Difference between revisions of "Privacy/De-identification"

From W3C Wiki
Jump to: navigation, search
(starting a section on academic papers)
m
Line 1: Line 1:
 
Some initial resources, suggested by Peter Swire ([http://lists.w3.org/Archives/Public/public-tracking/2013Jan/0037.html background reading on de-identification]):
 
Some initial resources, suggested by Peter Swire ([http://lists.w3.org/Archives/Public/public-tracking/2013Jan/0037.html background reading on de-identification]):
  
* United Kingdom, Information Commissioner’s Office, “[http://www.ico.gov.uk/for_organisations/data_protection/topic_guides/~/media/documents/library/Data_Protection/Practical_application/anonymisation_code.ashx Anonymisation: Managing Data Protection Risk Code of Practice].” (2012).
+
* United Kingdom, Information Commissioner’s Office, “[http://www.ico.gov.uk/for_organisations/data_protection/topic_guides/~/media/documents/library/Data_Protection/Practical_application/anonymisation_code.ashx Anonymisation: Managing Data Protection Risk Code of Practice].” 2012.
* U.S. Department of Health and Human Services, “[http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/De-identification/hhs_deid_guidance.pdf Guidance Regarding Methods of De-Identification of Protected Health Information in Accordance with the HIPAA Privacy Rule].” (2012).
+
* U.S. Department of Health and Human Services, “[http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/De-identification/hhs_deid_guidance.pdf Guidance Regarding Methods of De-Identification of Protected Health Information in Accordance with the HIPAA Privacy Rule].” 2012.
  
 
Deeper background:
 
Deeper background:
Line 10: Line 10:
 
== Academic papers ==
 
== Academic papers ==
  
* Sweeney, Latanya. "[http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf k-anonymity: A model for protecting privacy]." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10.05 (2002): 557-570.
+
* Sweeney, Latanya. "[http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf k-anonymity: A model for protecting privacy]." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10.05. 2002.

Revision as of 07:51, 16 January 2013

Some initial resources, suggested by Peter Swire (background reading on de-identification):

Deeper background:

Academic papers