Michelle Hayes Mary Joel Holin. Michael Roanhouse Julie Hovden. Special Thanks To. Disclaimer

Size: px
Start display at page:

Download "Michelle Hayes Mary Joel Holin. Michael Roanhouse Julie Hovden. Special Thanks To. Disclaimer"

Transcription

1 Further Understanding the Intersection of Technology and Privacy to Ensure and Protect Client Data Special Thanks To Michelle Hayes Mary Joel Holin We can provably know where domestic violence shelter clients have been without knowing who they are. privacy.cs.cmu.edu Latanya Sweeney, PhD Michael Roanhouse Julie Hovden Disclaimer The views and opinions in this presentation represent my own and are not necessarily those of HUD, Abt, or any affiliates (or my cat s or dog s). Known side effects include shock and applause. Privacy Technology 1.Example: tracking people 2.Example: anonymizing data 3.Example: distributed surveillance 4.Example: trails of dots 5.Example: learning who you know 6.Example: identity theft 7.Example: fingerprint capture 8.Example: bio-terrorism surveillance 9.Example: privacy-preserving surveillance 10.Example: DNA privacy 11.Example: Identity theft protections 12.Example: k-anonymity.example: webcam surveillance 14.Example: text de-identification 15.Example: face de-identification 16.Example: fraudulent Spam privacy.cs.cmu.edu And Technology Or Privacy Traditional Belief System This Work Privacy Question in this Work How can Shelters construct UIDs without risk of re-identification while still achieving an accurate unduplicated accounting? Usefulness This talk will examine old approaches and introduce a new solution with provable properties. Copyright (c) Dr. Sweeney. 1

2 This Talk 1. The Setting 2. Technology Survey 3. A Provable Privacy Solution The Big Goal Perform local unduplicated accountings of homeless visit patterns without identifying clients. privacy.cs.cmu.edu Homeless Management Information Systems (HMIS) Goal: a local unduplicated accounting of Client Visit Patterns Client1 Client2 Client3 Client4 1 2 HUD Client Personal Information Shelter Universal Data Elements HUD Aggregate Information Client5 Shelter3 Universal Data Elements Unique Identifier ( UID ) Name Social Security Number Date of Birth Ethnicity and Race Gender Veteran Status Disabling Condition Residence Prior to Program Entry Code of Last Permanent Address Program Entry Date Program Exit Date Unique Person Identification Number Program Identification Number Household Identification Number HUD Reporting (Sample) Question # AHAR Questions: Emergency Shelter -Individuals 1 How many people used emergency shelters at time? 2 What is the distribution of family sizes using emergency shelters? 3 What are the demographics of individuals using emergency shelters? 3 distribution by gender? 3 distribution by race and ethnicity? 3 distribution by age group? 3 distribution by household size? 3 distribution by veteran status? By disabling condition? 4 What was the living arrangement the night before entering the emergency shelter? 4 within/outside geographical jurisdiction? 5 What is distribution of the number of nights in an emergency shelter? 5 distribution by gender? 5 distribution by age group? Copyright (c) Dr. Sweeney. 2

3 Intimate Stalker Threat Knows detailed information about a targeted client Is highly motivated Can compromise a shelter or to find the location of the targeted client ( re-identification ) Threat Has lots of other information that may contain the client. Motivated to learn information about clients generally Link data on clients specifically ( re-identification ) Re-Identification occurs when explicit client identifiers (e.g., name or address) can be reasonably associated with the client s de-identified information. to Re-identify Clients Alice Personal Information Shelter 9/19/60 F 372 Alice Alice 9/19/60 1 Main St External Information 9/19/60 F 372 Alice to re-identify HMIS Data Ethnicity Visit date PIN Shelter ID Dataset Name Address ZIP Date Birth registered date Party Sex affiliation Date last voted Voter List L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine and Ethics. 1997, 25: County Town/ Place ZIP 5-digit Gender Re-identification Results 18.1% 0.04% % 58.4% 3.6% 0.04% 87.1% 3.7% 0.04% Date of Birth Mon/Yr Birth Year of Birth Copyright (c) Dr. Sweeney. 3

4 Thwarting Using re-identification analysis, we can quantify linking risks associated with data elements and make changes accordingly. We can thwart linking. Remainder of this talk assumes linking precautions done. Question in this Work How can Shelters construct UIDs without risk of re-identification while still achieving an accurate unduplicated accounting? This talk will examine old approaches and introduce a new solution with provable properties. This Talk 1. The Setting 2. Technology Survey 3. A Provable Privacy Solution Minimal Risk v. Provable Privacy Minimal risk technologies uses a combination of technology, practices and policy to show that there is a minimal re-identification risk. privacy.cs.cmu.edu Provable privacy technology provides guarantees against reidentification. Minimal Risk Technologies Technology Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November Copyright (c) Dr. Sweeney. 4

