Data retention limits are the defined time periods, personal data should be retained by the organizations. These limits are critical for data privacy and security, […]
Month: October 2024
Data minimization The less you use in the digital world, the more you have.
Data minimization means that you collect, process and store only as much personal data as you need for a specific purpose. The principle is inherent […]
Privacy Impact Assessment (PIA) the Forefront of Data Protection
A Privacy Impact Assessment (PIA) is an organized and formal approach to evaluating the risks to privacy that are likely to arise from a new […]
Privacy by Design ISPPS- Design from very beginning
Privacy by Design (PbD) Proactive approach to privacy and PbD assures that privacy is present in the target design. Such a shift in the paradigm […]
Digitization enables Tokenization
Tokenization is a security process that replaces sensitive data with unique identifiers, or tokens to help reduce the chances of data breaches and unauthorized access. […]
Lesson 4 — Data Masking Hiding Sensitive Data
The answer above refers to Data Masking, which is a technique that allows to protect sensitive data but have an unreadable data that resembles the […]
Pseudonymization A Partial Privacy Solution
When personal identifiers are replaced by pseudonyms (artificial identifiers) we refer to the pseudonymization process. This does not remove all personal data but removes most […]
Forget — A Digital Age Privacy Protection
Anonymization is the approach of cleaning or masking identifiers where addresses can not be known on individual-level to data records. In an era where data […]
Ensuring Privacy-Preserving Machine Learning Safeguarding Data while Enabling Insights
Machine learning is an essential aspect of data science nowadays among all the other options we have to extract any valuable insights out of huge […]
SMPC{—}Collaborating without Sharing Secrets
Secure Multi-Party Computation(SMPC) is a cryptographic method suitable to allow several parties to jointly compute a function of their private inputs without the need to […]