Using technology to protect privacy

Data mining raises fears about the loss of privacy. But officials at the Center for Democracy and Technology have identified three approaches to designing data-mining projects that can protect personal information held in government and commercial databases. They are:

Make databases anonymous by encrypting first and last names to prevent unnecessary and potentially harmful disclosure of personal information.

Build permission rules into the databases and database queries to control access to personal information.

Use the databases to create audit trails that cannot be altered by someone trying to hide evidence of privacy abuses.

Source: Center for Democracy and Technology

Featured

  • Defense
    Essye Miller, Director at Defense Information Management, speaks during the Breaking the Gender Barrier panel at the Air Space, Cyber Conference in National Harbor, Md., Sept. 19, 2017. (U.S. Air Force photo/Staff Sgt. Chad Trujillo)

    Essye Miller: The exit interview

    Essye Miller, DOD's outgoing principal deputy CIO, talks about COVID, the state of the tech workforce and the hard conversations DOD has to have to prepare personnel for the future.

  • innovation (Sergey Nivens/Shutterstock.com)

    VA embraces procurement challenges at scale

    Steve Kelman applauds the Department of Veterans Affairs' ambitious attempt to move beyond one-off prize-based contests to combat veteran suicides more effectively.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.