Michelle Hayes Mary Joel Holin. Michael Roanhouse Julie Hovden. Special Thanks To. Disclaimer
|
|
- Alexia Martin
- 6 years ago
- Views:
Transcription
1 Further Understanding the Intersection of Technology and Privacy to Ensure and Protect Client Data Special Thanks To Michelle Hayes Mary Joel Holin We can provably know where domestic violence shelter clients have been without knowing who they are. privacy.cs.cmu.edu Latanya Sweeney, PhD Michael Roanhouse Julie Hovden Disclaimer The views and opinions in this presentation represent my own and are not necessarily those of HUD, Abt, or any affiliates (or my cat s or dog s). Known side effects include shock and applause. Privacy Technology 1.Example: tracking people 2.Example: anonymizing data 3.Example: distributed surveillance 4.Example: trails of dots 5.Example: learning who you know 6.Example: identity theft 7.Example: fingerprint capture 8.Example: bio-terrorism surveillance 9.Example: privacy-preserving surveillance 10.Example: DNA privacy 11.Example: Identity theft protections 12.Example: k-anonymity.example: webcam surveillance 14.Example: text de-identification 15.Example: face de-identification 16.Example: fraudulent Spam privacy.cs.cmu.edu And Technology Or Privacy Traditional Belief System This Work Privacy Question in this Work How can Shelters construct UIDs without risk of re-identification while still achieving an accurate unduplicated accounting? Usefulness This talk will examine old approaches and introduce a new solution with provable properties. Copyright (c) Dr. Sweeney. 1
2 This Talk 1. The Setting 2. Technology Survey 3. A Provable Privacy Solution The Big Goal Perform local unduplicated accountings of homeless visit patterns without identifying clients. privacy.cs.cmu.edu Homeless Management Information Systems (HMIS) Goal: a local unduplicated accounting of Client Visit Patterns Client1 Client2 Client3 Client4 1 2 HUD Client Personal Information Shelter Universal Data Elements HUD Aggregate Information Client5 Shelter3 Universal Data Elements Unique Identifier ( UID ) Name Social Security Number Date of Birth Ethnicity and Race Gender Veteran Status Disabling Condition Residence Prior to Program Entry Code of Last Permanent Address Program Entry Date Program Exit Date Unique Person Identification Number Program Identification Number Household Identification Number HUD Reporting (Sample) Question # AHAR Questions: Emergency Shelter -Individuals 1 How many people used emergency shelters at time? 2 What is the distribution of family sizes using emergency shelters? 3 What are the demographics of individuals using emergency shelters? 3 distribution by gender? 3 distribution by race and ethnicity? 3 distribution by age group? 3 distribution by household size? 3 distribution by veteran status? By disabling condition? 4 What was the living arrangement the night before entering the emergency shelter? 4 within/outside geographical jurisdiction? 5 What is distribution of the number of nights in an emergency shelter? 5 distribution by gender? 5 distribution by age group? Copyright (c) Dr. Sweeney. 2
3 Intimate Stalker Threat Knows detailed information about a targeted client Is highly motivated Can compromise a shelter or to find the location of the targeted client ( re-identification ) Threat Has lots of other information that may contain the client. Motivated to learn information about clients generally Link data on clients specifically ( re-identification ) Re-Identification occurs when explicit client identifiers (e.g., name or address) can be reasonably associated with the client s de-identified information. to Re-identify Clients Alice Personal Information Shelter 9/19/60 F 372 Alice Alice 9/19/60 1 Main St External Information 9/19/60 F 372 Alice to re-identify HMIS Data Ethnicity Visit date PIN Shelter ID Dataset Name Address ZIP Date Birth registered date Party Sex affiliation Date last voted Voter List L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine and Ethics. 1997, 25: County Town/ Place ZIP 5-digit Gender Re-identification Results 18.1% 0.04% % 58.4% 3.6% 0.04% 87.1% 3.7% 0.04% Date of Birth Mon/Yr Birth Year of Birth Copyright (c) Dr. Sweeney. 3
