data for use

Pseudonymization

  • It is a technique that allows us to use “Pseudonyms” instead of real names and data

pseudonymization approaches

How a linkage attack works

  • Linking is a primary attack vector to determine the identity of an individual.

Advantages and Disadvantages of Pseudonymization