5 Concatenate parts of source information into a UID. Example: Using {date of birth, gender, ZIP} F372 Date of birth Sex ZIP Providing explicitly sensitive source information. Need to use non-sensitive source information. Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November UID based on part of the source information. Example: Using {date of birth, gender, ZIP} 8126r29ws 986s Must be strong Can be examined publicly. Fast to compute but infeasible to reverse. Problems with Consistent (1) If the same hash value is broadly used with Clients, then it may lead to reidentifications through linking. If the intimate stalker compromises a Shelter or the, the hashed UID could be learned and used to locate the targeted Client. Problems with Consistent (2) If the source information is SSN or demographics, then could re-identify all UIDs by exhaustively computing all UIDs. Dataset UID Social Security Number UID UID 8563 for try UID for try UID 072 for try UID for try UID for try Try Try Try Try Try Try Problems with Consistent (3) bits seconds Time to Exhaust Count (seconds) Number of Bits Size of source information matters. Exhaust all SSNs in 4 seconds! Copyright (c) Dr. Sweeney. 5

6 Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November Like hashing, but has a key to reverse result. Example: Using {date of birth, gender, ZIP} 8126r29ws 8126r29ws + key = 9/12/1960, F, 372 The person with the key can reveal the sensitive source information. Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November Scan Cards / RFID Tags Issue a card containing a UID to each client, who presents for service. Can be lost of given away! Example #57817 #57817 Should not contain personal information or Shelter information. Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November Use something always present with client and that typically does not change. Example: fingerprint 968c5z9 UID Fingerprints can often be linked to lawenforcement databases and re-identify clients. Copyright (c) Dr. Sweeney. 6

7 Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November Ask each client their permission to share data in exchange for services. Disclose uses of data and circumstances of sharing. They may say no. Identifiable information can be shared. Forwarding identifiable information is not good. Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November This Talk 1. The HMIS Setting 2. Technology Survey 3. A Provable Privacy Solution privacy.cs.cmu.edu Question in this Work How can Shelters construct UIDs without risk of re-identification while still achieving an accurate unduplicated accounting? This talk will examine old approaches and introduce a new solution with provable properties. The Big Idea in 3 Steps 1. Shelters assign UIDs. Client has same UID at same shelter, and different UID at other shelters. 2. Shelters securely ship data to Fedex UIDs and Universal Data Elements 3. and Shelters de-duplicate UIDs (described over next slides) Copyright (c) Dr. Sweeney. 7

8 UID Assignment Each Shelter has a private value. Each Client has a private value. Strong hashing is used to combine the Shelter and Client value to produce a UID for the client. De-Duplication Each Shelter re-hashes the UIDs from all other Shelters. All re-hashed values that are the same represent the same client. The Commutative Property of Strong Simplified Multiplication Example, 1 There exists strong hash functions that when all Shelters re-hash all UIDs, the re-hashed values will only be the same for Clients whose source information was the same. J. Benaloh and M. de Mare. One-way accumulators: a decentralized alternative to digital signatures. In Proceedings of Advances in Cryptology - EUROCRYPT '93, Lecture Notes in Computer Science, v 765, pages , Lofthus, Norway, Each Shelter has its own private value. Simplified Multiplication Example, 2 Simplified Multiplication Example, 3 3 Mult(, ) = Mult( 7, ) = 3 Mult(, ) = Mult( 7, ) = Multiply Client and Shelter private value to get UIDs. The stores UIDs of Clients from Shelter 1. Copyright (c) Dr. Sweeney. 8

9 Simplified Multiplication Example, 4 Simplified Multiplication Example, 5 3 Mult(, ) = 11 Mult(, ) = Multiply Client and Shelter private value to get UIDs. now knows there are 4 visits, but how many Clients? Simplified Multiplication Example, 6 Simplified Multiplication Example, 7 Mult(, )= 897 Mult(, ) = 3289 sends UIDs from Shelter 2 to Shelter 1 for re-hashing. stores the re-hashed values Simplified Multiplication Example, 8 Simplified Multiplication Example, 9 sends UIDs from Shelter 1 to Shelter 2 for rehashing Mult(, ) = 897 Mult(, ) = 2093 stores the re-hashed values Copyright (c) Dr. Sweeney. 9

10 Simplified Multiplication Example, 10 Simplified Multiplication Example, 11 Re-hashed values that are the same represent the same Client. Which are the same? The re-hashed value 897 appears twice. learns that Client at Shelter 1 is the same Client as at Shelter Learns Simplified Multiplication Example 3 Mult(, ) = 3 (3* * )* Client1 Client2 Completely Re-hashed UIDs (3 * ) * = 897 (3 * ) * = 897 (33 * ) * 897 Client3 3 Mult(, ) = 897 The Big Idea in 3 Steps 1. Shelters assign UIDs. Client has same UID at same shelter, and different UID at other shelters. 2. Shelters securely ship data to Fedex UIDs and Universal Data Elements 3. and Shelters de-duplicate UIDs Re-hash UIDs to reveal which UIDs belong to the same client. Note The UIDs are not to be used for any other purpose than this reporting and deduplication. Shelters use different private values at each reporting period. This results in different hashes for the same Clients over different reporting periods. Copyright (c) Dr. Sweeney. 10

