際際滷

際際滷Share a Scribd company logo
Risks and mitigations of
releasing data
Risk analysis and
complexity in de-identifying
and releasing data.
Sara-Jayne Terp
RDF Discussion
First, Do No Harm
If you make a dataset public, you
have a responsibility, to the best
of your knowledge, skills, and advice, to
do no harm to the people connected to that dataset.
You balance making data
available to people who can do
good with it and protecting the
data subjects, sources, and
managers.
2
What is risk?
What is the risk here?
3
RISK
The probability of something happening
multiplied by the resulting cost or benefit
if it does (Oxford English Dictionary)
Three parts:
Cost/benefit
Probability
Subject (to what/whom)
4
Subjects: Physical
5
Witnesses told us that
a helicopter had been
circling around the
area for hours by the
time the bakery opened
in the afternoon. It
had, perhaps, 200
people lined up to get
bread. Suddenly, the
helicopter dropped a
bomb that hit a building
Subjects: Reputational
6
Subjects: Physical
7
Collectors: Physical
8
Processors: Legal
9
Risk OF What?
 Physical harm
 Legal harm (e.g. jail, IP disputes)
 Reputational harm
 Privacy breach
10
Risk to Whom?
 Data subjects (elections example)
 Data collectors (conflict example)
 Data processing team (military equipment example)
 Person releasing the data (corruption example)
 Person using the data
11
Likelihood of Risk
Low
Medium
High
12
piI
How I handle it
13
PII
Personally identifiable information油(PII) is any data that
could potentially identify a specific individual. Any
information that can be used to distinguish one
person from another and can be used for de-
anonymizing anonymous data can be
considered油PII.
14
Learn to spot Red Flags
 Names, addresses, phone numbers
 Locations: lat/long, GIS traces, locality (e.g. home +
work as an identifier)
 Members of small populations
 Untranslated text
 Codes (e.g. 41)
 Slang terms
 Can be combined with other datasets to produce
PII
15
Consider Partial Release
Release to only some groups
 Academics
 People in your organisation
 Data subjects
Release at lower granularity
 Town/district level, not street
 Subset or sample of data rows
 Subset of data columns
16
Include locals
Locals can spot:
Local languages
Local slang
Innocent-looking phrases
Locals might also choose the risk
17
Consider Interactions Between Datasets
18
Learn From Experts
Over to you
19
THANK YOU
For questions or
suggestions:
Responsible Data Forum
For questions or
suggestions:
Responsible Data Forum

More Related Content

Similar to Sjt risks and mitigations of releasing data (20)

