�Privacy Enhancing Technologies (PETs)
Legal Convening
March 12, 2024
1
Corinna Turbes, Center for Data Policy, Data Foundation
Jim Siegl, Future of Privacy Forum
Amy O’Hara, Georgetown University, Massive Data Institute
Stephanie Straus, Georgetown University, Massive Data Institute
Agenda
2
2
Welcome & Intros
3
3
Norms, Expectations, and Goals
4
4
Norms, Expectations, and Goals
5
5
FERPA Overview
GUIDING QUESTION
"If a tree falls in the forest and no one is around to hear it, does it make a sound?……”
GUIDING FERPA AND PETs QUESTION
"If a tree falls in the forest and no one is around to see it……”
Did you have a logging permit?
Is Every PET a CAT?
Compliance
Avoidance
Technology
TERMS
The Family Educational Rights and Privacy Act�WHAT DOES FERPA PROTECT?
Direct Identifiers
Name, SSN, Student ID Number
1:1 relationship to individual
Indirect Identifiers
Birthdate, Demographic Information
1:Many relationship to individual
How Does FERPA Define”Disclosure”?
Disclosure means to permit access to or the release, transfer, or other communication of personally identifiable information contained in education records by any means, including oral, written, or electronic means, to any party except the party identified as the party that provided or created the record.�
(34 CFR §99.3)
COMMON K12 FERPA Exceptions
...or with the Parent’s or Eligible Student’s Written Consent
School officials with legitimate educational interest;
9
Other schools to which a student is transferring;
1
Specified officials for audit or evaluation purposes;
2
Appropriate parties in connection with financial aid to �a student;
3
Organizations conducting certain studies for or on behalf of the school;
4
Accrediting organizations;
5
To comply with a judicial order or lawfully issued subpoena;
6
State and local authorities, within �a juvenile justice system, pursuant to specific State law.
7
Appropriate officials in cases of health and safety emergencies;
8
Directory Information;
10
THERE IS NO “RESEARCH EXCEPTION”….
FERPA�“RESEARCH”�EXCEPTION
COMMON K12 FERPA Exceptions
...or with the Parent’s or Eligible Student’s Written Consent
School officials with legitimate educational interest;
9
Other schools to which a student is transferring;
1
Specified officials for audit or evaluation purposes;
2
Appropriate parties in connection with financial aid to �a student;
3
Organizations conducting certain studies for or on behalf of the school;
4
Accrediting organizations;
5
To comply with a judicial order or lawfully issued subpoena;
6
State and local authorities, within �a juvenile justice system, pursuant to specific State law.
7
Appropriate officials in cases of health and safety emergencies;
8
Directory Information;
10
CONSENT FOR DISCLOSURE OF STUDENT DATA
The written, signed and dated consent must:
(1) Specify the records that may be disclosed;
(2) State the purpose of the disclosure; and
(3) Identify the party or class of parties to whom the disclosure may be made.
FERPA: School Official Exception
Permits schools to outsource institutional services or functions that involve the disclosure of education records to contractors… or other third parties provided that the outside party:
FERPA: Studies Exception
PII from education records may be disclosed in connection with certain studies conducted “for or on behalf of” schools, school districts, or postsecondary institutions
Studies must be for the purpose of:
There must be a written agreement with the individual/organization performing the study that meets certain requirements.
Written Agreements—Studies Exception
Written agreements must
FERPA: Audit / Evaluation Exception
Federal, State, and local officials listed under § 99.31(a)(3), or their authorized representatives, may have access to education records –
The receiving entity must be a State or local educational authority or other FERPA-permitted entity or must be a designated authorized representative of a State or LEA or other FERPA-permitted entity.
Requires a “Written Agreement” with requirements specific to the Audit / Evaluation Exception.
How might the Audit/Evaluation exception be used?
Example:
An evaluation of college freshman who graduated from the same high school may reveal that all of those students needed postsecondary remediation in math, indicating that the high school needs to improve its math program.
An LEA could designate a university as an authorized representative, allowing the LEA to disclose, without consent, PII from education records on its former students to the university.
The university then may disclose, without consent, transcript data on these former students to the LEA to permit the LEA to evaluate how effectively the LEA prepared its students for success in postsecondary education.
DE IDENTIFICATION
FERPA allows the disclosure of de-identified data without parental consent only if the data cannot be used to re-identify a student.
(1) De-identified records and information. An educational agency or institution, or a party that has received education records or information from education records under this part, may release the records or information without the consent required by §99.30 after the removal of all personally identifiable information provided that the educational agency or institution or other party has made a reasonable determination that a student's identity is not personally identifiable, whether through single or multiple releases, and taking into account other reasonably available information.
(2) An educational agency or institution, or a party that has received education records or information from education records under this part, may release de-identified student level data from education records for the purpose of education research by attaching a code to each record that may allow the recipient to match information received from the same source, provided that—
(i) An educational agency or institution or other party that releases de-identified data under paragraph (b)(2) of this section does not disclose any information about how it generates and assigns a record code, or that would allow a recipient to identify a student based on a record code;
(ii) The record code is used for no purpose other than identifying a de-identified record for purposes of education research and cannot be used to ascertain personally identifiable information about a student; and
(iii) The record code is not based on a student's social security number or other personal information.
