De-Identification of Personal Information
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
SF424 Discretionary V2.1 Instructions
Grants.gov Form Instructions Form Identifiers Information Agency Owner Grants.gov Form Name Application for Federal Assistance (SF-424) V2.1 OMB Number 4040-0004 OMB Expiration Date 10/31/2019 Form Field Instructions Field Field Name Required or Information Number Optional 1. Type of Required Select one type of submission in Submission: accordance with agency instructions. Pre-application Application Changed/Corrected Application - Check if this submission is to change or correct a previously submitted application. Unless requested by the agency, applicants may not use this form to submit changes after the closing date. OMB Number: 4040-0004 1 OMB Expiration Date: 10/31/2019 Field Field Name Required or Information Number Optional 2. Type of Application Required Select one type of application in accordance with agency instructions. New - An application that is being submitted to an agency for the first time. Continuation - An extension for an additional funding/budget period for a project with a projected completion date. This can include renewals. Revision - Any change in the federal government's financial obligation or contingent liability from an existing obligation. If a revision, enter the appropriate letter(s). More than one may be selected. A: Increase Award B: Decrease Award C: Increase Duration D: Decrease Duration E: Other (specify) AC: Increase Award, Increase Duration AD: Increase Award, Decrease Duration BC: Decrease Award, Increase Duration BD: Decrease Award, Decrease Duration 3. Date Received: Required Enter date if form is submitted through other means as instructed by the Federal agency. The date received is completed electronically if submitted via Grants.gov. 4. -
Data Privacy: De-Identification Techniques
DEVELOPING AND CONNECTING ISSA CYBERSECURITY LEADERS GLOBALLY Data Privacy: De-Identification Techniques By Ulf Mattsson – ISSA member, New York Chapter This article discusses emerging data privacy techniques, standards, and examples of applications implementing different use cases of de-identification techniques. We will discuss different attack scenarios and practical balances between privacy requirements and operational requirements. Abstract The data privacy landscape is changing. There is a need for privacy models in the current landscape of the increas- ing numbers of privacy regulations and privacy breaches. Privacy methods use models and it is important to have a common language when defining privacy rules. This article will discuss practical recommendations to find the right practical balance between compli- ance, security, privacy, and operational requirements for each type of data and business use case. Figure 1 – Forrester’s global map of privacy rights and regulations [4] ensitive data can be exposed to internal users, partners, California Customer Privacy Act (CCPA) is a wake-up call, and attackers. Different data protection techniques can addressing identification of individuals via data inference provide a balance between protection and transparen- through a broader range of PII attributes. CCPA defines Scy to business processes. The requirements are different for personal information as information that identifies, relates systems that are operational, analytical, or test/development to, describes, is reasonably capable of being associated with, as illustrated by some practical examples in this article. or could reasonably be linked, directly or indirectly, with a We will discuss different aspects of various data privacy tech- particular consumer or household such as a real name, alias, niques, including data truthfulness, applicability to different postal address, and unique personal identifier [1]. -
Leveraging GDPR to Become a Trusted Data Steward
The Boston Consulting Group (BCG) is a global management consulting firm and the world’s leading advisor on business strategy. We partner with clients from the private, public, and not-for- profit sectors in all regions to identify their highest-value opportunities, address their most critical challenges, and transform their enterprises. Our customized approach combines deep insight into the dynamics of companies and markets with close collaboration at all levels of the client organization. This ensures that our clients achieve sustainable competitive advantage, build more capable organizations, and secure lasting results. Founded in 1963, BCG is a private company with offices in more than 90 cities in 50 countries. For more information, please visit bcg.com. DLA Piper is a global law firm with lawyers located in more than 40 countries throughout the Ameri- cas, Europe, the Middle East, Africa and Asia Pa- cific, positioning us to help clients with their legal needs around the world. We strive to be the leading global business law firm by delivering quality and value to our clients. We achieve this through practical and innovative legal solutions that help our clients succeed. We deliver consistent services across our platform of practices and sectors in all matters we undertake. Our clients range from multinational, Global 1000, and Fortune 500 enterprises to emerging compa- nies developing industry-leading technologies. They include more than half of the Fortune 250 and nearly half of the FTSE 350 or their subsidi- aries. We also advise governments and public sector bodies. Leveraging GDPR to Become a Trusted Data Steward Patrick Van Eecke, Ross McKean, Denise Lebeau-Marianna, Jeanne Dauzier: DLA Piper Elias Baltassis, John Rose, Antoine Gourevitch, Alexander Lawrence: BCG March 2018 AT A GLANCE The European Union’s new General Data Protection Regulation, which aims to streng- then protections for consumers’ data privacy, creates an opportunity for companies to establish themselves as trusted stewards of consumer data. -
