logo

How to Use Privacy to Prevent Adverse Customer Outcomes

Conference:  Transform X 2021

2021-10-07

Authors:   Chris Hazard


Summary

The presentation discusses the importance of privacy in data synthesis and the use of synthetic data to enhance privacy while unlocking the value of data. It also highlights the challenges and potential risks associated with synthetic data and the need for proper application of privacy techniques.
  • Privacy affects behavior and is crucial for building trust and value in a brand
  • Synthetic data can be used to unlock the value of data while maintaining privacy
  • Proper application of privacy techniques is necessary to avoid potential risks and challenges associated with synthetic data
  • Synthetic data can be generated using various techniques such as Bayesian networks and GANs
  • Synthetic data sets should be generated with distributions that have the same analytic outcome as the original data
  • Synthetic data sets should be generated with caution to avoid leaking privacy
  • Synthetic data sets can be generated multiple times with different levels of fidelity as long as privacy is maintained
  • Validation of privacy and value is necessary when using synthetic data
The speaker provides an example of a four-dimensional data set and shows how the original and synthetic data sets are remarkably similar in terms of trends and insights. The synthetic data set is a new set of points generated using various techniques such as Bayesian networks and GANs. The speaker also emphasizes the importance of generating synthetic data sets with caution to avoid leaking privacy and the need for proper application of privacy techniques to avoid potential risks and challenges associated with synthetic data.

Abstract

Chris Hazard, CTO and co-founder at Diveplane Cooperation, discusses some of the different techniques that can be used to protect privacy including encryption, differential privacy and privacy budgets. He explores how enterprises should adopt a thoughtful privacy strategy that balances the risks and rewards of these privacy-enhancing technologies. Join this session to learn how you can develop a privacy strategy that considers the business value, liability and user privacy to unlock key use-cases.

Materials:

Post a comment

Related work