Privacy Tools and Techniques for Developers
- Amber Welch
bit.ly/2x1UXWX
Privacy Tools and Techniques for Developers -Amber Welch - - PowerPoint PPT Presentation
Privacy Tools and Techniques for Developers -Amber Welch bit.ly/2x1UXWX Amber Welch MA, CISSP, CISA, CIPP/E, CIPM, FIP, CCSK, and ISO 27001 Lead Auditor linkedin.com/in/amberwelch1 github.com/msamberwelch @MsAmberWelch bit.ly/2WRAGh8
bit.ly/2x1UXWX
MA, CISSP, CISA, CIPP/E, CIPM, FIP, CCSK, and ISO 27001 Lead Auditor linkedin.com/in/amberwelch1 github.com/msamberwelch @MsAmberWelch
bit.ly/2WRAGh8
bit.ly/2WXJTcR
bit.ly/2x1UXWX
bit.ly/2ZBiEBz
bit.ly/2J3yEWn
bit.ly/2x1UXWX
A Privacy Impact Assessment (PIA) is a method to:
bit.ly/2KmuLyI
bit.ly/2x7BlRh
bit.ly/2qbrnu5
bit.ly/2qbrnu5
bit.ly/2x1UXWX
Data minimization is:
bit.ly/2KmuLyI
bit.ly/2qbrnu5
bit.ly/2qbrnu5
bit.ly/2x1UXWX
Default settings for privacy should:
bit.ly/2KmuLyI
bit.ly/2UmLXEP
bit.ly/2Hic0qm
bit.ly/2Yg4i9D
bit.ly/2qbrnu5
bit.ly/2qbrnu5
bit.ly/2x1UXWX
bit.ly/2qbrnu5
bit.ly/2qbrnu5
bit.ly/2x1UXWX
Differential privacy:
individual’s record
data would, with or without one record
bit.ly/2KmuLyI
bit.ly/2IwDufR
bit.ly/2Pk7fEG
bit.ly/2Pk7fEG
bit.ly/2qbrnu5
bit.ly/2qbrnu5
bit.ly/2x1UXWX
Privacy preserving ad click attribution:
bit.ly/2KmuLyI
bit.ly/30FFBoj
bit.ly/30FFBoj
bit.ly/30FFBoj
bit.ly/2qbrnu5
bit.ly/2qbrnu5
bit.ly/2x1UXWX
Federated learning:
decentralized data
devices which return new results
bit.ly/2KmuLyI
bit.ly/2J4Fx9H
bit.ly/2J4Fx9H
bit.ly/2qbrnu5
bit.ly/2qbrnu5
bit.ly/2x1UXWX
Homomorphic encryption:
disclosing confidential data
decrypted
bit.ly/2KmuLyI
bit.ly/2WWvkB4
bit.ly/2qbrnu5
bit.ly/2qbrnu5
bit.ly/2x1UXWX
MA, CISSP, CISA, CIPP/E, CIPM, FIP, CCSK, and ISO 27001 Lead Auditor
linkedin.com/in/amberwelch1 github.com/msamberwelch @MsAmberWelch
bit.ly/2WRAGh8