Open Data Journalism
Open Data JournalismOpen Data Journalism
Open Data Journalism
Gabriella Razzano
FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?
Robin Rice
Session 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSession 01 designing and scoping a data science project
Session 01 designing and scoping a data science project
bodaceacat
Session 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSession 01 designing and scoping a data science project
Session 01 designing and scoping a data science project
Sara-Jayne Terp
Data as a service: a human-centered design approach/Retha de la Harpe
Data as a service: a human-centered design approach/Retha de la HarpeData as a service: a human-centered design approach/Retha de la Harpe
Data as a service: a human-centered design approach/Retha de la Harpe
African Open Science Platform
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
bis_foresight
Making Decisions in a World Awash in Data: Were going to need a different bo...
Making Decisions in a World Awash in Data: Were going to need a different bo...Making Decisions in a World Awash in Data: Were going to need a different bo...
Making Decisions in a World Awash in Data: Were going to need a different bo...
Micah Altman
Ethics privacy washington
Ethics privacy washingtonEthics privacy washington
Ethics privacy washington
Hendrik Drachsler
Cybersecurity webinar: Their risk is our risk
Cybersecurity webinar: Their risk is our riskCybersecurity webinar: Their risk is our risk
Cybersecurity webinar: Their risk is our risk
OpenAthens
Data Visualization in the Newsroom
Data Visualization in the NewsroomData Visualization in the Newsroom
Data Visualization in the Newsroom
Carl V. Lewis
ODiP: Reproducibility, open data and GDPR
ODiP: Reproducibility, open data and GDPRODiP: Reproducibility, open data and GDPR
ODiP: Reproducibility, open data and GDPR
University of York Library
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Krishnaram Kenthapadi
Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...
ARDC
New Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingNew Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max Welling
Textkernel
Digital Nightmares: Accessing the Technology
Digital Nightmares: Accessing the TechnologyDigital Nightmares: Accessing the Technology
Digital Nightmares: Accessing the Technology
Errol A. Adams, J.D., M.L.S.
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...
Micah Altman
The Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the MissingThe Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the Missing
Thermo Fisher Scientific
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
University of Southern California
Critical issues in the collection, analysis and use of student (digital) data
Critical issues in the collection, analysis and use of student (digital) dataCritical issues in the collection, analysis and use of student (digital) data
Critical issues in the collection, analysis and use of student (digital) data
University of South Africa (Unisa)
Aslin.discussion
Aslin.discussionAslin.discussion
Aslin.discussion
Jesse Lingeman
FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?
Robin Rice
Session 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSession 01 designing and scoping a data science project
Session 01 designing and scoping a data science project
bodaceacat
Session 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSession 01 designing and scoping a data science project
Session 01 designing and scoping a data science project
Sara-Jayne Terp
Data as a service: a human-centered design approach/Retha de la Harpe
Data as a service: a human-centered design approach/Retha de la HarpeData as a service: a human-centered design approach/Retha de la Harpe
Data as a service: a human-centered design approach/Retha de la Harpe
African Open Science Platform
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
bis_foresight
Making Decisions in a World Awash in Data: Were going to need a different bo...
Making Decisions in a World Awash in Data: Were going to need a different bo...Making Decisions in a World Awash in Data: Were going to need a different bo...
Making Decisions in a World Awash in Data: Were going to need a different bo...
Micah Altman
Ethics privacy washington
Ethics privacy washingtonEthics privacy washington
Ethics privacy washington
Hendrik Drachsler
Cybersecurity webinar: Their risk is our risk
Cybersecurity webinar: Their risk is our riskCybersecurity webinar: Their risk is our risk
Cybersecurity webinar: Their risk is our risk
OpenAthens
Data Visualization in the Newsroom
Data Visualization in the NewsroomData Visualization in the Newsroom
Data Visualization in the Newsroom
Carl V. Lewis
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Krishnaram Kenthapadi
Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...
ARDC
New Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingNew Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max Welling
Textkernel
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...
Micah Altman
The Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the MissingThe Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the Missing
Thermo Fisher Scientific
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
University of Southern California
Critical issues in the collection, analysis and use of student (digital) data
Critical issues in the collection, analysis and use of student (digital) dataCritical issues in the collection, analysis and use of student (digital) data
Critical issues in the collection, analysis and use of student (digital) data
University of South Africa (Unisa)

More from kjantin (16)

CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
kjantin
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
kjantin
Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...
kjantin
How to send & receive private messages on newtactics.org
How to send & receive private messages on newtactics.orgHow to send & receive private messages on newtactics.org
How to send & receive private messages on newtactics.org
kjantin
How to tag New Tactics members in comments
How to tag New Tactics members in comments How to tag New Tactics members in comments
How to tag New Tactics members in comments
kjantin
How to participate spanishHow to participate spanish
How to participate spanish
kjantin
How to participate in a New Tactics conversation (Arabic)
How to participate in a New Tactics conversation (Arabic)How to participate in a New Tactics conversation (Arabic)
How to participate in a New Tactics conversation (Arabic)
kjantin
Conf call slideshow temp arabic
Conf call slideshow temp arabicConf call slideshow temp arabic
Conf call slideshow temp arabic
kjantin
How to participate in a New Tactics online conversation
How to participate in a New Tactics online conversationHow to participate in a New Tactics online conversation
How to participate in a New Tactics online conversation
kjantin
How to add content to the MINN website
How to add content to the MINN websiteHow to add content to the MINN website
How to add content to the MINN website
kjantin
Empowering Citizens to Fight Corruption
Empowering Citizens to Fight CorruptionEmpowering Citizens to Fight Corruption
Empowering Citizens to Fight Corruption
kjantin
Wk223 Mapping Systems
Wk223 Mapping SystemsWk223 Mapping Systems
Wk223 Mapping Systems
kjantin
Narrative Info For Web
Narrative Info For WebNarrative Info For Web
Narrative Info For Web
kjantin
How to report your financial info
How to report your financial infoHow to report your financial info
How to report your financial info
kjantin
What Is Newtactics 02 09
What Is Newtactics 02 09What Is Newtactics 02 09
What Is Newtactics 02 09
kjantin
Tactical Mapping
Tactical MappingTactical Mapping
Tactical Mapping
kjantin
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
kjantin
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
CEJIL uses Uwazi to improve access documents of the Inter-American Human Righ...
kjantin
Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...
kjantin
How to send & receive private messages on newtactics.org
How to send & receive private messages on newtactics.orgHow to send & receive private messages on newtactics.org
How to send & receive private messages on newtactics.org
kjantin
How to tag New Tactics members in comments
How to tag New Tactics members in comments How to tag New Tactics members in comments
How to tag New Tactics members in comments
kjantin
How to participate spanishHow to participate spanish
How to participate spanish
kjantin
How to participate in a New Tactics conversation (Arabic)
How to participate in a New Tactics conversation (Arabic)How to participate in a New Tactics conversation (Arabic)
How to participate in a New Tactics conversation (Arabic)
kjantin
Conf call slideshow temp arabic
Conf call slideshow temp arabicConf call slideshow temp arabic
Conf call slideshow temp arabic
kjantin
How to participate in a New Tactics online conversation
How to participate in a New Tactics online conversationHow to participate in a New Tactics online conversation
How to participate in a New Tactics online conversation
kjantin
How to add content to the MINN website
How to add content to the MINN websiteHow to add content to the MINN website
How to add content to the MINN website
kjantin
Empowering Citizens to Fight Corruption
Empowering Citizens to Fight CorruptionEmpowering Citizens to Fight Corruption
Empowering Citizens to Fight Corruption
kjantin
Wk223 Mapping Systems
Wk223 Mapping SystemsWk223 Mapping Systems
Wk223 Mapping Systems
kjantin
Narrative Info For Web
Narrative Info For WebNarrative Info For Web
Narrative Info For Web
kjantin
How to report your financial info
How to report your financial infoHow to report your financial info
How to report your financial info
kjantin
What Is Newtactics 02 09
What Is Newtactics 02 09What Is Newtactics 02 09
What Is Newtactics 02 09
kjantin
Tactical Mapping
Tactical MappingTactical Mapping
Tactical Mapping
kjantin

