Protecting Confidential Data

Slides:



Advertisements
Similar presentations
Microdata access in practice Felix Ritchie. Overview Concerns Conceptual and practical concerns International practice UK experience Key lessons.
Advertisements

Statistical disclosure limitation: Balancing data confidentiality and data access.
Estimating Identification Risks for Microdata Jerome P. Reiter Institute of Statistics and Decision Sciences Duke University, Durham NC, USA.
Dealing with confidential research information - Anonymisation techniques and access regulations to enable using and sharing research data Data Management.
Eurostat T HE E UROPEAN PROCESS OF ENHANCING ACCESS TO E UROSTAT DATA A LEKSANDRA B UJNOWSKA E UROSTAT.
Statistical Disclosure Control (SDC) at SURS Andreja Smukavec General Methodology and Standards Sector.
Confidentiality risks of releasing measures of data quality Jerry Reiter Department of Statistical Science Duke University
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Business microdata dissemination at Istat Daniela Ichim Luisa Franconi
In a Virtual Data Centre Protecting Confidentiality COMPUTATIONAL INFORMATICS Christine O’Keefe, Mark Westcott, Adrien Ickowicz, Maree O’Sullivan, CSIRO.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Statistics Canada Statistique Canada Protecting Confidentiality in Canadian Research Data Centres Cynthia Cook Senior Research Data Centre Analyst, Statistics.
Access routes to 2001 UK Census Microdata: Issues and Solutions Jo Wathan SARs support Unit, CCSR University of Manchester, UK
Semi-Permeable Boundaries Among Institutions: Non-Public Data and the Census RDC at Berkeley IASSIST 2009 – Tampere, Finland Jon StilesMay 27, 2009.
An integrated system for handling restricted use data Felicia LeClere, Ph.D. IASSIST 2009 Tampere, Finland.
Proposed IPUMS-International Secure Data Enclave Patricia Kelly Hall
Settings, Practices and Data Access: Results of a Survey of UK Social Scientists Jo Wathan Centre for Census and Survey Research University of Manchester.
Developing a Statistical Disclosure Standard for Europe Tanvi Desai LSE Research Laboratory Data Manager Research Laboratory IASSIST 2010: Cornell.
Eurostat M ODES OF ACCESS TO EU MICRODATA IN THE NEW LEGAL FRAMEWORK A LEKSANDRA BUJNOWSKA E UROSTAT S TATISTICAL OFFICE OF THE E UROPEAN U NION.
Development of Remote Access Systems Tanvi Desai LSE Research Laboratory Data Manager Research Laboratory IASSIST 2008: Stanford.
MOLLA HUNEGNAW STATISTICIAN AFRICAN CENTRE FOR STATISTICS ECASTATS.UNECA.ORG Confidentiality and Anonymization of Microdata 1 United Nations Regional Seminar.
Synthetic Data within the Risk – Utility Framework Keith Spicer Office for National Statistics.
Session 4. Panel session: How useful is the notion of “circle of trust” concept ? A vision for the future. Maurice Brandt Destatis Germany 2ND EUROPEAN.
Archiving and Sharing Confidential Data in the Social Sciences George Alter Director, ICPSR.
Metadata driven application for aggregation and tabular protection Andreja Smukavec SURS.
Regional Seminar on Census Data Archiving for Africa, Addis Ababa, Ethiopia, September 2011 Overview of Archiving of Microdata Session 4 United Nations.
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
Overview of 2002 CIPSEA: Methods to Protect Confidential Tabular Data Amrut Champaneri, Ph.D. U.S. Department of Transportation Bureau of Transportation.
Curating and Managing Research Data for Re-Use Confidential Data Management Jared Lyle.
JSM, Boston, August 8, 2014 Privacy, Big Data and The Public Good: Statistical Framework Stefan Bender (IAB)
Daniel Beckler United States Department of Agriculture National Agricultural Statistics Service Timothy Mulcahy NORC at the University of Chicago Topic.
1 Assessing the Impact of SDC Methods on Census Frequency Tables Natalie Shlomo Southampton Statistical Sciences Research Institute University of Southampton.
RESEARCH ETHICS AND DATA CONFIDENTALITY: ANONYMISATION AND ACCESS CONTROL ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…...
The use of protected microdata in tabulation: case of SDC-methods microaggregation and PRAM Researcher Janika Konnu Manchester, United Kingdom December.
Administrative procedures for microdata access at SURS October 2013.
2008 NCHS Data Users’ Conference Omni Shoreham Hotel Washington, DC Wednesday, August 13, 2008.
About the Secure Data Access For the academic research community in the UK Delivered by the UK Data Service/Archive Funded by the Economic and Social Research.
Creating Open Data whilst maintaining confidentiality Philip Lowthian, Caroline Tudor Office for National Statistics 1.
The views expressed herein are those of the author and should not necessarily be attributed to the IMF, its Executive Board, or its management Data Confidentiality,
ISO/IEC 27001:2013 Annex A.8 Asset management
STATE of EQUILIBRIUM: DATA USE and PRIVACY Jan A. Markowitz, PhD NAPHSIS NAPHSIS-VSCP JOINT MEETING Portland, Oregon June 8, 2004.
Michelle Simard Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality Tarragona, Spain, November 23 rd, 2011 Progress on Real Time Remote.
Security Methods for Statistical Databases. Introduction  Statistical Databases containing medical information are often used for research  Some of.
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Joint UNECE/Eurostat work session on statistical data confidentiality October 2015 Helsinki, Finland Circle of trust Maurice Brandt DESTATIS.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Researchers’ Usage of Microdata The example of Statistics Finland Advanced presentation – Some additional details Consultation Mission on Promoting the.
Social Science Data Management & Curation Jared Lyle January 13, 2014.
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
Social and Behavioral Science Data
Natalie Shlomo Social Statistics, School of Social Sciences
Development of UK Virtual Microdata Laboratory
Data Confidentiality and the Common Good.
Secure Data Laboratories: The U.S. Census Bureau Model
COMPUTER SECURITY CONCEPTS
Providing Access to Your Data: Handling sensitive data
UK Data Service Secure Lab
Measures for Information Loss in Protected Data
Information Security Seminar
Mcafee updates Mcafee antivirus uses a database of known virus definitions to identify malware and other threats on your computer system. So it is important.
Researcher Credentialing: A Proposed System for Improving Access to Restricted Data Margaret Levenstein with Linda Detterman, Peter Granda, Jared Lyle,
George Alter ICPSR Institute for Social Research
Remote access to confidential data
Item 2.2 of the Agenda Remote access to confidential data for researchers: possible actions under the 7th Framework Programme Pascal JACQUES Unit B 5 15.
Federal Statistical Office Germany Research Data Centre
HQ Expectations of DOE Site IRBs
Statistical Process Control
Open Data Sharing and its Statistical Limitations
Statistical Process Control
Presentation transcript:

