Bridging the Gap between Computer Science and Legal Approaches to Privacy
نویسندگان
چکیده
The fields of law and computer science have generated different notions of privacy risks in the context of the analysis and release of statistical data about individuals. Emerging concepts from the theoretical computer science literature provide formal mathematical models for quantifying and mitigating privacy risks. Such models take into account a notion of privacy risk that is substantially broader than the privacy risks contemplated by many privacy laws. An example of a formal privacy model is differential privacy, which provides a concrete provable guarantee of privacy against a wide range of potential attacks, including types of attacks currently unknown or unforeseen. The subject of much theoretical investigation, new privacy technologies based on formal models such as differential privacy have recently been making significant strides towards practical implementation. For these tools to be used with sensitive personal information, it is important to demonstrate that they satisfy relevant legal requirements for privacy protection. However, making such an argument is challenging due to the significant conceptual gaps between the legal and technical approaches to defining privacy. Notably, information privacy laws are generally subject to interpretation and some degree of flexibility, which creates uncertainty for the implementation of more formal approaches. This Article articulates the nature of the gaps between legal and technical approaches to privacy in the release of statistical data about individuals. It also presents an argument that the use of differential privacy is sufficient to satisfy the requirements of the Family Educational Rights and Privacy Act of 1974 (FERPA), a federal law that protects the privacy of education records in the United States. This argument illustrates what may evolve to a more general methodology for rigorously arguing that technological methods for privacy protection satisfy the requirements of a particular information privacy law. The argument detailed in this article has two main components. First, it involves the extraction of a formal mathematical requirement of privacy protection based on the standard set forth by FERPA. Second, it describes the construction of a rigorous mathematical proof for establishing that differential privacy satisfies the mathematical requirement extracted from FERPA. The argument takes a conservative “worst-case” approach in order to extract a mathematical requirement that is robust to potential ambiguities in legal interpretation. In this way, the mathematical proof demonstrates that the use of differential privacy is sufficient to satisfy a broad range of reasonable interpretations of FERPA, including interpretations that may be adopted in the future.
منابع مشابه
Cross border E-Science and Research Partnership: Bridging the Gap Between Science and Media
E-Science is a tool that helps scientists to store, interpret, analyze and make a network of their data, and it can play a critical role in different aspects of the scientific goals and research. This commentary, under the topic of Cross Border E-Science and Research Partnership: Bridging the Gap between Science and Media,[1] attempts to shed light on E-Science with emphasis on three importa...
متن کاملOutput Privacy Protection With Pattern-Based Heuristic Algorithm
Privacy Preserving Data Mining(PPDM) is an ongoing research area aimed at bridging the gap between the collaborative data mining and data confidentiality There are many different approaches which have been adopted for PPDM, of them the rule hiding approach is used in this article. This approach ensures output privacy that prevent the mined patterns(itemsets) from malicious inference problems. A...
متن کامل-
The development and evolution of any system–person, organization–nation depends on how the system succeeds to bridge the gap between what the system knows and what the system does (with the knowledge). We call this the gap between knowing and doing or the knowing-doing gap. If the system does not do what it knows, it will lose out in competition with other systems, its relative performance in...
متن کاملBridging the semantic gap for software effort estimation by hierarchical feature selection techniques
Software project management is one of the significant activates in the software development process. Software Development Effort Estimation (SDEE) is a challenging task in the software project management. SDEE is an old activity in computer industry from 1940s and has been reviewed several times. A SDEE model is appropriate if it provides the accuracy and confidence simultaneously before softwa...
متن کاملBridging the Gap Between Research and Policy and Practice; Comment on “CIHR Health System Impact Fellows: Reflections on ‘Driving Change’ Within the Health System”
Far too often, there is a gap between research and policy and practice. Too much research is undertaken with little relevance to real life problems or its reported in ways that are obscure and impenetrable. At the same time, many policies are developed and implemented but are untouched by, or even contrary to evidence. An accompanying paper describes an innovative progr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2018