Recently uploaded (20)

Updated Willow 2025 Media Deck_270225.pdf
Updated Willow 2025 Media Deck_270225.pdfUpdated Willow 2025 Media Deck_270225.pdf
Updated Willow 2025 Media Deck_270225.pdf
tangramcommunication
Updated Willow 2025 Media Deck_280225 Updated.pdf
Updated Willow 2025 Media Deck_280225 Updated.pdfUpdated Willow 2025 Media Deck_280225 Updated.pdf
Updated Willow 2025 Media Deck_280225 Updated.pdf
tangramcommunication
02 a movie weekend 2001 a space odyssey.pptx
02 a movie weekend 2001 a space odyssey.pptx02 a movie weekend 2001 a space odyssey.pptx
02 a movie weekend 2001 a space odyssey.pptx
kasmirsyariati
Final_Geographical_Analysis_9-1-10 (1).pdf
Final_Geographical_Analysis_9-1-10 (1).pdfFinal_Geographical_Analysis_9-1-10 (1).pdf
Final_Geographical_Analysis_9-1-10 (1).pdf
OmkarPatilPatodekar
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrdgestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
johngallardo981
Chapter 2 - Understanding Computer Investigations.ppt
Chapter 2 - Understanding Computer Investigations.pptChapter 2 - Understanding Computer Investigations.ppt
Chapter 2 - Understanding Computer Investigations.ppt
kong100
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
Stanislava Tropcheva
Lesson 6- Data Visualization and Reporting.pptx
Lesson 6- Data Visualization and Reporting.pptxLesson 6- Data Visualization and Reporting.pptx
Lesson 6- Data Visualization and Reporting.pptx
1045858
Kaggle & Datathons: A Practical Guide to AI Competitions
Kaggle & Datathons: A Practical Guide to AI CompetitionsKaggle & Datathons: A Practical Guide to AI Competitions
Kaggle & Datathons: A Practical Guide to AI Competitions
rasheedsrq
Elevate Your Space with Premium Design Services from NInterior Design
Elevate Your Space with Premium Design Services from NInterior DesignElevate Your Space with Premium Design Services from NInterior Design
Elevate Your Space with Premium Design Services from NInterior Design
Ninterior Design
Large Language Models (LLMs) part one.pptx
Large Language Models (LLMs) part one.pptxLarge Language Models (LLMs) part one.pptx
Large Language Models (LLMs) part one.pptx
harmardir
9th Edition of International Research Awards
9th Edition of International Research Awards9th Edition of International Research Awards
9th Edition of International Research Awards
sciencereviewerview
Certificado Business Intelligence - Alber Florentin.pdf
Certificado Business Intelligence - Alber Florentin.pdfCertificado Business Intelligence - Alber Florentin.pdf
Certificado Business Intelligence - Alber Florentin.pdf
alberalen
Optimizing Common Table Expressions in Apache Hive with Calcite
Optimizing Common Table Expressions in Apache Hive with CalciteOptimizing Common Table Expressions in Apache Hive with Calcite
Optimizing Common Table Expressions in Apache Hive with Calcite
Stamatis Zampetakis
Leveraging-Virtual-Reality-(VR)-and-Augmented-Reality-(AR)-for-Enhanced-Touri...
Leveraging-Virtual-Reality-(VR)-and-Augmented-Reality-(AR)-for-Enhanced-Touri...Leveraging-Virtual-Reality-(VR)-and-Augmented-Reality-(AR)-for-Enhanced-Touri...
Leveraging-Virtual-Reality-(VR)-and-Augmented-Reality-(AR)-for-Enhanced-Touri...
Krishna Khanal
Design Data Model Objects for Analytics, Activation, and AI
Design Data Model Objects for Analytics, Activation, and AIDesign Data Model Objects for Analytics, Activation, and AI
Design Data Model Objects for Analytics, Activation, and AI
aaronmwinters
ヰ$__Cubase Pro Crack Full Activativated 2025
ヰ$__Cubase Pro Crack Full Activativated 2025ヰ$__Cubase Pro Crack Full Activativated 2025
ヰ$__Cubase Pro Crack Full Activativated 2025
abrishhayat858
Episode_10_-_The_Art_of_Rhetoric (1).pptx
Episode_10_-_The_Art_of_Rhetoric (1).pptxEpisode_10_-_The_Art_of_Rhetoric (1).pptx
Episode_10_-_The_Art_of_Rhetoric (1).pptx
addelynngue5115
vnptloveeeeeeeeeeeeeeeeeeeeeeeeeeee.pptx
vnptloveeeeeeeeeeeeeeeeeeeeeeeeeeee.pptxvnptloveeeeeeeeeeeeeeeeeeeeeeeeeeee.pptx
vnptloveeeeeeeeeeeeeeeeeeeeeeeeeeee.pptx
deomom129
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
Timothy Spann
Updated Willow 2025 Media Deck_270225.pdf
Updated Willow 2025 Media Deck_270225.pdfUpdated Willow 2025 Media Deck_270225.pdf
Updated Willow 2025 Media Deck_270225.pdf
tangramcommunication
Updated Willow 2025 Media Deck_280225 Updated.pdf
Updated Willow 2025 Media Deck_280225 Updated.pdfUpdated Willow 2025 Media Deck_280225 Updated.pdf
Updated Willow 2025 Media Deck_280225 Updated.pdf
tangramcommunication
02 a movie weekend 2001 a space odyssey.pptx
02 a movie weekend 2001 a space odyssey.pptx02 a movie weekend 2001 a space odyssey.pptx
02 a movie weekend 2001 a space odyssey.pptx
kasmirsyariati
Final_Geographical_Analysis_9-1-10 (1).pdf
Final_Geographical_Analysis_9-1-10 (1).pdfFinal_Geographical_Analysis_9-1-10 (1).pdf
Final_Geographical_Analysis_9-1-10 (1).pdf
OmkarPatilPatodekar
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrdgestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
johngallardo981
Chapter 2 - Understanding Computer Investigations.ppt
Chapter 2 - Understanding Computer Investigations.pptChapter 2 - Understanding Computer Investigations.ppt
Chapter 2 - Understanding Computer Investigations.ppt
kong100
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
Stanislava Tropcheva
Lesson 6- Data Visualization and Reporting.pptx
Lesson 6- Data Visualization and Reporting.pptxLesson 6- Data Visualization and Reporting.pptx
Lesson 6- Data Visualization and Reporting.pptx
1045858
Kaggle & Datathons: A Practical Guide to AI Competitions
Kaggle & Datathons: A Practical Guide to AI CompetitionsKaggle & Datathons: A Practical Guide to AI Competitions
Kaggle & Datathons: A Practical Guide to AI Competitions
rasheedsrq
Elevate Your Space with Premium Design Services from NInterior Design
Elevate Your Space with Premium Design Services from NInterior DesignElevate Your Space with Premium Design Services from NInterior Design
Elevate Your Space with Premium Design Services from NInterior Design
Ninterior Design
Large Language Models (LLMs) part one.pptx
Large Language Models (LLMs) part one.pptxLarge Language Models (LLMs) part one.pptx
Large Language Models (LLMs) part one.pptx
harmardir
9th Edition of International Research Awards
9th Edition of International Research Awards9th Edition of International Research Awards
9th Edition of International Research Awards
sciencereviewerview
Certificado Business Intelligence - Alber Florentin.pdf
Certificado Business Intelligence - Alber Florentin.pdfCertificado Business Intelligence - Alber Florentin.pdf
Certificado Business Intelligence - Alber Florentin.pdf
alberalen
Optimizing Common Table Expressions in Apache Hive with Calcite
Optimizing Common Table Expressions in Apache Hive with CalciteOptimizing Common Table Expressions in Apache Hive with Calcite
Optimizing Common Table Expressions in Apache Hive with Calcite
Stamatis Zampetakis
Leveraging-Virtual-Reality-(VR)-and-Augmented-Reality-(AR)-for-Enhanced-Touri...
Leveraging-Virtual-Reality-(VR)-and-Augmented-Reality-(AR)-for-Enhanced-Touri...Leveraging-Virtual-Reality-(VR)-and-Augmented-Reality-(AR)-for-Enhanced-Touri...
Leveraging-Virtual-Reality-(VR)-and-Augmented-Reality-(AR)-for-Enhanced-Touri...
Krishna Khanal
Design Data Model Objects for Analytics, Activation, and AI
Design Data Model Objects for Analytics, Activation, and AIDesign Data Model Objects for Analytics, Activation, and AI
Design Data Model Objects for Analytics, Activation, and AI
aaronmwinters
ヰ$__Cubase Pro Crack Full Activativated 2025
ヰ$__Cubase Pro Crack Full Activativated 2025ヰ$__Cubase Pro Crack Full Activativated 2025
ヰ$__Cubase Pro Crack Full Activativated 2025
abrishhayat858
Episode_10_-_The_Art_of_Rhetoric (1).pptx
Episode_10_-_The_Art_of_Rhetoric (1).pptxEpisode_10_-_The_Art_of_Rhetoric (1).pptx
Episode_10_-_The_Art_of_Rhetoric (1).pptx
addelynngue5115
vnptloveeeeeeeeeeeeeeeeeeeeeeeeeeee.pptx
vnptloveeeeeeeeeeeeeeeeeeeeeeeeeeee.pptxvnptloveeeeeeeeeeeeeeeeeeeeeeeeeeee.pptx
vnptloveeeeeeeeeeeeeeeeeeeeeeeeeeee.pptx
deomom129
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
Timothy Spann