Protecting Confidential Data George Alter ICPSR University of Michigan

Protecting Confidential Data Safe data: Modify the data to reduce the risk of re-identification Safe places: Physical isolation and secure technologies Safe people: Data use agreements and Training Safe outputs: Results are reviewed before being released to researchers Source: Ritchie, F. (2005) Access to business microdata in the UK: Dealing with the irreducible risks. In: Work session on statistical data confidentiality 2005, UNECE/Eurostat, Geneva, Switzerland, 9-11 November 2005.

Safe Data Removing identifiers Data masking Grouping values Top-coding Aggregating geographic areas Swapping values Suppressing unique cases Sampling within a larger data collection Adding “noise” Replacing real data with synthetic data Or, how do we Protect Waldo?

Safe Places Data Protection Plans Remote submission and execution Data recipients must explain how they will protect against unauthorized use, theft, loss, hacking, etc.? Remote submission and execution User submits program code or scripts, which are executed in a controlled environment Virtual data enclave Remote desktop technology prevents moving data to user’s local computer Physical enclave Users must travel to the data

Safe people Data Use Agreements Training in disclosure risks Parts of a data use agreement at ICPSR Research plan IRB approval Data protection plan Behavior rules Security pledge Institutional signature Training in disclosure risks

Safe outputs Controlled environments allow review of outputs Remote execution systems, Virtual data enclaves, Physical enclaves Disclosure checks may be automated, but manual review is usually necessary

Protecting Confidential Data Data protection has costs Modifying data affects analysis Access restrictions impose burdens on researchers Protection measures should be proportional to risks Probability that an individual can be (re-)identified Severity of harm resulting from re-identification

Thank you! George Alter altergc@umich.edu