11 A Provable Claim A Provable Claim Theorem. If the re-hashed values are the same, the Clients representing the original UIDs provided the same source information. A dictionary attack by the will not yield reliable reidentifications. Dataset UID Social Security Number UID UID 8563 for try UID for try UID 072 for try UID for try UID for try Try Try Try Try Try Try Client1 Client2 Client3 A Provable Claim Compromising a Shelter will not help the intimate stalker learn where a targeted Client is (or has been) at another Shelter. A Provable Claim Compromising the will not help the intimate stalker learn where a targeted Client is (or has been). Completely Re-hashed UIDs A Provable Claim Even if the pads the UIDs with known values, the does not learn the source information of Clients. b3s7 ghre Planning Office H2732 0yfh02 Planning Office Over the Limit If the intimate stalker compromises both the and a Shelter the targeted Client visited, the intimate stalker can learn the locations of all Shelters the Client visited. ax H2732 nw450 Copyright (c) Dr. Sweeney. 11

12 Technologies for HMIS This Distributed provable Query solution * ** ** ** * If compromise enough parties, can learn information. ** Shown is worst case, can be improved by source information selection. Question in this Work How can Shelters construct UIDs without risk of re-identification while still achieving an accurate unduplicated accounting? First, use strong hashing, inconsistently across Shelters to assign UIDs. Second, provide accounting information to the through a secure means. Then, have each Shelter re-hash the UIDs of all other Shelters, in turn, to de-duplicate UIDs. This Talk 1. The Setting 2. Technology Survey 3. A Provable Privacy Solution privacy.cs.cmu.edu latanya@privacy.cs.cmu.edu Copyright (c) Dr. Sweeney. 12

DEMONSTRATION OF A PRIVACY-PRESERVING SYSTEM THAT PERFORMS AN UNDUPLICATED ACCOUNTING OF SERVICES ACROSS HOMELESS PROGRAMS

DEMONSTRATION OF A PRIVACY-PRESERVING SYSTEM THAT PERFORMS AN UNDUPLICATED ACCOUNTING OF SERVICES ACROSS HOMELESS PROGRAMS DEMONSTRATION OF A PRIVACY-PRESERVING SYSTEM THAT PERFORMS AN UNDUPLICATED ACCOUNTING OF SERVICES ACROSS HOMELESS PROGRAMS by Latanya Sweeney, PhD Associate Professor of Computer Science, Technology and

More information

Now that you have an understanding of what will be covered in this module, let s review this module s learning objectives.

Now that you have an understanding of what will be covered in this module, let s review this module s learning objectives. Welcome to the Exhibit 1: Homeless Management Information Systems online training module. In this module, we will look at Forms 2A-2H, which cover the use of Homeless Management Information Systems, commonly

More information

SHELTER PROGRAMS DATA COMPLETENESS DETAIL REPORT

SHELTER PROGRAMS DATA COMPLETENESS DETAIL REPORT Overview: The core Emergency Shelter data completeness report has been updated. ESG HTS 2013 Provider Completeness Detail v 2.0 has been updated and renamed Shelter Programs Data Completeness Detail v

More information

HMIS Homeless Management Information System

HMIS Homeless Management Information System HMIS USER GUIDE HMIS Homeless Management Information System This guide includes step by step details on how to enter, exit and record information for clients in all programs. Kings Tulare Homeless Alliance

More information

Data Quality Monitoring Plan and Report Instructions and User Guide

Data Quality Monitoring Plan and Report Instructions and User Guide Data Quality Monitoring Plan and Report Instructions and User Guide Beginning 7/1/12, parts of the Data Quality Monitoring Plan were implemented including timeliness and Completeness. Starting 10/1/2012,

More information

Connect To Home Eastern PA CoC Coordinated Entry System HMIS Guide

Connect To Home Eastern PA CoC Coordinated Entry System HMIS Guide Connect To Home Eastern PA CoC Coordinated Entry System HMIS Guide Updated: February 2018 1 P a g e Table of Contents Introduction... 4 Training Class... 4 Workgroup... 4 Coordinated Entry Process... 4

More information

GUIDE FOR RECORDING A MULTI-PERSON HOUSEHOLD ENTRY INTO SERVICEPOINT. Version 2.0

GUIDE FOR RECORDING A MULTI-PERSON HOUSEHOLD ENTRY INTO SERVICEPOINT. Version 2.0 GUIDE FOR RECORDING A MULTI-PERSON HOUSEHOLD ENTRY INTO SERVICEPOINT Version 2.0 Guide for Recording a Multi-Person Household Entry into ServicePoint Service Provider Type: ALL Entry Type: Multi-Person

More information

State Grant in Aid (SGIA) Program - SP5 Entry/Exit Workflow using ClientPoint (Families)

State Grant in Aid (SGIA) Program - SP5 Entry/Exit Workflow using ClientPoint (Families) This document provides instructions for entering the following information into HMIS using the ServicePoint 5 software: Entering each family member s information into your agency s program for the first