4 Thwarting Using re-identification analysis, we can quantify linking risks associated with data elements and make changes accordingly. We can thwart linking. Remainder of this talk assumes linking precautions done. Question in this Work How can Shelters construct UIDs without risk of re-identification while still achieving an accurate unduplicated accounting? This talk will examine old approaches and introduce a new solution with provable properties. This Talk 1. The Setting 2. Technology Survey 3. A Provable Privacy Solution Minimal Risk v. Provable Privacy Minimal risk technologies uses a combination of technology, practices and policy to show that there is a minimal re-identification risk. privacy.cs.cmu.edu Provable privacy technology provides guarantees against reidentification. Minimal Risk Technologies Technology Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November Copyright (c) Dr. Sweeney. 4
5 Concatenate parts of source information into a UID. Example: Using {date of birth, gender, ZIP} F372 Date of birth Sex ZIP Providing explicitly sensitive source information. Need to use non-sensitive source information. Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November UID based on part of the source information. Example: Using {date of birth, gender, ZIP} 8126r29ws 986s Must be strong Can be examined publicly. Fast to compute but infeasible to reverse. Problems with Consistent (1) If the same hash value is broadly used with Clients, then it may lead to reidentifications through linking. If the intimate stalker compromises a Shelter or the, the hashed UID could be learned and used to locate the targeted Client. Problems with Consistent (2) If the source information is SSN or demographics, then could re-identify all UIDs by exhaustively computing all UIDs. Dataset UID Social Security Number UID UID 8563 for try UID for try UID 072 for try UID for try UID for try Try Try Try Try Try Try Problems with Consistent (3) bits seconds Time to Exhaust Count (seconds) Number of Bits Size of source information matters. Exhaust all SSNs in 4 seconds! Copyright (c) Dr. Sweeney. 5
6 Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November Like hashing, but has a key to reverse result. Example: Using {date of birth, gender, ZIP} 8126r29ws 8126r29ws + key = 9/12/1960, F, 372 The person with the key can reveal the sensitive source information. Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November Scan Cards / RFID Tags Issue a card containing a UID to each client, who presents for service. Can be lost of given away! Example #57817 #57817 Should not contain personal information or Shelter information. Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November Use something always present with client and that typically does not change. Example: fingerprint 968c5z9 UID Fingerprints can often be linked to lawenforcement databases and re-identify clients. Copyright (c) Dr. Sweeney. 6
7 Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November Ask each client their permission to share data in exchange for services. Disclose uses of data and circumstances of sharing. They may say no. Identifiable information can be shared. Forwarding identifiable information is not good. Homeless Shelters. Carnegie Mellon Tech Report CMU-ISRI-05-3 Pittsburgh: November This Talk 1. The HMIS Setting 2. Technology Survey 3. A Provable Privacy Solution privacy.cs.cmu.edu Question in this Work How can Shelters construct UIDs without risk of re-identification while still achieving an accurate unduplicated accounting? This talk will examine old approaches and introduce a new solution with provable properties. The Big Idea in 3 Steps 1. Shelters assign UIDs. Client has same UID at same shelter, and different UID at other shelters. 2. Shelters securely ship data to Fedex UIDs and Universal Data Elements 3. and Shelters de-duplicate UIDs (described over next slides) Copyright (c) Dr. Sweeney. 7
8 UID Assignment Each Shelter has a private value. Each Client has a private value. Strong hashing is used to combine the Shelter and Client value to produce a UID for the client. De-Duplication Each Shelter re-hashes the UIDs from all other Shelters. All re-hashed values that are the same represent the same client. The Commutative Property of Strong Simplified Multiplication Example, 1 There exists strong hash functions that when all Shelters re-hash all UIDs, the re-hashed values will only be the same for Clients whose source information was the same. J. Benaloh and M. de Mare. One-way accumulators: a decentralized alternative to digital signatures. In Proceedings of Advances in Cryptology - EUROCRYPT '93, Lecture Notes in Computer Science, v 765, pages , Lofthus, Norway, Each Shelter has its own private value. Simplified Multiplication Example, 2 Simplified Multiplication Example, 3 3 Mult(, ) = Mult( 7, ) = 3 Mult(, ) = Mult( 7, ) = Multiply Client and Shelter private value to get UIDs. The stores UIDs of Clients from Shelter 1. Copyright (c) Dr. Sweeney. 8
