YoVDO

Privacy by Design: Data Sharing

Offered By: LinkedIn Learning

Tags

Data Privacy Courses Data Governance Courses Encryption Courses

Course Description

Overview

Balance growth with trust. Learn how to share data with appropriate privacy controls, including how to use k-anonymity and l-diversity to protect your users' information.

Syllabus

Introduction
  • Privacy and data sharing
  • What you should know about this course
1. Data Sharing
  • How data sharing works
  • How data sharing can go wrong
2. No Data for You: Is Data Sharing Always Riddled with Risk?
  • Valid reasons for data sharing
  • When data sharing should raise red flags
  • Techniques to minimize privacy risk
3. Common Misconceptions on Data Sharing
  • Why can't we share anonymized data?
  • Encryption and data sharing
4. K-Anonymity and Data Sharing
  • What is k-anonymity?
  • K-anonymity: A use case
  • K-anonymity: Very coarse data
  • K-anonymity: Very granular data
  • K-anonymity: Industry best practice
5. L-Diversity
  • How l-diversity helps privacy
  • K-anonymity versus l-diversity
  • Challenge
  • Solution
6. Operationalizing Privacy Data Sharing Techniques
  • Identifying and rectifying risk
  • Privacy impact assessments
  • Technical privacy consulting
  • Challenge
  • Solution
7. The Challenge of Privacy: Your Digital Fingerprint
  • Data governance, why it matters
  • Your physical fingerprint
  • Your digital fingerprint
  • The power of joining outside data
8. Conclusion
  • Next steps

Taught by

Nishant Bhajaria

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera