Fundamentals of Data-manipulating Privacy Enhancing Technologies 

Privacy Enhancing Technologies (PETs) comprise a long-standing and wide-ranging field of research, technologies, and solutions, which seek to address core data protection concepts such as online privacy, data protection by design, data minimisation and data security. In parallel, they aim to realise and unlock the value of data within the limits of applicable laws and regulations.

This course provides a comprehensive overview of commonly discussed modern PETs which operate on data directly, in the context of organisations applying such technologies to process personal data (a companion course addresses PETs which use cryptographic principles to protect data). It introduces the concepts at an easily understandable level, compares their pros and cons against other PETs, and raises known issues and limitations. The course includes several exercises and demonstrations aimed at strengthening participants’ understanding. As it is targeted at decision makers, managers, and system designers, it does not require advanced knowledge of mathematics nor programming skills.

This course complements our Fundamentals of Cryptographic Privacy Enhancing Technologies course on other types of PETs.

Who should attend?

  • Privacy Engineers, Technical Staff, Developers, Data Analysts, Data Architects, and Project Managers
  • Data Protection Officers (DPOs), Compliance Professionals, and Corporate / In-house Counsels
  • Executives, Managers, and Staff involved in the management, collection, use or other processing of personal data

Course Details

Course Code: PE102
Title: Fundamentals of Data-manipulating Privacy Enhancing Technologies 
Duration: ½ day (approximately 3.5 contact hours)
Mode of Training: In-person
Available Date(s): 4 June 2025
Time: 2.00pm - 5.30pm (SGT)
Venue: Drew & Napier LLC, 10 Collyer Quay, 10th Floor, Ocean Financial Centre, Singapore 049315
 
Course Fee: S$300.00 (excluding GST)

Course Outline

  • Context for Data-oriented PETs
    • Purpose and scope of PETs
    • Regulatory requirements and general guidance on PETs
    • PETs versus related data protection technologies (like anonymisation)
  • Modern PETs for data protection
    • Private set intersection
    • Differential privacy
    • Fake / Mock / Fictitious data versus Artificial Intelligence (AI) based synthetic data

Course Facilitator

Albert-PichImaier.jpg
 
 

Senior Cybersecurity and
Privacy Engineer

Senior Learning Technology
Designer, Drew Data
Protection & Cybersecurity
Academy