Ethical and Legal Issues in Whole Genome Sequencing of Individuals
InFocus Robertson, J. A. 2003. The $1000 Genome: Ethical and Legal Issues in Whole Genome Sequencing of Individuals. The American Journal of Bioethics 3(3):InFocus. The $1000 Genome: Ethical and Legal Issues in Whole Genome Sequencing of Individuals John A. Robertson The University of Texas School of Law Abstract understanding the pathogenesis of disease and to drug Progress in gene sequencing could make rapid whole design will be enormous. The ability to predict genome sequencing of individuals affordable to disease and take preventive action will grow millions of persons and useful for many purposes in a significantly. Molecular staging is becoming an future era of genomic medicine. Using the idea of indispensable tool in oncology, and the need for $1000 genome as a focus, this article reviews the pharmacogenetic assessments before prescribing main technical, ethical, and legal issues that must be drugs is likely to become routine. Within ten years resolved to make mass genotyping of individuals there may also be more effective gene therapies that cost-effective and ethically acceptable. It presents correct the genomic or molecular basis of existing the case for individual ownership of a person’s disease (Guttmacher and Collins 2002). genome and its information, and shows the Many clinical applications of genomics will implications of that position for rights to informed require that an individual’s genome or sections of it consent and privacy over sequencing, testing, and be sequenced, so that the presence or absence of disclosing genomic information about identifiable disease mutations or other relevant information can individuals. Legal recognition of a person’s right to be ascertained. -
Genetic Data Aren't So Special: Causes and Implications of Re
Genetic Data Aren’t So Special: Causes and Implications of Re-identification T.J. Kasperbauer & Peter H. Schwartz Indiana University Center for Bioethics Indiana University School of Medicine This is the pre-peer-reviewed version of the article published here: https://doi.org/10.1002/hast.1183 Full citation: Kasperbauer, T.J. & Schwartz, P.H. (2020). Genetic data aren’t so special: Causes and implications of re-identification. Hastings Center Report, 50, 30-39. Abstract: Genetic information is widely thought to pose unique risks of re-identifying individuals. Genetic data reveals a great deal about who we are, and, the standard view holds, should consequently be treated differently from other types of data. Contrary to this view, we argue that the dangers of re-identification for genetic and non-genetic data—including health, financial, and consumer information—are more similar than has been recognized. Before we impose different requirements on sharing genetic information, proponents of the standard view must show that they are in fact necessary. We further argue that the similarities between genetic and non-genetic information have important implications for communicating risks during consent for healthcare and research. While patients and research participants need to be more aware of pervasive data sharing practices, consent forms are the wrong place to provide this education. Instead, health systems should engage with patients throughout patient care to educate about data sharing practices. Introduction Genetic data and biological samples containing genetic material are widely thought to differ from other sorts of health data due to the impossibility of truly “de-identifying” genetic information. -
Fedramp Master Acronym and Glossary Document
FedRAMP Master Acronym and Glossary Version 1.6 07/23/2020 i[email protected] fedramp.gov Master Acronyms and Glossary DOCUMENT REVISION HISTORY Date Version Page(s) Description Author 09/10/2015 1.0 All Initial issue FedRAMP PMO 04/06/2016 1.1 All Addressed minor corrections FedRAMP PMO throughout document 08/30/2016 1.2 All Added Glossary and additional FedRAMP PMO acronyms from all FedRAMP templates and documents 04/06/2017 1.2 Cover Updated FedRAMP logo FedRAMP PMO 11/10/2017 1.3 All Addressed minor corrections FedRAMP PMO throughout document 11/20/2017 1.4 All Updated to latest FedRAMP FedRAMP PMO template format 07/01/2019 1.5 All Updated Glossary and Acronyms FedRAMP PMO list to reflect current FedRAMP template and document terminology 07/01/2020 1.6 All Updated to align with terminology FedRAMP PMO found in current FedRAMP templates and documents fedramp.gov page 1 Master Acronyms and Glossary TABLE OF CONTENTS About This Document 1 Who Should Use This Document 1 How To Contact Us 1 Acronyms 1 Glossary 15 fedramp.gov page 2 Master Acronyms and Glossary About This Document This document provides a list of acronyms used in FedRAMP documents and templates, as well as a glossary. There is nothing to fill out in this document. Who Should Use This Document This document is intended to be used by individuals who use FedRAMP documents and templates. How To Contact Us Questions about FedRAMP, or this document, should be directed to [email protected]. For more information about FedRAMP, visit the website at https://www.fedramp.gov. -
