What are privacy enhancing technologies (PETs), how are they used, and who uses them? Fintech Policy Advisor Kaitlin Asrow shares her thoughts about these emerging technologies and why they matter: sffed.us/3wbty1G
#Fintech #DataProtection #DataSecurity #Cybersecurity
"It's important to note that these systems, processes, and techniques do not ensure privacy
or compliance on their own. PETs are a tool that can be used in tandem with governance and operation systems."
#Fintech #DataProtection #DataSecurity #Cybersecurity
“Examples of PETs used directly by people include privacy-protected browsers or even privacy screen shields.”
#Fintech #DataProtection #DataSecurity #Cybersecurity
PETs have the potential to enable both greater security and confidentiality of data across use cases. Kaitlin Asrow dives into a few examples #deidentification and how they work.
#Fintech #DataProtection #DataSecurity #Cybersecurity
“[Anonymization is] one of the original privacy-preserving techniques. Unfortunately, it has become relatively insecure because you can recombine data sets and therefore piece together the information that was removed.”
#Fintech #DataProtection #DataSecurity #Cybersecurity
“Pseudonymization is another form of deidentification, which replaces, instead of removing, a data element, such as an identifier, with a non-sensitive equivalent... Instead of my birthday, a random date could be used.”
#Fintech #DataProtection #DataSecurity #Cybersecurity
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.