Using technology to protect privacy

Data mining raises fears about the loss of privacy. But officials at the Center for Democracy and Technology have identified three approaches to designing data-mining projects that can protect personal information held in government and commercial databases. They are:

Make databases anonymous by encrypting first and last names to prevent unnecessary and potentially harmful disclosure of personal information.

Build permission rules into the databases and database queries to control access to personal information.

Use the databases to create audit trails that cannot be altered by someone trying to hide evidence of privacy abuses.

Source: Center for Democracy and Technology

Featured

  • Defense

    DOD wants prime contractors to be 'help desk' for new cybersecurity model

    The Defense Department is pushing forward with its unified cybersecurity standard for contractors and wants large companies and industry associations to show startups and smaller firms the way.

  • FCW Perspectives
    tech process (pkproject/Shutterstock.com)

    Understanding the obstacles to automation

    As RPA moves from buzzword to practical applications, agency leaders say it’s forcing broader discussions about business operations

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.