Skip to main content

Currently Skimming:

Appendix A: Workshop Event Agendas
Pages 123-132

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 123...
... Reiter, Consensus Panel Chair, Duke University Cheryl Eavey, National Science Foundation Robert M Groves, Oversight Committee Chair for Visioning a 21st Century Data Infrastructure, Georgetown University 123
From page 124...
... 10:35–10:55 Panel/Audience Discussion 10:55–11:45 Session 2: Common Privacy Frameworks and Blended Data 10:55–11:25 Julia Lane, New York University The focus of the discussion will be on the practical application of the Five Safes in the context of considering both privacy protection and utility. The Advisory Committee on Data for Evidence Building recommended considering both risk and utility in providing access to blended data, and government agencies have developed a variety of different practical approaches.
From page 125...
... 11:25–11:45 Panel/Audience Discussion 11:45–12:00 BREAK 12:00–1:25 Session 3: Current Approaches to Privacy Protection with Blended Data 12:00–12:05  Claire Bowen, Panel Member, Urban Institute 12:05–12:25 Refugees Timothy Triplett, Urban Institute This talk will describe considerations in increasing data access for the Annual Survey of Refugees -- the only robust source of national data on refugees' progress toward self-sufficiency and integration. Users have requested access to refugee enrollment and geographic relocation data at subregional levels.
From page 126...
... The talk will conclude with some final reflections and insights on next steps in this critical field of privacy preservation with blended data. 12:45–1:05 Trade Secrets Chris Morten, Columbia Law School The companies that generate and benefit from commercially valuable trade secrets and other "confidential commercial information" often assert that such information cannot be shared responsibly, even with government regulators and noncommercial researchers.
From page 127...
... 10:50–11:15 Peggy Carr, National Center for Education Statistics Reflections on the prior presentations will be shared.  Panel/Audience Discussion 11:15–12:25 Session 5: In-depth Case Study: Unique Privacy Considerations in Blending Financial Services Data  11:15–11:20  Mark Watson, Panel Member, Federal Reserve Bank of Kansas City (formerly)
From page 128...
... 11:40–12:00 John W Towns, National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign Ensuring appropriate access to useful blended data will require not only physical and software infrastructure, but also human infrastructure -- the collaboration of technical experts with users of blended data.
From page 129...
... The talk will conclude with a discussion of the implementation of respondent consent, and the unique challenge it has posed for future research. 10:30–10:50 Michael Mueller-Smith, University of Michigan This talk will introduce the Criminal Justice Administrative Records System and the opportunities created from integrating justice data with administrative and survey socio-economic data held by the U.S.
From page 130...
... This talk will focus on FEMA's approach to balancing privacy considerations with operational speed when using blended data to inform emergency management decisions, with case studies from recent disasters and lessons learned to inform future approaches. 11:40–12:00 Ed Kearns, First Street Foundation This presentation will examine some of the existing methods used to provide data to customers for disaster/emergency events.
From page 131...
... We will review some of the gaps that exist between mathematical and legal approaches to privacy, and ongoing efforts to bridge them while maintaining legal and mathematical rigor. 12:50–1:05 Communicating Privacy to the Public Michael Hawes, Census Bureau Agencies' ability to communicate how they safeguard respondent data is critical to their ability to ensure ongoing public trust.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.