Suppression
Suppression is a disclosure limitation method which involves removing data (e.g., from a cell or a row in a table) to prevent the identification of individuals in small groups or those with unique characteristics.
Source: https://studentprivacy.ed.gov/content/suppression
Research Provisions in State Laws
Georgia Act 171 (2015)
Example of a fairly standard research provision in state laws passed after 2014.
20-2-666. (c) Notwithstanding paragraph (4) of subsection (a) of this Code section, an operator may disclose student data, so long as paragraphs (1) to (3), inclusive, of subsection (a) of this Code section are not violated, under the following circumstances:… (2) For legitimate research purposes: (A) As required by state or federal law and subject to the restrictions under applicable state and federal law; or (B) As allowed by state or federal law and under the direction of a school, a local board of education, or the department, subject to compliance with subsection (a) of this Code section.
Idaho SB 1372 (2014)
The State Board of Education shall… (iii) Develop criteria for the approval of research and data requests from state and local agencies, the state legislature, researchers and the public: (1) unless otherwise approved by the state board of education, student data maintained shall remain confidential; (2) unless otherwise approved by the state board of education, released student data in response to research and data requests may include only aggregate data; and (3) any approval of the board to release personally identifiable student data shall be subject to legislative approval prior to the release of such information.
Kan. Stat. Ann. § 72-6314 (2014)
(1) Except as otherwise provided in paragraph (2), student data may be disclosed to any governmental entity not specified in subsection (b) or (c), or to any public or private audit and evaluation or research organization, provided that only aggregate data is disclosed to such governmental entity or audit and evaluation or research organization. (2) Personally identifiable student data may be disclosed if the student, if an adult, or the parent or legal guardian of the student, if a minor, consents to such disclosure in writing.
Coffee Break
10:10-10:25 am
29
29
PETs Overview
30
30
Amy O’Hara
Research Professor
Massive Data Institute
Stephanie Straus
Policy Fellow
Massive Data Institute
Pulse Check: Knowledge of PETs
31
31
4
I could do this presentation for you
1
PET, who?
3
2
Common Use Cases of SLDS �Data Access/Sharing
32
32
Current Privacy Protection Methods
33
33
Current Privacy Protection Methods → Not Enough!
34
34
Full privacy, but no utility!
Trusting parties will adhere to contract terms
Addtl pair of eyes on raw data + addtl copies of data in new locations
Full privacy, but questionable utility!
Computer power can possibly re-ID
What Are Privacy Enhancing Technologies (PETs)?
analyzed and/or published
35
35
PETs are safer and more secure ways to analyze, link, and share data
PETs complement, but don’t replace, DSAs or good governance protocols.
PETs may not be compliant, and do not guarantee complete privacy.
How PETs Address Data Governance Issues
Input Privacy
Secure hashing
Secure enclaves
Intermediaries
Secure multiparty computation
Homomorphic encryption
Output Privacy
Traditional SDL
Differential privacy
Private query server
Synthetic data
36
36
Secure Multiparty Computation (SMC)
37
SMC Overview
Party One
Party Two
SMC
Result
Party 1 encrypts and uploads its data to SMC application
Party 2 encrypts and uploads its to SMC application
Data are encrypted by sharing slivers across different servers.
Only aggregate results are released as decrypted data
SMC code has been pre-programmed to add shares together, and then calculate the desired queries.
Secure Multiparty Computation (SMC):
A Note on Encryption…
whereas
39
39
Secure Multiparty Computation (SMC) &
Homomorphic Encryption (HE)
40
40
Secure Hashing
41
Secure Hashing
Overview
Party One
Party Two
Result
c
SSN: 123-45-6789
SSN: 123-45-6789
SSN: spq1=v3?@plaa&&q72
SSN: spq1=v3?@plaa&&q72
Linkage on hashed inputs
Both parties have some overlapping individuals in their datasets
The secure hashing algorithm ensures the same individual across their two datasets gets hashed in the same way
The resulting linked data contains no PII, but does contain row-level data.
Secure Hashing
43
43
Key Questions & Challenges on Use Cases
44
44
Corinna Turbes
Director, Center for Data Policy
Data Foundation
Key Questions & Challenges on Use Cases
45
45
Key Questions & Challenges on Use Cases
46
46
After Lunch:
→ which PET might be able to be leveraged?
→ how might FERPA and other data privacy laws come into play?
47
47
Lunch
11:45 am - 12:45 pm
48
48
FERPA + PETs Key Issues/Questions:
Disclosure
49
49
FERPA + PETs Key Issues/Questions:
Disclosure
Is access within a PET considered a disclosure under FERPA?
50
50
FERPA + PETs Key Issues/Questions:
Consent and FERPA Exceptions
51
51
FERPA + PETs Key Issues/Questions:
De-identification
52
52
FERPA + PETs Key Issues/Questions:
Other considerations
53
53
Closing
2:45 - 3 pm
54
54
More Resources
55
55