Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/yilmaztolga/awesome-data-privacy
A curated list of data privacy and security resources
https://github.com/yilmaztolga/awesome-data-privacy
List: awesome-data-privacy
awesome data-privacy gdpr personally-identifiable-information privacy security
Last synced: about 2 hours ago
JSON representation
A curated list of data privacy and security resources
- Host: GitHub
- URL: https://github.com/yilmaztolga/awesome-data-privacy
- Owner: yilmaztolga
- Created: 2018-09-11T13:11:39.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2022-08-17T08:41:03.000Z (about 2 years ago)
- Last Synced: 2024-05-21T14:06:27.963Z (6 months ago)
- Topics: awesome, data-privacy, gdpr, personally-identifiable-information, privacy, security
- Size: 38.1 KB
- Stars: 82
- Watchers: 4
- Forks: 16
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-privacy-engineering - awesome-data-privacy
README
# Awesome Data Privacy and Security [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
> A curated list of data privacy and security resources### Content
---
* [Courses](#courses)
* [Books](#books)
* [Guides and Checklists](#guides-and-checklists)
* [Tools and Libraries](#tools-and-libraries)
* [Tutorials](#tutorials)
* [Journals](#journals)
* [Conferences](#conferences)
* [Related Awesome Lists](#related-awesome-lists)
* [Subreddits](#subreddits)
* [Certifications](#certifications)
* [Miscellaneous](#miscellaneous)### Courses
---
* [PSU - Privacy in Statistical Databases](http://www.cse.psu.edu/~ads22/courses/privacy598d/www/) (Fall 2007)
* [UPENN - Data Privacy](http://www.cis.upenn.edu/~aaroth/courses/privacyF11.html) (Fall 2011)
* [WUSTL - Data Security](https://www.cse.wustl.edu/~ychen/505A/Slides/lecture.html)
* [CMU - Privacy and Anonymity in Data](https://dataprivacylab.org/courses/pad1/index.html)
* [Bilkent - Data Privacy](http://www.cs.bilkent.edu.tr/~erman/CS577.html) (Spring 2016)
* [PSU - Algorithmic Challenges in Data Privacy](http://www.cse.psu.edu/~ads22/privacy598/) (Spring 2010)
* [Weizmann Inst. - Foundations of Privacy](http://www.wisdom.weizmann.ac.il/~naor/COURSE/foundations_of_privacy.html) (Fall 2015)
* [Caltech - Introduction to Data Privacy](http://courses.cms.caltech.edu/cs152/index.html) (Fall 2014)
* [Harvard - Mathematical Approaches to Data Privacy](http://people.seas.harvard.edu/~salil/diffprivcourse/spring13/) (Spring 2013)
* [UT Austin - Theory and Practice of Secure Systems](http://www.cs.utexas.edu/~shmat/courses/cs380s_fall09/) (Fall 2009)
* [Udemy - Data Security](https://www.udemy.com/data-security/)
* [UWaterloo - Computer Security and Privacy](https://crysp.uwaterloo.ca/courses/cs458/S19-material/) (Spring 2019)
* [University of Vermont - Data Privacy](https://jnear.github.io/cs295-data-privacy/) (Fall 2019)
* [University of Minnesota - The Algorithmic Foundations of Data Privacy](https://zstevenwu.com/courses/f18/csci8980_dp/index.html) (Fall 2018)
* [Columbia - Privacy and Online Social Networks](https://www.cs.columbia.edu/~bala/s14/index.html) (Spring 2014)
* [Georgia Tech - Cybersecurity Lecture Series](https://cyber.gatech.edu/cyber-lecture)
* [Eindhoven University of Technology - Principles of Data Protection](https://security1.win.tue.nl/~zannone/teaching/DTM/2IMS25-20-21.html) (Fall 2020)### Books
---
* [The Algorithmic Foundations of Differential Privacy](https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf)
* [Differential Privacy: A Primer for a Non-technical Audience](https://privacytools.seas.harvard.edu/files/privacytools/files/pedagogical-document-dp_new.pdf)
* [The Complexity of Differential Privacy](http://privacytools.seas.harvard.edu/files/privacytools/files/complexityprivacy_1.pdf)
* [Lectures on Data Security - Modern Cryptology in Theory and Practice](https://www.springer.com/us/book/9783540657576)
* [Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World](https://www.amazon.com/Data-Goliath-Battles-Collect-Control/dp/039335217X?crid=1JRRTVHWTK72I&keywords=data+security&qid=1536656236&sprefix=data+security%2Caps%2C258&sr=8-6&ref=sr_1_6)
* [The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data](https://www.amazon.com/Art-Invisibility-Worlds-Teaches-Brother/dp/0316380504?crid=1JRRTVHWTK72I&keywords=data+security&qid=1536656236&sprefix=data+security%2Caps%2C258&sr=8-2&ref=sr_1_2)
* [Permanent Record (by Edward Snowden)](https://amzn.to/30wxxXi)
* [Sandworm (by Andy Greenberg)](https://amzn.to/2FVByeJ)
* [Privacy by Design (by Nishant Bhajaria)](https://www.manning.com/books/privacy-by-design)### Guides and Checklists