9 Simplified Multiplication Example, 4 Simplified Multiplication Example, 5 3 Mult(, ) = 11 Mult(, ) = Multiply Client and Shelter private value to get UIDs. now knows there are 4 visits, but how many Clients? Simplified Multiplication Example, 6 Simplified Multiplication Example, 7 Mult(, )= 897 Mult(, ) = 3289 sends UIDs from Shelter 2 to Shelter 1 for re-hashing. stores the re-hashed values Simplified Multiplication Example, 8 Simplified Multiplication Example, 9 sends UIDs from Shelter 1 to Shelter 2 for rehashing Mult(, ) = 897 Mult(, ) = 2093 stores the re-hashed values Copyright (c) Dr. Sweeney. 9
10 Simplified Multiplication Example, 10 Simplified Multiplication Example, 11 Re-hashed values that are the same represent the same Client. Which are the same? The re-hashed value 897 appears twice. learns that Client at Shelter 1 is the same Client as at Shelter Learns Simplified Multiplication Example 3 Mult(, ) = 3 (3* * )* Client1 Client2 Completely Re-hashed UIDs (3 * ) * = 897 (3 * ) * = 897 (33 * ) * 897 Client3 3 Mult(, ) = 897 The Big Idea in 3 Steps 1. Shelters assign UIDs. Client has same UID at same shelter, and different UID at other shelters. 2. Shelters securely ship data to Fedex UIDs and Universal Data Elements 3. and Shelters de-duplicate UIDs Re-hash UIDs to reveal which UIDs belong to the same client. Note The UIDs are not to be used for any other purpose than this reporting and deduplication. Shelters use different private values at each reporting period. This results in different hashes for the same Clients over different reporting periods. Copyright (c) Dr. Sweeney. 10
11 A Provable Claim A Provable Claim Theorem. If the re-hashed values are the same, the Clients representing the original UIDs provided the same source information. A dictionary attack by the will not yield reliable reidentifications. Dataset UID Social Security Number UID UID 8563 for try UID for try UID 072 for try UID for try UID for try Try Try Try Try Try Try Client1 Client2 Client3 A Provable Claim Compromising a Shelter will not help the intimate stalker learn where a targeted Client is (or has been) at another Shelter. A Provable Claim Compromising the will not help the intimate stalker learn where a targeted Client is (or has been). Completely Re-hashed UIDs A Provable Claim Even if the pads the UIDs with known values, the does not learn the source information of Clients. b3s7 ghre Planning Office H2732 0yfh02 Planning Office Over the Limit If the intimate stalker compromises both the and a Shelter the targeted Client visited, the intimate stalker can learn the locations of all Shelters the Client visited. ax H2732 nw450 Copyright (c) Dr. Sweeney. 11
12 Technologies for HMIS This Distributed provable Query solution * ** ** ** * If compromise enough parties, can learn information. ** Shown is worst case, can be improved by source information selection. Question in this Work How can Shelters construct UIDs without risk of re-identification while still achieving an accurate unduplicated accounting? First, use strong hashing, inconsistently across Shelters to assign UIDs. Second, provide accounting information to the through a secure means. Then, have each Shelter re-hash the UIDs of all other Shelters, in turn, to de-duplicate UIDs. This Talk 1. The Setting 2. Technology Survey 3. A Provable Privacy Solution privacy.cs.cmu.edu latanya@privacy.cs.cmu.edu Copyright (c) Dr. Sweeney. 12
DEMONSTRATION OF A PRIVACY-PRESERVING SYSTEM THAT PERFORMS AN UNDUPLICATED ACCOUNTING OF SERVICES ACROSS HOMELESS PROGRAMS
DEMONSTRATION OF A PRIVACY-PRESERVING SYSTEM THAT PERFORMS AN UNDUPLICATED ACCOUNTING OF SERVICES ACROSS HOMELESS PROGRAMS by Latanya Sweeney, PhD Associate Professor of Computer Science, Technology and
More informationNow that you have an understanding of what will be covered in this module, let s review this module s learning objectives.
