This article has been reviewed according to Science X's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

trusted source

proofread

De-identifying government datasets: Techniques and governance

De-identifying government datasets: Techniques and governance
Altman’s “modern approach to privacy-aware government data releases.” Credit: NIST (2023). DOI: 10.6028/NIST.SP.800-188

NIST has published Special Publication (SP) 800-188, De-Identifying Government Datasets: Techniques and Governance.

De-identification removes identifying information from a data set so that the remaining data cannot be linked to specific individuals. Government agencies can use de-identification to reduce the privacy risks associated with collecting, processing, archiving, distributing, or publishing government data.

Previously, NIST published NIST Internal Report (IR) 8053, De-Identification of Personal Information, which provided a survey of de-identification and re-identification techniques. SP 800-188 provides specific guidance to that wish to use de-identification.

This final document was authored by at NIST and the U.S. Census Bureau and references up-to-date research and practices for both traditional de-identification approaches as well as the use of formal privacy methods, such as differential privacy to create de-identified datasets.

This document also addresses other approaches for making datasets that contain available to researchers and for public transparency. Where appropriate, this document cautions users about the inherent limitations of traditional de-identification approaches when compared to formal privacy methods, such as differential privacy.

More information: Simson Garfinkel, De-Identifying Government Datasets, NIST (2023). DOI: 10.6028/NIST.SP.800-188

Citation: De-identifying government datasets: Techniques and governance (2023, September 15) retrieved 1 May 2024 from https://techxplore.com/news/2023-09-de-identifying-datasets-techniques.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

Crowdsourcing challenge to de-identify public safety data sets

0 shares

Feedback to editors