100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Class notes

Notes on Privacy by Design Strategies and Implementation (R_DAP)

Rating
5.0
(1)
Sold
-
Pages
4
Uploaded on
21-06-2022
Written in
2021/2022

Detailed notes on privacy by design strategies and implementation. What is privacy? How can security measures be used to achieve privacy? What are rights to privacy? How is privacy ensured in big data?

Institution
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
June 21, 2022
Number of pages
4
Written in
2021/2022
Type
Class notes
Professor(s)
Silvia de conca
Contains
Lecture 5

Subjects

Content preview

Privacy by Design Strategies and Implementation

What is privacy?
- Intimacy?
- The right to be left alone?
- Control?
- Autonomy?
- Secrecy?
- Control?

What derives from this is the fact that there is no one single
measure that can accomplish privacy. Instead, a combination of
security measures is used in order to achieve privacy. These
measures can include:
- Minimise = Restrict amount of data (Big data rely on rich
data for insights)
- Hide = Hide from plain view (Leads to de-anonymisation)
- Separate = Data process distributed (Merging data from
different sources is a part of big data analysis)
- Aggregate = Least details possible
- Inform = Transparency
- Control = Data subjects should have control (Loop of
repurposing data)
- Enforce = Privacy policy compatible with GDPR
- Demonstrate = Demonstrate compliance

There are many strategies available to ensure privacy, but they
can become complicated in the context of big data.

Big Data analytics phases
a. Data acquisition/collection
Minimising the amount of data that is collected can ensure
privacy here. Which data is really needed? Privacy Impact
Assessments (PIAs) are used to identify data processing
needs, identify risks arising from needs and managing
identified risks.

b. Data analysis/curation
The method of aggregate can be used for local
anonymisation here to either remove data or make data
more generic. Hiding can also be used to prevent
collection of observed data, such as website visited, online
$4.22
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
emilyknight
5.0
(1)

Also available in package deal

Reviews from verified buyers

Showing all reviews
2 year ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
emilyknight Vrije Universiteit Amsterdam
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
3 year
Number of followers
3
Documents
25
Last sold
1 year ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions