Locate and Mitigate PII

We’ll review some of the forms personally identifiable information can take and where it may reside in library systems. Then we’ll discuss triangulation to show how with a few data points can expose identity. We’ll finish with some hands-on de-identification techniques good for patron protection.

Presentation slides

Intermediate Privacy and Security
Location: Crestone B Date: November 10, 2017 Time: 2:15 pm - 3:00 pm photo of Sam Kome Sam Kome