Improving privacy preservation policy in the modern information age

被引:0
|
作者
John S. Davis
Osonde Osoba
机构
[1] RAND Corporation,
来源
Health and Technology | 2019年 / 9卷
关键词
Privacy; Digital privacy; Data privacy; Data utility; Anonymization; De-identification; Data management; HIPAA; GDPR;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymization or de-identification techniques are methods for protecting the privacy of human subjects in sensitive data sets while preserving the utility of those data sets. In the case of health data, anonymization techniques may be used to remove or mask patient identities while allowing the health data content to be used by the medical and pharmaceutical research community. The efficacy of anonymization methods has come under repeated attacks and several researchers have shown that anonymized data can be re-identified to reveal the identity of the data subjects via approaches such as “linking.” Nevertheless, even given these deficiencies, many government privacy policies depend on anonymization techniques as the primary approach to preserving privacy. In this report, we survey the anonymization landscape and consider the range of anonymization approaches that can be used to de-identify data containing personally identifiable information. We then review several notable government privacy policies that leverage anonymization. In particular, we review the European Union’s General Data Protection Regulation (GDPR) and show that it takes a more goal-oriented approach to data privacy. It defines data privacy in terms of desired outcome (i.e., as a defense against risk of personal data disclosure), and is agnostic to the actual method of privacy preservation. And GDPR goes further to frame its privacy preservation regulations relative to the state of the art, the cost of implementation, the incurred risks, and the context of data processing. This has potential implications for the GDPR’s robustness to future technological innovations – very much in contrast to privacy regulations that depend explicitly on more definite technical specifications.
引用
收藏
页码:65 / 75
页数:10
相关论文
共 50 条
  • [41] Achieving Privacy Preservation and Billing via Delayed Information Release
    Hu, Chunqiang
    Cheng, Xiuzhen
    Tian, Zhi
    Yu, Jiguo
    Lv, Weifeng
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (03) : 1376 - 1390
  • [42] User privacy preservation approach based on minimum information loss
    Yang, Haifang
    Wang, Mingzheng
    [J]. Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2021, 41 (02): : 483 - 497
  • [43] Privacy Preservation of Electronic Health Records in the Modern Era: A Systematic Survey
    Nowrozy, Raza
    Ahmed, Khandakar
    Kayes, A. S. M.
    Wang, Hua
    McIntosh, Timothy R.
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (08)
  • [44] Freedom of Information and Privacy in Australia: Government and Information Access in the Modern State
    McClean, Tom
    [J]. UNIVERSITY OF NEW SOUTH WALES LAW JOURNAL, 2006, 29 (02): : 272 - 275
  • [45] Improving k-anonymity based privacy preservation for collaborative filtering
    Wei, Ruoxuan
    Tian, Hui
    Shen, Hong
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 67 : 509 - 519
  • [46] Personal privacy: An endangered species in the information age?
    Hedberg, S
    [J]. IEEE PARALLEL & DISTRIBUTED TECHNOLOGY, 1996, 4 (04): : 4 - 7
  • [47] Millennials and Privacy in the Information Age: Can They Coexist?
    Yadin, Aharon
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2012, 31 (04) : 32 - 38
  • [48] Engaging Privacy and Information Technology in a Digital Age
    Fry, Jenny
    [J]. ONLINE INFORMATION REVIEW, 2008, 32 (04) : 541 - 542
  • [49] Privacy in the Information Age: Stakeholders, Interests and Values
    Lucas Introna
    Athanasia Pouloudi
    [J]. Journal of Business Ethics, 1999, 22 : 27 - 38
  • [50] The digital person: Technology and privacy in the information age
    Gellman, R
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2005, 22 (03) : 530 - 532