Welcome to the Exhibit 1: Homeless Management Information Systems online training module. In this module, we will look at Forms 2A-2H, which cover the use of Homeless Management Information Systems, commonly
More informationSHELTER PROGRAMS DATA COMPLETENESS DETAIL REPORT
Overview: The core Emergency Shelter data completeness report has been updated. ESG HTS 2013 Provider Completeness Detail v 2.0 has been updated and renamed Shelter Programs Data Completeness Detail v
More informationHMIS Homeless Management Information System
HMIS USER GUIDE HMIS Homeless Management Information System This guide includes step by step details on how to enter, exit and record information for clients in all programs. Kings Tulare Homeless Alliance
More informationData Quality Monitoring Plan and Report Instructions and User Guide
Data Quality Monitoring Plan and Report Instructions and User Guide Beginning 7/1/12, parts of the Data Quality Monitoring Plan were implemented including timeliness and Completeness. Starting 10/1/2012,
More informationConnect To Home Eastern PA CoC Coordinated Entry System HMIS Guide
Connect To Home Eastern PA CoC Coordinated Entry System HMIS Guide Updated: February 2018 1 P a g e Table of Contents Introduction... 4 Training Class... 4 Workgroup... 4 Coordinated Entry Process... 4
More informationGUIDE FOR RECORDING A MULTI-PERSON HOUSEHOLD ENTRY INTO SERVICEPOINT. Version 2.0
GUIDE FOR RECORDING A MULTI-PERSON HOUSEHOLD ENTRY INTO SERVICEPOINT Version 2.0 Guide for Recording a Multi-Person Household Entry into ServicePoint Service Provider Type: ALL Entry Type: Multi-Person
More informationState Grant in Aid (SGIA) Program - SP5 Entry/Exit Workflow using ClientPoint (Families)
This document provides instructions for entering the following information into HMIS using the ServicePoint 5 software: Entering each family member s information into your agency s program for the first
More informationHomeless Management Information System (HMIS)
Mid-America Regional Council 600 Broadway, Suite 200 Kansas City, Missouri 64105 (816)474-4240 Kcmetrohmis.org Homeless Management Information System (HMIS) Data Quality Plan Kansas City Metro-Jackson,
More informationART Gallery Report 0632 HUD Dedicated HMIS Annual Performance Report (HMIS APR)
0632 HUD Dedicated HMIS Annual Performance Report (HMIS APR) EXECUTIVE SUMMARY This ART Gallery report has been created to facilitate the extraction of data from ServicePoint for the completion of questions
More informationAttendees: See Attached Sign-in Sheet. Introductions & Agenda Review. Notes are also available online for review,
HMIS Agency Data Administrator Training Friday, July 28 1:00 pm 2:30 pm 421 N County Farm Rd. Wheaton, IL Conference Room 3500B Presenters: Julie Tremberth and Mike Conwood Attendees: See Attached Sign-in
More informationor
Complete, Copy and Paste the Pre-application to your email, email back to the following email addresses: Paul@massaccountyhousing.org or Jamie@massaccountyhousing.org Massac County Housing Authority Pre-Application
More informationHUD Data Quality Report
HUD Data Quality Report This report analyzes HMIS data and identifies errors and collection deficiencies based on the guidelines of the 2017 HMIS Data Standards Manual. Generating the HUD Data Quality
More informationHELP MANAGEMENT INFORMATION SYSTEM Monterey-San Benito Counties Continuum of Care March 2015
1 HELP MANAGEMENT INFORMATION SYSTEM Monterey-San Benito Counties Continuum of Care March 2015 HMIS 5.11 workflow Adding New Clients Community Technology Alliance 1671 The Alameda Suite 300 San José, CA
More informationNEBRASKA BOS AND LINCOLN ALL DOORS LEAD HOME HMIS Coordinated Entry and Referral Process
NEBRASKA BOS AND LINCOLN ALL DOORS LEAD HOME HMIS Coordinated Entry and Referral Process Nebraska has implemented a streamlined process for referring and enrolling participants into housing programs. A
More information2017 PIT Summary: Jefferson County
A Point-in-Time (PIT) count provides a snapshot of homelessness by interviewing those who are homeless at a particular time. The Metropolitan Denver Homeless Initiative (MDHI) conducted a PIT study of
More informationHMIS 5.12 workflow Adding New CHAMP Clients
1 HELP MANAGEMENT INFORMATION SYSTEM Santa Cruz County Continuum of Care April 2016 HMIS 5.12 workflow Adding New CHAMP Clients Community Technology Alliance 1671 The Alameda Suite 300 San José, CA 95126
More informationHMIS Street Outreach Projects
HMIS Street Outreach Projects Riverside County DPSS ASD HPU October 2016 Page 1 Table of Contents HMIS Introduction... 4 Universal Data Elements... 4 HMIS Workstation Security Procedures... 6 Data Timeliness
More information2017 PIT Summary: Boulder County
A Point-in-Time (PIT) count provides a snapshot of homelessness by interviewing those who are homeless at a particular time. The Metropolitan Denver Homeless Initiative (MDHI) conducted a PIT study of
More informationHMIS Emergency Shelter Projects
HMIS Emergency Shelter Projects Riverside County DPSS ASD HPU December 2016 Page 1 Table of Contents HMIS Introduction... 4 Universal Data Elements... 4 HMIS Workstation Security Procedures... 6 Data Timeliness
More informationBeam Technologies Inc. Privacy Policy
Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,
More informationUSER GUIDE. Homelessness Data Exchange (HDX), Version 2.0 BETA TEST VERSION. June, U.S. Department of Housing and Urban Development
Homelessness Data Exchange (HDX), Version 2.0 USER GUIDE BETA TEST VERSION June, 2018 U.S. Department of Housing and Urban Development 1 Table of Contents Introduction... 3 Log into the site... 3 Reset
More informationGeneral Social Survey (GSS) NORC
General Social Survey (GSS) NORC OBTAINING GSS SENSITIVE DATA FILES The GSS geographic identification code files are made available to researchers under special contract with NORC. The GSS takes its promise
More informationHMIS Agency Administrators Meeting. January 4, 2018
HMIS Agency Administrators Meeting January 4, 2018 Agenda 1. CoC / Coordinated Assessment / UPLIFT Updates 2. Two Factor Authentication 3. Client Privacy Recertification 4. Housing Inventory Count (HIC)
More informationDATA QUALITY Information Session
DATA QUALITY Information Session 5/7/2014 Data Quality 1 Overview Data Quality Plan Agenda HMIS P&P Participation Required Data Elements Program Descriptor, Universal, & Program-Specific Data Collection
More informationPrivacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University
Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy Xiaokui Xiao Nanyang Technological University Outline Privacy preserving data publishing: What and Why Examples of privacy attacks
More informationThe New RoI. Effective 1 November 2014
The New RoI Effective 1 November 2014 *You will need a copy of the new RoI to follow along with this training. If you do not have one at this time go to Austinecho.org to download and print it off. You
More informationHMIS Data Standards Critical Changes 2015
HMIS Data Standards Critical Changes 2015 This document is solely for the use of persons holding a current Bowman Systems ServicePoint user license.. It contains information that may be considered the
More informationUploading Youth Data: How To Collect & Upload RHY Data in HMIS
Uploading Youth Data: How To Collect & Upload RHY Data in HMIS RHY Grantee Webinar October 26, 2017 Today s Webinar Webinar will Third last levelunder 60 minutes and is prerecorded. Submit questions to
More informationServicePoint June, 2011
ServicePoint 5.4.1 June, 2011 Table of Contents Workflow for ServicePoint... 3 Introduction... 4 Logon to ServicePoint... 4 Key Features of the Home Screen... 5 Searching for an Existing Client... 7 Adding
More informationStartup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):
Privacy Policy Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ): visit any websites or mobile sites offered by Startup
More informationSynthetic Data. Michael Lin
Synthetic Data Michael Lin 1 Overview The data privacy problem Imputation Synthetic data Analysis 2 Data Privacy As a data provider, how can we release data containing private information without disclosing
More informationTechnical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples
Muhammad Eka WIJAYA Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples How to Address Privacy in Ubiquitous Work Understand Application Define Problem Know Tools 2
More informationHUD Data Clean-Up Guide Using the 0640 HUD Data Quality Framework Report
This guide is a tool to help assist you with understanding the ART 0640 Report so that project data can be reviewed, verified, corrected, and ready for all HUD submissions! REPORT: ART < Public Folder
More informationHMIS Guide to the CSV APR HMIS End User Resource
2018 HMIS Guide to the CSV APR HMIS End User Resource This guide demonstrates how to run the CSV-APR Export and upload it into SAGE. This guide also reviews the data quality errors, which are identified
More informationSanta Barbara County Continuum of Care
HELP MANAGEMENT INFORMATION SYSTEM Santa Barbara Adding New Clients Workflow 1 Santa Barbara County Continuum of Care February 2018 HMIS 5.12 workflow Adding New Clients Community Technology Alliance 1080
More informationServicePoint HMIS Entry/Exit Quick Reference Card (non HPRP)
ServicePoint HMIS Entry/Exit Quick Reference Card (non HPRP) Login to ServicePoint 1. On your PC s desktop, double-click either the Internet Explorer browser icon or the Firefox icon. The browser s default
More informationData Anonymization. Graham Cormode.
