What is Privacy by Design?
(PbD)
Embedding privacy principles into services and products from the beginning.
What is Privacy Engineering?
Applying PbD principles using technical approaches to protect privacy and maintain data utility.
What are the two categories of Privacy-Enhancing Technologies?
(PETs)
Why is deidentification important?
It helps preserve privacy and exempts data from some laws and governance.
What is the difference between anonymous and pseudonymous data?
What are strong identifiers?
Data like SSN, passport number, or name that directly identifies individuals.
What are weak identifiers?
Data like usernames or email addresses that can identify individuals when aggregated.
What are quasi-identifiers?
Data like a date of birth that can identify individuals when combined with external information.
What is a persistent identifier?
Identifiers like IP or MAC addresses that consistently identify a device or user over time.
What is the difference between linked and linkable data?
What is suppression in deidentification?
Removing identifiers entirely.
What is generalization in deidentification?
Replacing specific data with broader categories.
What is noise addition?
Adding random variation to data to preserve overall statistical properties.
How does differential privacy work?
It balances privacy and data utility by adjusting the noise added to data.
What are HIPAA’s deidentification methods?
What is FTC guidance on deidentification?
What are the two main types of data-shielding PETs?
What is symmetric encryption?
Private-key cryptography where the same key encrypts and decrypts data.
List pros and cons of symmetric encryption.
What is asymmetric encryption?
Public-key cryptography using a key pair (public and private) for each user.
How is a message sent using asymmetric encryption?
What is a digital certificate?
What is the role of a certificate authority?
What is Public Key Infrastructure (PKI)?
Supports key distribution and certificate validation.