Table of Contents
- 1. General data privacy questions
- 2. HIPAA, Expert Determination, and Safe Harbor
- 3. Artificial intelligence and natural language processing
- 4. Cryptography
- 5. State privacy laws
- 6. European GDPR
- 7. Data breaches and incidents
- 8. Data privacy techniques
- 8.1. What is randomized response?
- 8.2. What is synthetic data?
- 8.3. What is k-anonymity?
- 8.4. What is ?-diversity?
- 8.5. What is t-closeness?
- 8.6. What is earth-mover distance?
- 8.7. What is differential privacy?
- 8.8. What are the advantages of differential privacy?
- 8.9. How can competitors share data without giving up their data?
- 8.10. Does differential privacy scale up?
- 8.11. Does differential privacy scale down?
- 8.12. What is a privacy budget?
- 9. Privacy risks
- 9.1. What are toxic pairs?
- 9.2. Can you really identify most people from their zipcode, date of birth, and sex?
- 9.3. Does an expired credit card tell you anything about the former cardholder?
- 9.4. Is your personal data safe with a company that promises not to sell it?
- 9.5. Is there any privacy risk in revealing the last four digits of your SSN?
- 9.6. How can missing data be an identification risk?
- 9.7. What can go wrong if an ID number is computed from personal data?
- 9.8. Can you identify someone from medical images?
- 9.9. What can go wrong with posting photos?
- 9.10. How can trying to protect your privacy backfire?
- 10. Online privacy