More information

Homeless Management Information System (HMIS)

Homeless Management Information System (HMIS) Mid-America Regional Council 600 Broadway, Suite 200 Kansas City, Missouri 64105 (816)474-4240 Kcmetrohmis.org Homeless Management Information System (HMIS) Data Quality Plan Kansas City Metro-Jackson,

More information

ART Gallery Report 0632 HUD Dedicated HMIS Annual Performance Report (HMIS APR)

ART Gallery Report 0632 HUD Dedicated HMIS Annual Performance Report (HMIS APR) 0632 HUD Dedicated HMIS Annual Performance Report (HMIS APR) EXECUTIVE SUMMARY This ART Gallery report has been created to facilitate the extraction of data from ServicePoint for the completion of questions

More information

Attendees: See Attached Sign-in Sheet. Introductions & Agenda Review. Notes are also available online for review,

Attendees: See Attached Sign-in Sheet. Introductions & Agenda Review. Notes are also available online for review, HMIS Agency Data Administrator Training Friday, July 28 1:00 pm 2:30 pm 421 N County Farm Rd. Wheaton, IL Conference Room 3500B Presenters: Julie Tremberth and Mike Conwood Attendees: See Attached Sign-in

More information

or

or Complete, Copy and Paste the Pre-application to your email, email back to the following email addresses: Paul@massaccountyhousing.org or Jamie@massaccountyhousing.org Massac County Housing Authority Pre-Application

More information

HUD Data Quality Report

HUD Data Quality Report HUD Data Quality Report This report analyzes HMIS data and identifies errors and collection deficiencies based on the guidelines of the 2017 HMIS Data Standards Manual. Generating the HUD Data Quality

More information

HELP MANAGEMENT INFORMATION SYSTEM Monterey-San Benito Counties Continuum of Care March 2015

HELP MANAGEMENT INFORMATION SYSTEM Monterey-San Benito Counties Continuum of Care March 2015 1 HELP MANAGEMENT INFORMATION SYSTEM Monterey-San Benito Counties Continuum of Care March 2015 HMIS 5.11 workflow Adding New Clients Community Technology Alliance 1671 The Alameda Suite 300 San José, CA

More information

NEBRASKA BOS AND LINCOLN ALL DOORS LEAD HOME HMIS Coordinated Entry and Referral Process

NEBRASKA BOS AND LINCOLN ALL DOORS LEAD HOME HMIS Coordinated Entry and Referral Process NEBRASKA BOS AND LINCOLN ALL DOORS LEAD HOME HMIS Coordinated Entry and Referral Process Nebraska has implemented a streamlined process for referring and enrolling participants into housing programs. A

More information

2017 PIT Summary: Jefferson County

2017 PIT Summary: Jefferson County A Point-in-Time (PIT) count provides a snapshot of homelessness by interviewing those who are homeless at a particular time. The Metropolitan Denver Homeless Initiative (MDHI) conducted a PIT study of

More information

HMIS 5.12 workflow Adding New CHAMP Clients

HMIS 5.12 workflow Adding New CHAMP Clients 1 HELP MANAGEMENT INFORMATION SYSTEM Santa Cruz County Continuum of Care April 2016 HMIS 5.12 workflow Adding New CHAMP Clients Community Technology Alliance 1671 The Alameda Suite 300 San José, CA 95126

More information

HMIS Street Outreach Projects

HMIS Street Outreach Projects HMIS Street Outreach Projects Riverside County DPSS ASD HPU October 2016 Page 1 Table of Contents HMIS Introduction... 4 Universal Data Elements... 4 HMIS Workstation Security Procedures... 6 Data Timeliness

More information

2017 PIT Summary: Boulder County

2017 PIT Summary: Boulder County A Point-in-Time (PIT) count provides a snapshot of homelessness by interviewing those who are homeless at a particular time. The Metropolitan Denver Homeless Initiative (MDHI) conducted a PIT study of

More information

HMIS Emergency Shelter Projects

HMIS Emergency Shelter Projects HMIS Emergency Shelter Projects Riverside County DPSS ASD HPU December 2016 Page 1 Table of Contents HMIS Introduction... 4 Universal Data Elements... 4 HMIS Workstation Security Procedures... 6 Data Timeliness

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

USER GUIDE. Homelessness Data Exchange (HDX), Version 2.0 BETA TEST VERSION. June, U.S. Department of Housing and Urban Development

USER GUIDE. Homelessness Data Exchange (HDX), Version 2.0 BETA TEST VERSION. June, U.S. Department of Housing and Urban Development Homelessness Data Exchange (HDX), Version 2.0 USER GUIDE BETA TEST VERSION June, 2018 U.S. Department of Housing and Urban Development 1 Table of Contents Introduction... 3 Log into the site... 3 Reset

More information

General Social Survey (GSS) NORC

General Social Survey (GSS) NORC General Social Survey (GSS) NORC OBTAINING GSS SENSITIVE DATA FILES The GSS geographic identification code files are made available to researchers under special contract with NORC. The GSS takes its promise