Name Standards User Guide
User Guide Contents SEVIS Name Standards 1 SEVIS Name Fields 2 SEVIS Name Standards Tied to Standards for Machine-readable Passport 3 Applying the New Name Standards 3 Preparing for the New Name Standards 4 Appendix 1: Machine-readable Passport Name Standards 5 Understanding the Machine-readable Passport 5 Name Standards in the Visual Inspection Zone (VIZ) 5 Name Standards in the Machine-readable Zone (MRZ) 6 Transliteration of Names 7 Appendix 2: Comparison of Names in Standard Passports 10 Appendix 3: Exceptional Situations 12 Missing Passport MRZ 12 SEVIS Name Order 12 Unclear Name Order 14 Names-Related Resources 15 Bibliography 15 Document Revision History 15 SEVP will implement a set of standards for all nonimmigrant names entered into SEVIS. This user guide describes the new standards and their relationship to names written in passports. SEVIS Name Standards Name standards help SEVIS users: Comply with the standards governing machine-readable passports. Convert foreign names into standardized formats. Get better results when searching for names in government systems. Improve the accuracy of name matching with other government systems. Prevent the unacceptable entry of characters found in some names. SEVIS Name Standards User Guide SEVIS Name Fields SEVIS name fields will be long enough to capture the full name. Use the information entered in the Machine-Readable Zone (MRZ) of a passport as a guide when entering names in SEVIS. Field Names Standards Surname/Primary Name Surname or the primary identifier as shown in the MRZ -
Why Pseudonyms Don't Anonymize
Why Pseudonyms Don’t Anonymize: A Computational Re-identification Analysis of Genomic Data Privacy Protection Systems Bradley Malin Data Privacy Laboratory, School of Computer Science Carnegie Mellon University, Pittsburgh, Pennsylvania 15213-3890 USA [email protected] Abstract Objectives: In order to supply patient-derived genomic data for medical research purposes, care must be taken to protect the identities of the patients from unwanted intrusions. Recently, several protection techniques that employ the use of trusted third parties (TTPs), and other identity protecting schemas, have been proposed and deployed. The goal of this paper is to analyze the susceptibility of genomic data privacy protection methods based on such methods to known re-identification attacks. Methods: Though advocates of data de-identification and pseudonymization have the best of intentions, oftentimes, these methods fail to preserve anonymity. Methods that rely solely TTPs do not guard against various re-identification methods, which can link apparently anonymous, or pseudonymous, genomic data to named individuals. The re-identification attacks we analyze exploit various types of information that leaked by genomic data that can be used to infer identifying features. These attacks include genotype-phenotype inference attacks, trail attacks which exploit location visit patterns of patients in a distributed environment, and family structure based attacks. Results: While susceptibility varies, we find that each of the protection methods studied is deficient in their protection against re-identification. In certain instances the protection schema itself, such as singly-encrypted pseudonymization, can be leveraged to compromise privacy even further than simple de-identification permits. In order to facilitate the future development of privacy protection methods, we provide a susceptibility comparison of the methods. -
Banner 9 Naming Convention
Banner Page Name Convention Quick Reference Guide About the Banner Page Name Convention The seven-letter naming convention used throughout the Banner Administrative Applications help you to remember page or form names more readily. As shown below, the first three positions use consistent letter codes. The last four positions are an abbreviation of the full page name. For example, all pages in the Banner Student system begin with an S (for Student). All reports, regardless of the Banner system to which they belong, have an R in the third position. In this example, SPAIDEN is a page in the Banner Student system (Position 1 = S for Student system). The page is located in the General Person module (Position 2 = P for Person module). It is an application page (Position 3 = A for Application object type). And in Positions 4-7, IDEN is used as the abbreviation for the full page which is General Person Identification. Position 1 Position 2 Position 3 Position 4 Position 5 Position 6 Position 7 S P A I D E N • Position 1: System Identifier Positions 4-7: Page Name Abbreviation • Position 2: Module Identifier • Position 3: Object Type © 2018 All Rights Reserved | Ellucian Confidential & Proprietary | UNAUTHORIZED DISTRIBUTION PROHIBITED Banner Page Name Convention Quick Reference Guide Position 1: System Identifier. What follows are the Position 1 letter codes and associated descriptions. Position 1 Position 2 Position 3 Position 4 Position 5 Position 6 Position 7 S P A I D E N Position 1 Description Position 1 Description A Banner Advancement P -
Itin-Rts-Pia.Pdf
