burger menu
Protecting privacy in practice

Protecting privacy in practice

    Add to bookmarks

The current use, development and limits of Privacy Enhancing Technologies in data analysis

SUMMARY

This report on security, privacy and data protection gives an in-depth overview of present Privacy Enhancing Technologies. The document also takes a look at the role that PETs have within broader governance frameworks that aim to enable an ethical use of data. 

The paper also intends to generate reflection about the use of technology in governance. It also has the goal to make regulators take into account new ways to manage privacy risks, such as the use of PETs.

Besides, this paper offers evidence with the inclusion of several case studies with specific example uses for each of the five PETs that are examined in this study.

On the other hand, the research presents a series of recommendations on how the UK could acknowledge the potential of PETs and enable their use on a bigger scale.

According to this paper, the PETs' field is quickly evolving. This study aims as well to raise awareness of the potential of this technological area and ways that they could be implemented, to boost more research into their development.

Report download requires free registration on the publisher's website.

OUTLINE

Executive Summary

Recommendations

Introduction

Data sensitivy and Privacy risks

PETs 

Adoption

Appendix

DETAILS

Overview

Researchfinder Rating
5 out of 5 stars
Title
Protecting privacy in practice
Sub-Title
The current use, development and limits of Privacy Enhancing Technologies in data analysis
Region
Global
Published
March 1, 2019
Publisher
Royal Society
Price
FREE
Language
ENGLISH

Content

Number of Pages
64
Number of Tables
0
Number of Exhibits
8
Topics
security
Tags
blockchain, case studies, data analytics, data management, global, machine learning, privacy, regulation, Royal Society, security, server security, uk
Companies mentioned
Microsoft, Cybernetica
Methodology
This report was informed by several conversations with stakeholders from academia, industry, government and civil society, two interdisciplinary workshops, and consideration by an expert Working group.
EVALUATION

What makes this report on security an excellent read is its case studies and quality content.

Positives:

  • Includes key terms and definitions
  • Great case studies
  • Appealing design
  • Great graphics

 

 

Similiar Reports

Internet Trends 2019

FREE

2019 Global eCommerce Fraud Management Report

FREE

Good Practices for Security of Internet of Things

FREE