Data Anonymization Graham Cormode graham@research.att.com 1 Why Anonymize? For Data Sharing Give real(istic) data to others to study without compromising privacy of individuals in the data Allows third-parties
More informationMarin HMIS Online. Introduction to using the Client Services Network
Marin HMIS Online Introduction to using the Client Services Network First time logging into the system To enter the system go to https://www.clientservicesnetwork.com/csnmarinca/ Click on Login. The Login
More informationCOC APR Finding and Fixing Data Quality Errors
COC APR Finding and Fixing Data Quality Errors The new COC APR is now available (April 1, 2017). The new report: Has been formatted into a canned report found on the Reports Tab Utilized for projects with
More informationEagles Charitable Foundation Privacy Policy
Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and
More informationMiami-Dade County Homeless Trust Homeless Management Information System (HMIS) Data Quality Standards. Miami-Dade County Continuum of Care (CoC)
Miami-Dade County Homeless Trust Homeless Management Information System (HMIS) Data Quality Standards Miami-Dade County Continuum of Care (CoC) DRAFT April 2017 Miami-Dade County Homeless Trust Homeless
More informationPERTS Default Privacy Policy
PERTS Default Privacy Policy Version 1.3 2017-07-15 About PERTS PERTS is a center at Stanford University that helps educators apply evidence-based strategies in order to increase student engagement and
More informationPrivacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich
Privacy-Enhancing Technologies & Applications to ehealth Dr. Anja Lehmann IBM Research Zurich IBM Research Zurich IBM Research founded in 1945 employees: 3,000 12 research labs on six continents IBM Research
More informationPreserving Data Privacy in the IoT World
MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu
More informationSurvey Result on Privacy Preserving Techniques in Data Publishing
Survey Result on Privacy Preserving Techniques in Data Publishing S.Deebika PG Student, Computer Science and Engineering, Vivekananda College of Engineering for Women, Namakkal India A.Sathyapriya Assistant
More informationB. We may offer you the opportunity to submit other information about yourself (such as gender, age, occupation, hobbies, interests, zip code, etc.
DELANCEYPLACE.COM LLC PRIVACY POLICY DELANCEYPLACE.COM, LLC and its affiliates ( DelanceyPlace, we or us ) operate a website and related social network along with all related applications, software, daily
More informationCoalition of Homeless Services Providers Martinez Hall th Street Marina, CA Facebook.
Coalition of Homeless Services Providers Martinez Hall 220 12 th Street Marina, CA 93933 www.chspmontereycounty.org Facebook.com/CHSPMontry2 1 2 3 0252- All Inclusive 0252a- Without Outreach 0252b- Outreach
More informationI. INFORMATION WE COLLECT
PRIVACY POLICY USIT PRIVACY POLICY Usit (the Company ) is committed to maintaining robust privacy protections for its users. Our Privacy Policy ( Privacy Policy ) is designed to help you understand how
More informationPRIVACY STATEMENT. Effective Date 11/01/17.
PRIVACY STATEMENT Effective Date 11/01/17. PREMIER Bankcard, LLC. [hereinafter referred to as our, us, or we ] is committed to advising you of the right to your privacy, and strives to provide a safe and
More information2014 HMIS DATA STANDARDS AWARENESS. Timeline, Revision Process, and Major Changes
2014 HMIS DATA STANDARDS AWARENESS Timeline, Revision Process, and Major Changes Agenda 2014 HMIS Data Standards Implementation Timeline Revision Process Overview of Key Changes Next Steps HMIS Data Standards
More informationEnviroIssues Privacy Policy Effective Date:
EnviroIssues Privacy Policy Effective Date: 9-28-18 EnviroIssues, Inc. ( we, us, our ) is committed to protecting the privacy of visitors to its website and users of its services (each a Service and collectively
More informationGRANDSTREAM PRIVACY STATEMENT
GRANDSTREAM PRIVACY STATEMENT This Privacy Statement governs how Grandstream Networks, Inc. and its affiliates ( Grandstream, us, our or we ) may collect, use, and disclose information that we obtain through
More informationIn this unit we are continuing our discussion of IT security measures.
1 In this unit we are continuing our discussion of IT security measures. 2 One of the best security practices in Information Security is that users should have access only to the resources and systems
More informationTo respond to your inquiries and fulfill your requests, such as to send you newsletters or publications that you request.