Date of Approval: February 13, 2018 PIA ID Number: 3185 A. SYSTEM DESCRIPTION 1. Enter the full name and acronym for the system, project, application and/or database. Individual Taxpayer Identification Number -Real Time System, ITIN-RTS 2. Is this a new system? No 2a. If no, is there a PIA for this system? Yes If yes, enter the full name, acronym, PIA ID Number and milestone of the most recent PIA. ITIN-RTS, PIAMS #1244 Next, enter the date of the most recent PIA. 2/17/2015 Indicate which of the following changes occurred to require this update (check all that apply). No Addition of PII No Conversions No Anonymous to Non-Anonymous No Significant System Management Changes No Significant Merging with Another System No New Access by IRS employees or Members of the Public No Addition of Commercial Data / Sources No New Interagency Use Yes Internal Flow or Collection Were there other system changes not listed above? No If yes, explain what changes were made. 3. Check the current ELC (Enterprise Life Cycle) Milestones (select all that apply) No Vision & Strategy/Milestone 0 No Project Initiation/Milestone 1 No Domain Architecture/Milestone 2 No Preliminary Design/Milestone 3 No Detailed Design/Milestone 4A No System Development/Milestone 4B No System Deployment/Milestone 5 Yes Operations & Maintenance (i.e., system is currently operational) 4. Is this a Federal Information Security Management Act (FISMA) reportable system? Yes A.1 General Business Purpose 5. What is the general business purpose of this system? Provide a clear, concise description of the system, application or database, the reason for the system, and the benefits to the IRS to use the information, and how the information will be used. -
PRIMARY RECORD Trinomial ______NRHP Status Code 6Z Other Listings ______Review Code ______Reviewer ______Date ______
State of California – The Resources Agency Primary # ____________________________________ DEPARTMENT OF PARKS AND RECREATION HRI # _______________________________________ PRIMARY RECORD Trinomial _____________________________________ NRHP Status Code 6Z Other Listings ______________________________________________________________ Review Code __________ Reviewer ____________________________ Date ___________ Page 1 of 11 *Resource Name or # (Assigned by recorder) 651 Mathew Street Map Reference Number: P1. Other Identifier: *P2. Location: Not for Publication Unrestricted *a. County Santa Clara County And (P2b and P2c or P2d. Attach a Location Map as necessary.) *b. USGS 7.5’ Quad San Jose West Date 1980 T; R; of Sec Unsectioned; B.M. c. Address 651 Mathew Street City Santa Clara Zip 94050 d. UTM: (give more than one for large and/or linear resources) Zone 10; 593294 mE/ 4135772 mN e. Other Locational Data: (e.g., parcel #, directions to resource, elevation, etc., as appropriate) Parcel #224-40-001. Tract: Laurelwood Farms Subdivision. *P3a. Description: (Describe resource and its major elements. Include design, materials, condition, alterations, size, setting, and boundaries) 651 Mathew Street in Santa Clara is an approximately 4.35-acre light industrial property in a light and heavy industrial setting east of the San Jose International Airport and the Southern Pacific Railroad train tracks. The property contains nine (9) cannery and warehouse buildings formerly operated by a maraschino cherry packing company, the Diana Fruit Preserving Company. The first building was constructed on the property in 1950 and consists of a rectangular shaped, wood-frame and reinforced concrete tilt-up cannery building with a barrel roof and bow-string truss (see photograph 2, 3, 4, 10). A cantilevered roof wraps around the southwest corner and shelters the office extension. -
Consumer Genetic Testing: a Case Study of 23Andme and Ancestry
THE PRIVACY RISKS OF DIRECT-TO- CONSUMER GENETIC TESTING: A CASE STUDY OF 23ANDME AND ANCESTRY SAMUAL A. GARNER AND JIYEON KIM* ABSTRACT Direct-to-consumer genetic testing (DTC-GT) companies have proliferated and expanded in recent years. Using biospecimens directly submitted by consumers, these companies sequence and analyze the individual’s genetic information to provide a wide range of services including information on health and ancestry without the guidance of a healthcare provider. Given the sensitive nature of genetic information, however, there are growing privacy concerns regarding DTC-GT company data practices. We conduct a rigorous analysis, both descriptive and normative, of the privacy policies and associated privacy risks and harms of the DTC-GT services of two major companies, 23andMe and Ancestry, and evaluate to what extent consumers’ genetic privacy is protected by the policies and practices of these two companies. Despite the exceptional nature of genetic information, the laws and agency regulation surrounding genetic privacy and DTC-GT services are fragmented and insufficient. In this analysis, we propose three categories of privacy harms specific to DTC- GT—knowledge harms, autonomy and trust-based harms, and data misuse harms. Then, through the normative lens of exploitation, we argue that 23andMe and Ancestry’s data practices and privacy policies provide consumers with insufficient protection against these harms. Greater efforts from both the industry and legal system are necessary to protect DTC-GT consumers’ genetic privacy as we advance through the era of genomics and precision medicine. * Samual A. Garner, M. Bioethics, J.D.; Jiyeon Kim, M.S., M.A.