More information

HMIS Agency Administrators Meeting. January 4, 2018

HMIS Agency Administrators Meeting. January 4, 2018 HMIS Agency Administrators Meeting January 4, 2018 Agenda 1. CoC / Coordinated Assessment / UPLIFT Updates 2. Two Factor Authentication 3. Client Privacy Recertification 4. Housing Inventory Count (HIC)

More information

DATA QUALITY Information Session

DATA QUALITY Information Session DATA QUALITY Information Session 5/7/2014 Data Quality 1 Overview Data Quality Plan Agenda HMIS P&P Participation Required Data Elements Program Descriptor, Universal, & Program-Specific Data Collection

More information

Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University

Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy Xiaokui Xiao Nanyang Technological University Outline Privacy preserving data publishing: What and Why Examples of privacy attacks

More information

The New RoI. Effective 1 November 2014

The New RoI. Effective 1 November 2014 The New RoI Effective 1 November 2014 *You will need a copy of the new RoI to follow along with this training. If you do not have one at this time go to Austinecho.org to download and print it off. You

More information

HMIS Data Standards Critical Changes 2015

HMIS Data Standards Critical Changes 2015 HMIS Data Standards Critical Changes 2015 This document is solely for the use of persons holding a current Bowman Systems ServicePoint user license.. It contains information that may be considered the

More information

Uploading Youth Data: How To Collect & Upload RHY Data in HMIS

Uploading Youth Data: How To Collect & Upload RHY Data in HMIS Uploading Youth Data: How To Collect & Upload RHY Data in HMIS RHY Grantee Webinar October 26, 2017 Today s Webinar Webinar will Third last levelunder 60 minutes and is prerecorded. Submit questions to

More information

ServicePoint June, 2011

ServicePoint June, 2011 ServicePoint 5.4.1 June, 2011 Table of Contents Workflow for ServicePoint... 3 Introduction... 4 Logon to ServicePoint... 4 Key Features of the Home Screen... 5 Searching for an Existing Client... 7 Adding

More information

Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):

Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ): Privacy Policy Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ): visit any websites or mobile sites offered by Startup

More information

Synthetic Data. Michael Lin

Synthetic Data. Michael Lin Synthetic Data Michael Lin 1 Overview The data privacy problem Imputation Synthetic data Analysis 2 Data Privacy As a data provider, how can we release data containing private information without disclosing

More information

Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples

Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples Muhammad Eka WIJAYA Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples How to Address Privacy in Ubiquitous Work Understand Application Define Problem Know Tools 2

More information

HUD Data Clean-Up Guide Using the 0640 HUD Data Quality Framework Report

HUD Data Clean-Up Guide Using the 0640 HUD Data Quality Framework Report This guide is a tool to help assist you with understanding the ART 0640 Report so that project data can be reviewed, verified, corrected, and ready for all HUD submissions! REPORT: ART < Public Folder

More information

HMIS Guide to the CSV APR HMIS End User Resource

HMIS Guide to the CSV APR HMIS End User Resource 2018 HMIS Guide to the CSV APR HMIS End User Resource This guide demonstrates how to run the CSV-APR Export and upload it into SAGE. This guide also reviews the data quality errors, which are identified

More information

Santa Barbara County Continuum of Care

Santa Barbara County Continuum of Care HELP MANAGEMENT INFORMATION SYSTEM Santa Barbara Adding New Clients Workflow 1 Santa Barbara County Continuum of Care February 2018 HMIS 5.12 workflow Adding New Clients Community Technology Alliance 1080

More information

ServicePoint HMIS Entry/Exit Quick Reference Card (non HPRP)

ServicePoint HMIS Entry/Exit Quick Reference Card (non HPRP) ServicePoint HMIS Entry/Exit Quick Reference Card (non HPRP) Login to ServicePoint 1. On your PC s desktop, double-click either the Internet Explorer browser icon or the Firefox icon. The browser s default

More information

Data Anonymization. Graham Cormode.

Data Anonymization. Graham Cormode. Data Anonymization Graham Cormode graham@research.att.com 1 Why Anonymize? For Data Sharing Give real(istic) data to others to study without compromising privacy of individuals in the data Allows third-parties

More information

Marin HMIS Online. Introduction to using the Client Services Network

Marin HMIS Online. Introduction to using the Client Services Network Marin HMIS Online Introduction to using the Client Services Network First time logging into the system To enter the system go to https://www.clientservicesnetwork.com/csnmarinca/ Click on Login. The Login

More information

COC APR Finding and Fixing Data Quality Errors

COC APR Finding and Fixing Data Quality Errors COC APR Finding and Fixing Data Quality Errors The new COC APR is now available (April 1, 2017). The new report: Has been formatted into a canned report found on the Reports Tab Utilized for projects with

More information

Eagles Charitable Foundation Privacy Policy

Eagles Charitable Foundation Privacy Policy Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and

More information

Miami-Dade County Homeless Trust Homeless Management Information System (HMIS) Data Quality Standards. Miami-Dade County Continuum of Care (CoC)

