Explore the 8 privacy strategies. Technical strategies focus on data architecture, while Process strategies focus on organizational policy.
Tactic Details
TechnicalExclude
Limit interactions only to those necessary to complete the task.
Timing
Before interaction
💡 Example
A restaurant handing out numbers instead of taking names to announce when a table is ready.
Privacy Architecture
System design influences privacy along two key axes: Identifiability (how easily data links to a person) and Centricity (where data is stored/processed).
The Spiekermann & Cranor Model
Data Centralization Models
Centralized
High Risk
Partially Decentralized
Medium Risk
Fully Decentralized
Lowest Risk
Levels of Identifiability
| Level | Description | Strategy |
|---|---|---|
| Identified | Direct links (User ID, Email) | - |
| Pseudonymized (Linkable) | IDs removed, but attributes linkable | SEPARATE |
| Pseudonymized (Unlinkable) | Random IDs, Hashing, Encryption | HIDE |
| Anonymized | k-anonymity (Indistinguishable) | ABSTRACT |