Last updated: May 5, 2017 SJL Attorney Search, LLC is committed to protecting your privacy. This Privacy Policy describes our practices in connection with information that we collect through our website
More informationPage 1 of 6 SURVEY: PROJECT TECH
SURVEY: PROJECT TECH Case managers: Thank you for working with us to administer the survey. Please read each question as it is written. Instructions for you are written in italics. Information that you
More informationNESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE
PRIVACY NOTICE Nestlé Purina Petcare Limited (hereinafter referred to as Nestlé ) is committed to safeguarding your privacy and ensuring that you continue to trust Nestlé with your personal data. When
More informationThe Table Privacy Policy Last revised on August 22, 2012
The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed
More informationHIPAA Privacy & Security Training. Privacy and Security of Protected Health Information
HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security
More informationCognizant Careers Portal Terms of Use and Privacy Policy ( Policy )
Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Introduction This Policy applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers ("Site"), which
More informationBreach Notification Form
Breach Notification Form Report a breach of personal data to the Data Protection Commission Use this form if you are a Data Controller that wishes to contact us to report a personal data breach that has
More informationAuthentication SPRING 2018: GANG WANG. Slides credit: Michelle Mazurek (U-Maryland) and Blase Ur (CMU)
Authentication SPRING 2018: GANG WANG Slides credit: Michelle Mazurek (U-Maryland) and Blase Ur (CMU) Passwords, Hashes, Salt Password database Username Plaintext Password Not a good idea to store plaintext
More informationPrivacy Policy... 1 EU-U.S. Privacy Shield Policy... 2
Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your
More informationVeteran By-Name List
Veteran By-Name List ServicePoint Handbook CONTENTS REVISION HISTORY... 2 SURVEYING VETERANS EXPERIENCING HOMELESSNESS... 3 VETERAN BY-NAME LIST WORKFLOW... 4 1. CLIENT SEARCH/CREATE NEW RECORD... 5 2.
More informationIGN.COM - PRIVACY POLICY
Effective May 31, 2011 Summary of the IGN Entertainment, Inc.'s Privacy Policy: 1. INTRODUCTION - The Introduction identifies the basic IGN Services covered by this Privacy Policy and provides a brief
More informationART Reporting Everything you ever wanted to know (well, some of it) Clif Graves - Thursday, September 17, 2015
ART Reporting Everything you ever wanted to know (well, some of it) Clif Graves - Thursday, September 17, 2015 1 ART Reporting Everything This 1 hour webinar will cover a lot of ground. A refresher on
More informationPrivacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES
Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY Cookeville Communications Media is committed to maintaining robust privacy protections for its users. Our privacy policy is designed to help you
More informationCognizant Careers Portal Privacy Policy ( Policy )
Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers
More informationOnline Privacy Notice
Online Privacy Notice The National Foundation for Credit Counseling, Inc. (referred to as NFCC, we, or us ) respects your privacy and is committed to maintaining and using your information responsibly.
More informationPrivacy Policy Identity Games
Document Name: Privacy Policy Reference: GDPR 1.0 This privacy policy was last modified on 26 July, 2018. Privacy Policy Identity Games In this policy, "we", "us" and "our" refer to Identity Games International
More informationPrivacy Policy. I. How your information is used. Registration and account information. March 3,
Privacy Policy This Privacy Policy describes how and when we collect, use and share your information across our App. When using our App you consent to the collection, transfer, storage, disclosure, and
More informationTERMS AND CONDITIONS OF USE FOR THE WEBSITE This version is valid as from 1 October 2013.
TERMS AND CONDITIONS OF USE FOR THE WEBSITE This version is valid as from 1 October 2013. I. GENERAL TERMS AND CONDITIONS OF USE 1. Applicability The website http://www.stubbetobacco.com (hereinafter referred
More informationUNTITLED HIP HOP PROJECT Privacy Policy. 1. Introduction
UNTITLED HIP HOP PROJECT Privacy Policy 1. Introduction This site ( Site ) is operated by etribez Inc. on behalf of JCE Games, Inc. ( Producer ) to accept, process and administer online auditions and other
More informationPRIVACY POLICY. 3.1 This policy does not apply to the collection, holding, use or disclosure of personal information that is an employee record.