Miami-Dade County Homeless Trust Homeless Management Information System (HMIS) Data Quality Standards. Miami-Dade County Continuum of Care (CoC) Miami-Dade County Homeless Trust Homeless Management Information System (HMIS) Data Quality Standards Miami-Dade County Continuum of Care (CoC) DRAFT April 2017 Miami-Dade County Homeless Trust Homeless

More information

PERTS Default Privacy Policy

PERTS Default Privacy Policy PERTS Default Privacy Policy Version 1.3 2017-07-15 About PERTS PERTS is a center at Stanford University that helps educators apply evidence-based strategies in order to increase student engagement and

More information

Privacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich

Privacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich Privacy-Enhancing Technologies & Applications to ehealth Dr. Anja Lehmann IBM Research Zurich IBM Research Zurich IBM Research founded in 1945 employees: 3,000 12 research labs on six continents IBM Research

More information

Preserving Data Privacy in the IoT World

Preserving Data Privacy in the IoT World MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu

More information

Survey Result on Privacy Preserving Techniques in Data Publishing

Survey Result on Privacy Preserving Techniques in Data Publishing Survey Result on Privacy Preserving Techniques in Data Publishing S.Deebika PG Student, Computer Science and Engineering, Vivekananda College of Engineering for Women, Namakkal India A.Sathyapriya Assistant

More information

B. We may offer you the opportunity to submit other information about yourself (such as gender, age, occupation, hobbies, interests, zip code, etc.

B. We may offer you the opportunity to submit other information about yourself (such as gender, age, occupation, hobbies, interests, zip code, etc. DELANCEYPLACE.COM LLC PRIVACY POLICY DELANCEYPLACE.COM, LLC and its affiliates ( DelanceyPlace, we or us ) operate a website and related social network along with all related applications, software, daily

More information

Coalition of Homeless Services Providers Martinez Hall th Street Marina, CA Facebook.

Coalition of Homeless Services Providers Martinez Hall th Street Marina, CA Facebook. Coalition of Homeless Services Providers Martinez Hall 220 12 th Street Marina, CA 93933 www.chspmontereycounty.org Facebook.com/CHSPMontry2 1 2 3 0252- All Inclusive 0252a- Without Outreach 0252b- Outreach

More information

I. INFORMATION WE COLLECT

I. INFORMATION WE COLLECT PRIVACY POLICY USIT PRIVACY POLICY Usit (the Company ) is committed to maintaining robust privacy protections for its users. Our Privacy Policy ( Privacy Policy ) is designed to help you understand how

More information

PRIVACY STATEMENT. Effective Date 11/01/17.

PRIVACY STATEMENT. Effective Date 11/01/17. PRIVACY STATEMENT Effective Date 11/01/17. PREMIER Bankcard, LLC. [hereinafter referred to as our, us, or we ] is committed to advising you of the right to your privacy, and strives to provide a safe and

More information

2014 HMIS DATA STANDARDS AWARENESS. Timeline, Revision Process, and Major Changes

2014 HMIS DATA STANDARDS AWARENESS. Timeline, Revision Process, and Major Changes 2014 HMIS DATA STANDARDS AWARENESS Timeline, Revision Process, and Major Changes Agenda 2014 HMIS Data Standards Implementation Timeline Revision Process Overview of Key Changes Next Steps HMIS Data Standards

More information

EnviroIssues Privacy Policy Effective Date:

EnviroIssues Privacy Policy Effective Date: EnviroIssues Privacy Policy Effective Date: 9-28-18 EnviroIssues, Inc. ( we, us, our ) is committed to protecting the privacy of visitors to its website and users of its services (each a Service and collectively

More information

GRANDSTREAM PRIVACY STATEMENT

GRANDSTREAM PRIVACY STATEMENT GRANDSTREAM PRIVACY STATEMENT This Privacy Statement governs how Grandstream Networks, Inc. and its affiliates ( Grandstream, us, our or we ) may collect, use, and disclose information that we obtain through

More information

In this unit we are continuing our discussion of IT security measures.

In this unit we are continuing our discussion of IT security measures. 1 In this unit we are continuing our discussion of IT security measures. 2 One of the best security practices in Information Security is that users should have access only to the resources and systems

More information

To respond to your inquiries and fulfill your requests, such as to send you newsletters or publications that you request.

