{"id":15,"date":"2008-10-15T11:28:14","date_gmt":"2008-10-15T15:28:14","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/begat\/?p=15"},"modified":"2009-01-09T12:21:19","modified_gmt":"2009-01-09T16:21:19","slug":"privacy-is-not-dead-its-just-sleeping-lets-wake-it-up","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/genderandtech\/2008\/10\/15\/privacy-is-not-dead-its-just-sleeping-lets-wake-it-up\/","title":{"rendered":"Privacy is Not Dead, it&#8217;s Just Sleeping &#8212; Let&#8217;s Wake it Up!"},"content":{"rendered":"<p><strong>Professor Latanya Sweeney\u00a0<\/strong><br \/>\nAssociate Professor of Computer\u00a0Science,Technology and Policy in the School of Computer Science at Carnegie Mellon University<\/p>\n<p>Thursday, October 16, 2008<\/p>\n<p>4:00 p.m.<br \/>\nMaxwell Dworkin G-125<br \/>\nIce cream at 3:30 p.m. &#8211; Maxwell Dworkin ground floor<\/p>\n<p>Given widespread data collection and data sharing,this talk identifies<br \/>\nways technology and policy can work together to provide guarantees of<br \/>\nprivacy while keeping data useful.  This talk begins by looking at ways<br \/>\nto learn sensitive information about individuals from seemingly innocent<br \/>\nfacts.  Examples include real-world experiments on medical, genetic,<br \/>\nvideo, web, and social network data.  We then look at ways to share<br \/>\nthese data with guarantees of privacy and utility.  This talk ends by<br \/>\nproposing new policy guidelines for data collection and sharing, on the<br \/>\none hand, and new problems for computer scientists to solve, on the<br \/>\nother.  Together, the proposed policy and technology weave together so<br \/>\nthat society can enjoy the benefits of data sharing while still<br \/>\nprotecting individual privacy.<\/p>\n<p>Speaker:  Latanya Sweeney, Ph.D. is an Associate Professor of Computer<br \/>\nScience,Technology and Policy in the School of Computer Science at<br \/>\nCarnegie Mellon University.  She also founded and serves as the Director<br \/>\nof the Data Privacy Lab, which works with real-world stakeholders to<br \/>\nsolve today&#8217;s privacy technology problems.  Her work involves creating<br \/>\ntechnologies and related policies with provable guarantees of privacy<br \/>\nprotection while allowing society to collect and share person-specific<br \/>\ninformation for many worthy purposes.  Her work has received awards from<br \/>\nnumerous organizations, including the American Psychiatric Association,<br \/>\nthe American Medical Informatics Association, and the Blue Cross Blue<br \/>\nShield Association.  The American College of Medical Informatics<br \/>\ninducted her as a Fellow in 2006.  Dr. Sweeney received her Ph.D. in<br \/>\ncomputer science from the Massachusetts Institute of Technology in 2001.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Professor Latanya Sweeney\u00a0 Associate Professor of Computer\u00a0Science,Technology and Policy in the School of Computer Science at Carnegie Mellon University Thursday, October 16, 2008 4:00 p.m. Maxwell Dworkin G-125 Ice cream at 3:30 p.m. &#8211; Maxwell Dworkin ground floor Given widespread data collection and data sharing,this talk identifies ways technology and policy can work together to [&hellip;]<\/p>\n","protected":false},"author":1911,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15","post","type-post","status-publish","format-standard","hentry","category-uncategorized","p1","y2008","m10","d15","h07"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/genderandtech\/wp-json\/wp\/v2\/posts\/15","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/genderandtech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/genderandtech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/genderandtech\/wp-json\/wp\/v2\/users\/1911"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/genderandtech\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/genderandtech\/wp-json\/wp\/v2\/posts\/15\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/genderandtech\/wp-json\/wp\/v2\/media?parent=15"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/genderandtech\/wp-json\/wp\/v2\/categories?post=15"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/genderandtech\/wp-json\/wp\/v2\/tags?post=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}