1. Introduction 1.1 From time to time Business & Risk Solutions Pty Ltd ("the Company") is required to collect, hold, use and/or disclose personal information relating to individuals (including, but not
More informationEmerging Measures in Preserving Privacy for Publishing The Data
Emerging Measures in Preserving Privacy for Publishing The Data K.SIVARAMAN 1 Assistant Professor, Dept. of Computer Science, BIST, Bharath University, Chennai -600073 1 ABSTRACT: The information in the
More informationHealthfirst Website Privacy Policy
Healthfirst Website Privacy Policy We value your relationship with us and have detailed our privacy objectives for our website below. Please be sure to read this notice as it covers the terms and conditions
More informationAuthentication Objectives People Authentication I
Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)
More informationShare Care. Consumer Search 11/24/2015 1
Share Care Consumer Search 1 Searching for Consumers in Share Care When searching for consumers it is best to use either their date of birth or social security number. The consumer name may not be spelled
More informationSurvey of k-anonymity
NATIONAL INSTITUTE OF TECHNOLOGY ROURKELA Survey of k-anonymity by Ankit Saroha A thesis submitted in partial fulfillment for the degree of Bachelor of Technology under the guidance of Dr. K. S. Babu Department
More informationPresenter: Terry Schoonover Author: Terry Schoonover. Summary:
Presenter: Terry Schoonover Author: Terry Schoonover Summary: This document will step through the process of submitting an electronic application for Permanent Supportive Housing through the use of ProviderConnect.
More informationDONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY
DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an
More informationPrivacy Policy GENERAL
Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill
More informationZero-Knowledge Proof and Authentication Protocols
Zero-Knowledge Proof and Authentication Protocols Ben Lipton April 26, 2016 Outline Background Zero-Knowledge Proofs Zero-Knowledge Authentication History Example Protocols Guillou-Quisquater Non-zero-knowledge
More informationIdentifying and Preventing Conditions for Web Privacy Leakage
Identifying and Preventing Conditions for Web Privacy Leakage Craig E. Wills Computer Science Department Worcester Polytechnic Institute Worcester, MA 01609 1 Position Statement Beyond tracking and proposals
More informationSection 6. Registering a New Voter 5/11/2018
57 Section 6 Registering a New Voter Registering a New Voter 58 When a voter cannot be found after numerous voter search attempts, the voter must complete a Colorado Voter Registration Form to register
More informationFeatured Articles II Security Research and Development Research and Development of Advanced Security Technology
364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by
More informationA Disclosure Avoidance Research Agenda
A Disclosure Avoidance Research Agenda presented at FCSM research conf. ; Nov. 5, 2013 session E-3; 10:15am: Data Disclosure Issues Paul B. Massell U.S. Census Bureau Center for Disclosure Avoidance Research
More informationStanislaus County HMIS Security & Data Quality Audit
Data Collection Agency is using the correct, updated HMIS Intake, Update, & Exit Forms? HMIS Intake, Update, & Exit Forms are completed properly? Agency is collecting all Universal Data Elements? (Name,
More informationPrivacy Policy. When you create an account or use our Service, we collect the following types of information from you:
Privacy Policy Last updated: 24 th July, 2017 Welcome to Kwalee.com (the Site ), provided by Kwalee Ltd. ( Kwalee ). This Kwalee.com Privacy Policy ( Policy ) describes the information we gather from you
More informationTechnology Safety Quick Tips
Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,
More informationProvider Configuration
Wilder Research Minnesota s Homeless Management Information System (HMIS) Provider Configuration System Administration 194 Wilder Research The Provider Tabs covered in this training include: Provider Profile
More informationBig Dogs Big Hearts Rescue Inc. Foster Application
Big Dogs Big Hearts Rescue Inc. Foster Application Date: Name: Address: City: State: Zip: Day Phone: ( ) Evening Phone: ( ) Cell Phone: ( ) Email address: @ Applying for: ( ) Temporary foster (i.e. pull
More informationOnlineNIC PRIVACY Policy
OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationCorporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial
Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom
More informationCENTRAL INTAKE. AES Central Intake User Guide. AES University Manual. Adaptive Enterprise Solutions
CENTRAL INTAKE AES Central Intake User Guide AES University Manual Adaptive Enterprise Solutions 8401 Colesville Road Suite 450 Silver Spring, MD 20910 800.237.9785 Toll Free 301.589.3434 Voice 301.589.9254
More informationPrivacy Policy Manhattan Neighborhood Network Policies 2017
Privacy Policy Manhattan Neighborhood Network Policies 2017 Table of Contents Manhattan Neighborhood Network Policies 3 MNN s Privacy Policy 3 Information Collection, Use and Sharing 4 Your Access to and
More information2. What is Personal Information and Non-Personally Identifiable Information?
Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location
More informationFooji Code of Conduct
Fooji Code of Conduct In order to protect the experience of the Fooji fans and employees, there are some limitations on the type of content and behavior that we allow. These limitations are set forth in
More informationII.C.4. Policy: Southeastern Technical College Computer Use
II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer
More information