To respond to your inquiries and fulfill your requests, such as to send you newsletters or publications that you request. Last updated: May 5, 2017 SJL Attorney Search, LLC is committed to protecting your privacy. This Privacy Policy describes our practices in connection with information that we collect through our website

More information

Page 1 of 6 SURVEY: PROJECT TECH

Page 1 of 6 SURVEY: PROJECT TECH SURVEY: PROJECT TECH Case managers: Thank you for working with us to administer the survey. Please read each question as it is written. Instructions for you are written in italics. Information that you

More information

NESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE

NESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE PRIVACY NOTICE Nestlé Purina Petcare Limited (hereinafter referred to as Nestlé ) is committed to safeguarding your privacy and ensuring that you continue to trust Nestlé with your personal data. When

More information

The Table Privacy Policy Last revised on August 22, 2012

The Table Privacy Policy Last revised on August 22, 2012 The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy )

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Introduction This Policy applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers ("Site"), which

More information

Breach Notification Form

Breach Notification Form Breach Notification Form Report a breach of personal data to the Data Protection Commission Use this form if you are a Data Controller that wishes to contact us to report a personal data breach that has

More information

Authentication SPRING 2018: GANG WANG. Slides credit: Michelle Mazurek (U-Maryland) and Blase Ur (CMU)

Authentication SPRING 2018: GANG WANG. Slides credit: Michelle Mazurek (U-Maryland) and Blase Ur (CMU) Authentication SPRING 2018: GANG WANG Slides credit: Michelle Mazurek (U-Maryland) and Blase Ur (CMU) Passwords, Hashes, Salt Password database Username Plaintext Password Not a good idea to store plaintext

More information

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your

More information

Veteran By-Name List

Veteran By-Name List Veteran By-Name List ServicePoint Handbook CONTENTS REVISION HISTORY... 2 SURVEYING VETERANS EXPERIENCING HOMELESSNESS... 3 VETERAN BY-NAME LIST WORKFLOW... 4 1. CLIENT SEARCH/CREATE NEW RECORD... 5 2.

More information

IGN.COM - PRIVACY POLICY

IGN.COM - PRIVACY POLICY Effective May 31, 2011 Summary of the IGN Entertainment, Inc.'s Privacy Policy: 1. INTRODUCTION - The Introduction identifies the basic IGN Services covered by this Privacy Policy and provides a brief

More information

ART Reporting Everything you ever wanted to know (well, some of it) Clif Graves - Thursday, September 17, 2015

ART Reporting Everything you ever wanted to know (well, some of it) Clif Graves - Thursday, September 17, 2015 ART Reporting Everything you ever wanted to know (well, some of it) Clif Graves - Thursday, September 17, 2015 1 ART Reporting Everything This 1 hour webinar will cover a lot of ground. A refresher on

More information

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY Cookeville Communications Media is committed to maintaining robust privacy protections for its users. Our privacy policy is designed to help you

More information

Cognizant Careers Portal Privacy Policy ( Policy )

Cognizant Careers Portal Privacy Policy ( Policy ) Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers

More information

Online Privacy Notice

Online Privacy Notice Online Privacy Notice The National Foundation for Credit Counseling, Inc. (referred to as NFCC, we, or us ) respects your privacy and is committed to maintaining and using your information responsibly.

More information

Privacy Policy Identity Games

Privacy Policy Identity Games Document Name: Privacy Policy Reference: GDPR 1.0 This privacy policy was last modified on 26 July, 2018. Privacy Policy Identity Games In this policy, "we", "us" and "our" refer to Identity Games International

More information

Privacy Policy. I. How your information is used. Registration and account information. March 3,

Privacy Policy. I. How your information is used. Registration and account information. March 3, Privacy Policy This Privacy Policy describes how and when we collect, use and share your information across our App. When using our App you consent to the collection, transfer, storage, disclosure, and

More information

TERMS AND CONDITIONS OF USE FOR THE WEBSITE This version is valid as from 1 October 2013.

TERMS AND CONDITIONS OF USE FOR THE WEBSITE This version is valid as from 1 October 2013. TERMS AND CONDITIONS OF USE FOR THE WEBSITE This version is valid as from 1 October 2013. I. GENERAL TERMS AND CONDITIONS OF USE 1. Applicability The website http://www.stubbetobacco.com (hereinafter referred

More information

UNTITLED HIP HOP PROJECT Privacy Policy. 1. Introduction

UNTITLED HIP HOP PROJECT Privacy Policy. 1. Introduction UNTITLED HIP HOP PROJECT Privacy Policy 1. Introduction This site ( Site ) is operated by etribez Inc. on behalf of JCE Games, Inc. ( Producer ) to accept, process and administer online auditions and other

More information

PRIVACY POLICY. 3.1 This policy does not apply to the collection, holding, use or disclosure of personal information that is an employee record.

PRIVACY POLICY. 3.1 This policy does not apply to the collection, holding, use or disclosure of personal information that is an employee record. 1. Introduction 1.1 From time to time Business & Risk Solutions Pty Ltd ("the Company") is required to collect, hold, use and/or disclose personal information relating to individuals (including, but not

More information

Emerging Measures in Preserving Privacy for Publishing The Data

Emerging Measures in Preserving Privacy for Publishing The Data Emerging Measures in Preserving Privacy for Publishing The Data K.SIVARAMAN 1 Assistant Professor, Dept. of Computer Science, BIST, Bharath University, Chennai -600073 1 ABSTRACT: The information in the

More information

Healthfirst Website Privacy Policy

Healthfirst Website Privacy Policy Healthfirst Website Privacy Policy We value your relationship with us and have detailed our privacy objectives for our website below. Please be sure to read this notice as it covers the terms and conditions

