Improving privacy preservation policy in the modern information age

被引:0
|
作者
John S. Davis
Osonde Osoba
机构
[1] RAND Corporation,
来源
Health and Technology | 2019年 / 9卷
关键词
Privacy; Digital privacy; Data privacy; Data utility; Anonymization; De-identification; Data management; HIPAA; GDPR;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymization or de-identification techniques are methods for protecting the privacy of human subjects in sensitive data sets while preserving the utility of those data sets. In the case of health data, anonymization techniques may be used to remove or mask patient identities while allowing the health data content to be used by the medical and pharmaceutical research community. The efficacy of anonymization methods has come under repeated attacks and several researchers have shown that anonymized data can be re-identified to reveal the identity of the data subjects via approaches such as “linking.” Nevertheless, even given these deficiencies, many government privacy policies depend on anonymization techniques as the primary approach to preserving privacy. In this report, we survey the anonymization landscape and consider the range of anonymization approaches that can be used to de-identify data containing personally identifiable information. We then review several notable government privacy policies that leverage anonymization. In particular, we review the European Union’s General Data Protection Regulation (GDPR) and show that it takes a more goal-oriented approach to data privacy. It defines data privacy in terms of desired outcome (i.e., as a defense against risk of personal data disclosure), and is agnostic to the actual method of privacy preservation. And GDPR goes further to frame its privacy preservation regulations relative to the state of the art, the cost of implementation, the incurred risks, and the context of data processing. This has potential implications for the GDPR’s robustness to future technological innovations – very much in contrast to privacy regulations that depend explicitly on more definite technical specifications.
引用
收藏
页码:65 / 75
页数:10
相关论文
共 50 条
  • [31] Privacy and human behavior in the age of information
    Acquisti, Alessandro
    Brandimarte, Laura
    Loewenstein, George
    [J]. SCIENCE, 2015, 347 (6221) : 509 - 514
  • [32] Improving the privacy and security of electronic health information
    Clayton, PD
    [J]. ACADEMIC MEDICINE, 1997, 72 (06) : 522 - 523
  • [33] Privacy: History, Statistics, Policy, Laws, Preservation and Threat Analysis
    Nair, Meghna Manoj
    Tyagi, Amit Kumar
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (01): : 24 - 34
  • [34] PRIVACY, SECRECY, AND NATIONAL INFORMATION POLICY - INTRODUCTION
    BURGER, RH
    [J]. LIBRARY TRENDS, 1986, 35 (01) : 3 - 6
  • [35] Stochastic Geometry-Based Age of Information Performance Analysis for Privacy Preservation-Oriented Mobile Crowdsensing
    Yang, Yaoqi
    Zhang, Bangning
    Guo, Daoxing
    Wang, Weizheng
    Nie, Jiangtian
    Xiong, Zehui
    Xu, Renhui
    Zhou, Xiaokang
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (07) : 9527 - 9541
  • [36] Privacy in information technology: Designing to enable privacy policy management in organizations
    Karat, J
    Karat, CM
    Brodie, C
    Feng, JJ
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) : 153 - 174
  • [37] The relationship between culture and information privacy policy
    Cockcroft, Sophie
    Rekker, Saphira
    [J]. ELECTRONIC MARKETS, 2016, 26 (01) : 55 - 72
  • [38] The relationship between culture and information privacy policy
    Sophie Cockcroft
    Saphira Rekker
    [J]. Electronic Markets, 2016, 26 : 55 - 72
  • [39] ε-PPI: Locator Service in Information Networks with Personalized Privacy Preservation
    Tang, Yuzhe
    Liu, Ling
    Iyengar, Arun
    Lee, Kisung
    Zhang, Qi
    [J]. 2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2014), 2014, : 186 - 197
  • [40] Privacy preservation algorithm for service-oriented information search
    Zhu Q.
    Zhao T.
    Wang S.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (08): : 1315 - 1323