Using technology to protect privacy

Data mining raises fears about the loss of privacy. But officials at the Center for Democracy and Technology have identified three approaches to designing data-mining projects that can protect personal information held in government and commercial databases. They are:

Make databases anonymous by encrypting first and last names to prevent unnecessary and potentially harmful disclosure of personal information.

Build permission rules into the databases and database queries to control access to personal information.

Use the databases to create audit trails that cannot be altered by someone trying to hide evidence of privacy abuses.

Source: Center for Democracy and Technology

Featured

  • Defense
    The Pentagon (Photo by Ivan Cholakov / Shutterstock)

    DOD CIO hits pause on JEDI cloud acquisition

    Dana Deasy set cloud as his office's top priority. But when it comes to the JEDI request for proposal, he's directed staff to "pause" to compile a comprehensive review.

  • Cybersecurity
    By Gorodenkoff shutterstock ID 761940757

    Waging cyber war without a rulebook

    As the U.S. looks to go on the offense in the cyber domain, critical questions remain unanswered around who will take the lead and how clearly to draw the rules of engagement.

  • Government Innovation Awards
    Government Innovation Awards - https://governmentinnovationawards.com

    Deadline extended for Rising Star nominations

    You now have until July 18 to help us identify the early-career innovators and change agents in government IT.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.