Sjt risks and mitigations of releasing data

  • 1. Risks and mitigations of releasing data Risk analysis and complexity in de-identifying and releasing data. Sara-Jayne Terp RDF Discussion
  • 2. First, Do No Harm If you make a dataset public, you have a responsibility, to the best of your knowledge, skills, and advice, to do no harm to the people connected to that dataset. You balance making data available to people who can do good with it and protecting the data subjects, sources, and managers. 2
  • 3. What is risk? What is the risk here? 3
  • 4. RISK The probability of something happening multiplied by the resulting cost or benefit if it does (Oxford English Dictionary) Three parts: Cost/benefit Probability Subject (to what/whom) 4
  • 5. Subjects: Physical 5 Witnesses told us that a helicopter had been circling around the area for hours by the time the bakery opened in the afternoon. It had, perhaps, 200 people lined up to get bread. Suddenly, the helicopter dropped a bomb that hit a building
  • 10. Risk OF What? Physical harm Legal harm (e.g. jail, IP disputes) Reputational harm Privacy breach 10
  • 11. Risk to Whom? Data subjects (elections example) Data collectors (conflict example) Data processing team (military equipment example) Person releasing the data (corruption example) Person using the data 11
  • 14. PII Personally identifiable information油(PII) is any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de- anonymizing anonymous data can be considered油PII. 14
  • 15. Learn to spot Red Flags Names, addresses, phone numbers Locations: lat/long, GIS traces, locality (e.g. home + work as an identifier) Members of small populations Untranslated text Codes (e.g. 41) Slang terms Can be combined with other datasets to produce PII 15
  • 16. Consider Partial Release Release to only some groups Academics People in your organisation Data subjects Release at lower granularity Town/district level, not street Subset or sample of data rows Subset of data columns 16
  • 17. Include locals Locals can spot: Local languages Local slang Innocent-looking phrases Locals might also choose the risk 17
  • 20. THANK YOU For questions or suggestions: Responsible Data Forum For questions or suggestions: Responsible Data Forum