YoVDO

Privacy by Design: Data Sharing

Offered By: LinkedIn Learning

Tags

Data Privacy Courses Data Governance Courses Encryption Courses

Course Description

Overview

Balance growth with trust. Learn how to share data with appropriate privacy controls, including how to use k-anonymity and l-diversity to protect your users' information.

Syllabus

Introduction
  • Privacy and data sharing
  • What you should know about this course
1. Data Sharing
  • How data sharing works
  • How data sharing can go wrong
2. No Data for You: Is Data Sharing Always Riddled with Risk?
  • Valid reasons for data sharing
  • When data sharing should raise red flags
  • Techniques to minimize privacy risk
3. Common Misconceptions on Data Sharing
  • Why can't we share anonymized data?
  • Encryption and data sharing
4. K-Anonymity and Data Sharing
  • What is k-anonymity?
  • K-anonymity: A use case
  • K-anonymity: Very coarse data
  • K-anonymity: Very granular data
  • K-anonymity: Industry best practice
5. L-Diversity
  • How l-diversity helps privacy
  • K-anonymity versus l-diversity
  • Challenge
  • Solution
6. Operationalizing Privacy Data Sharing Techniques
  • Identifying and rectifying risk
  • Privacy impact assessments
  • Technical privacy consulting
  • Challenge
  • Solution
7. The Challenge of Privacy: Your Digital Fingerprint
  • Data governance, why it matters
  • Your physical fingerprint
  • Your digital fingerprint
  • The power of joining outside data
8. Conclusion
  • Next steps

Taught by

Nishant Bhajaria

Related Courses

Introduction to Data Analytics for Business
University of Colorado Boulder via Coursera
Digital and the Everyday: from codes to cloud
NPTEL via Swayam
Systems and Application Security
(ISC)² via Coursera
Protecting Health Data in the Modern Age: Getting to Grips with the GDPR
University of Groningen via FutureLearn
Teaching Impacts of Technology: Data Collection, Use, and Privacy
University of California, San Diego via Coursera