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

Share Care. Consumer Search 11/24/2015 1

Share Care. Consumer Search 11/24/2015 1 Share Care Consumer Search 1 Searching for Consumers in Share Care When searching for consumers it is best to use either their date of birth or social security number. The consumer name may not be spelled

More information

Survey of k-anonymity

Survey of k-anonymity NATIONAL INSTITUTE OF TECHNOLOGY ROURKELA Survey of k-anonymity by Ankit Saroha A thesis submitted in partial fulfillment for the degree of Bachelor of Technology under the guidance of Dr. K. S. Babu Department

More information

Presenter: Terry Schoonover Author: Terry Schoonover. Summary:

Presenter: Terry Schoonover Author: Terry Schoonover. Summary: Presenter: Terry Schoonover Author: Terry Schoonover Summary: This document will step through the process of submitting an electronic application for Permanent Supportive Housing through the use of ProviderConnect.

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

Privacy Policy GENERAL

Privacy Policy GENERAL Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill

More information

Zero-Knowledge Proof and Authentication Protocols

Zero-Knowledge Proof and Authentication Protocols Zero-Knowledge Proof and Authentication Protocols Ben Lipton April 26, 2016 Outline Background Zero-Knowledge Proofs Zero-Knowledge Authentication History Example Protocols Guillou-Quisquater Non-zero-knowledge

More information

Identifying and Preventing Conditions for Web Privacy Leakage

Identifying and Preventing Conditions for Web Privacy Leakage Identifying and Preventing Conditions for Web Privacy Leakage Craig E. Wills Computer Science Department Worcester Polytechnic Institute Worcester, MA 01609 1 Position Statement Beyond tracking and proposals

More information

Section 6. Registering a New Voter 5/11/2018

Section 6. Registering a New Voter 5/11/2018 57 Section 6 Registering a New Voter Registering a New Voter 58 When a voter cannot be found after numerous voter search attempts, the voter must complete a Colorado Voter Registration Form to register

More information

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology 364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by

More information

A Disclosure Avoidance Research Agenda

A Disclosure Avoidance Research Agenda A Disclosure Avoidance Research Agenda presented at FCSM research conf. ; Nov. 5, 2013 session E-3; 10:15am: Data Disclosure Issues Paul B. Massell U.S. Census Bureau Center for Disclosure Avoidance Research

More information

Stanislaus County HMIS Security & Data Quality Audit

Stanislaus County HMIS Security & Data Quality Audit Data Collection Agency is using the correct, updated HMIS Intake, Update, & Exit Forms? HMIS Intake, Update, & Exit Forms are completed properly? Agency is collecting all Universal Data Elements? (Name,

More information

Privacy Policy. When you create an account or use our Service, we collect the following types of information from you:

Privacy Policy. When you create an account or use our Service, we collect the following types of information from you: Privacy Policy Last updated: 24 th July, 2017 Welcome to Kwalee.com (the Site ), provided by Kwalee Ltd. ( Kwalee ). This Kwalee.com Privacy Policy ( Policy ) describes the information we gather from you

More information

Technology Safety Quick Tips

Technology Safety Quick Tips Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,

More information

Provider Configuration

Provider Configuration Wilder Research Minnesota s Homeless Management Information System (HMIS) Provider Configuration System Administration 194 Wilder Research The Provider Tabs covered in this training include: Provider Profile

More information

Big Dogs Big Hearts Rescue Inc. Foster Application

Big Dogs Big Hearts Rescue Inc. Foster Application Big Dogs Big Hearts Rescue Inc. Foster Application Date: Name: Address: City: State: Zip: Day Phone: ( ) Evening Phone: ( ) Cell Phone: ( ) Email address: @ Applying for: ( ) Temporary foster (i.e. pull

More information

OnlineNIC PRIVACY Policy

OnlineNIC PRIVACY Policy OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom

More information

CENTRAL INTAKE. AES Central Intake User Guide. AES University Manual. Adaptive Enterprise Solutions

CENTRAL INTAKE. AES Central Intake User Guide. AES University Manual. Adaptive Enterprise Solutions CENTRAL INTAKE AES Central Intake User Guide AES University Manual Adaptive Enterprise Solutions 8401 Colesville Road Suite 450 Silver Spring, MD 20910 800.237.9785 Toll Free 301.589.3434 Voice 301.589.9254

More information

Privacy Policy Manhattan Neighborhood Network Policies 2017

Privacy Policy Manhattan Neighborhood Network Policies 2017 Privacy Policy Manhattan Neighborhood Network Policies 2017 Table of Contents Manhattan Neighborhood Network Policies 3 MNN s Privacy Policy 3 Information Collection, Use and Sharing 4 Your Access to and

More information

2. What is Personal Information and Non-Personally Identifiable Information?

2. What is Personal Information and Non-Personally Identifiable Information? Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location

More information

Fooji Code of Conduct

Fooji Code of Conduct Fooji Code of Conduct In order to protect the experience of the Fooji fans and employees, there are some limitations on the type of content and behavior that we allow. These limitations are set forth in

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information