---
* [OWASP User Privacy Protection Cheat Sheet](https://www.owasp.org/index.php/User_Privacy_Protection_Cheat_Sheet)
* [Mobile privacy: a better practice guide for mobile app developers](https://www.oaic.gov.au/resources/agencies-and-organisations/guides/guide-for-mobile-app-developers.pdf)
* [Securing Personal Information: A Self-Assessment Tool for Organizations](https://www.oipc.bc.ca/guidance-documents/1439)
* [Reasonable Security Checklist for Personal Information](https://oipc.novascotia.ca/sites/default/files/publications/Reasonable%20Security%20Checklist%20for%20Personal%20Information%20(22%20Sept%2015)_0.pdf)
* [Pro Privacy: Encryption for Privacy Guide](https://proprivacy.com/guides/the-ultimate-privacy-guide)
* [EFF: Surveillance Self-Defense](https://ssd.eff.org)### Tools and Libraries
---
#### Data Generation
* [Synthetic Data Generation Framework (SGF)](https://vbinds.ch/node/69)#### Anonymization
* [ARX - Open Source Data Anonymization Software](https://github.com/arx-deidentifier/arx)
* [UTD Anonymization Toolbox](http://cs.utdallas.edu/dspl/cgi-bin/toolbox/index.php?go=home)
* [Amnesia](https://amnesia.openaire.eu/)
* [Anonymizer](https://github.com/DivanteLtd/anonymizer)
* [Open Anonymizer](https://sourceforge.net/projects/openanonymizer/)
* [µArgus](http://neon.vb.cbs.nl/casc/mu.htm)
* [Cornell Anonymization Toolkit](https://sourceforge.net/projects/anony-toolkit/)
* [sdcMicro](https://github.com/sdcTools/sdcMicro)
* [anonymize-it](https://github.com/elastic/anonymize-it)
* [Microsoft Presidio - Data protection and anonymization API](https://github.com/microsoft/presidio)#### Differential Privacy
* [IBM Differential Privacy Library](https://github.com/IBM/differential-privacy-library)
* [Google- Differential Privacy Library](https://github.com/google/differential-privacy)
* [diffpriv](https://github.com/brubinstein/diffpriv)#### Machine Learning
* [Tensorflow Privacy](https://github.com/tensorflow/privacy)
* [IBM Differential Privacy Library](https://github.com/IBM/differential-privacy-library)#### Reporting and Analysis
* [RAPPOR by Google](https://github.com/google/rappor)
* [Fair Analytics](https://github.com/vesparny/fair-analytics)#### GDPR
* [OpenGDPR](https://github.com/opengdpr/opengdpr)Tools related to general privacy can be found in [privacy-respecting](https://github.com/nikitavoloboev/privacy-respecting) and [awesome-privacy](https://github.com/KevinColemanInc/awesome-privacy)
### Tutorials
---
* [Simons Institute - Differential Privacy Tutorial](https://www.youtube.com/watch?v=ekIL65D0R3o)
* Microsoft Research - Differential Privacy ([Part 1](https://www.youtube.com/watch?v=OfWj89oRD7g), [2](https://www.youtube.com/watch?v=1LTi6MmJf48), [3](https://www.youtube.com/watch?v=585hLnKDdUM), [4](https://www.youtube.com/watch?v=GQ0WCgvPdLE), [5](https://www.youtube.com/watch?v=gAvcQiFogr4))
* [CERIAS Purdue - A Practical Beginners' Guide to Differential Privacy](https://www.youtube.com/watch?v=Gx13lgEudtU)
* [USENIX - Differential Privacy: From Theory to Deployment](https://www.youtube.com/watch?v=Nvy-TspgZMs)### Journals
---
* [IEEE Transactions on Dependable and Secure Computing (TDSC)](https://www.computer.org/web/tdsc)
* [IEEE Security and Privacy Magazine](https://publications.computer.org/security-and-privacy/)
* [IEEE Security & Privacy](https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013)
* [ACM Transactions on Privacy and Security (TOPS)](https://dl.acm.org/citation.cfm?id=3208360)
* [International Journal of Information Security and Privacy(IJISP)](https://www.igi-global.com/journal/international-journal-information-security-privacy/1096)
* [Transactions on Data Privacy](http://www.tdp.cat/)
* [Computers and Security](https://www.journals.elsevier.com/computers-and-security)
* [IEEE Transactions on Information Forensics and Security](https://signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security)
* [Journal of Information Security and Applications](https://www.journals.elsevier.com/journal-of-information-security-and-applications)
* [International Journal of Information Security](https://www.springer.com/journal/10207)### Conferences
---
* [IEEE Symposium on Security and Privacy](https://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000646)
* [IEEE European Symposium on Security and Privacy](https://www.ieee-security.org/TC/EuroSP2019/index.php)
* [Other Security Related Conferences](http://www.wikicfp.com/cfp/servlet/tool.search?q=security&year=f)
* [Other Privacy Related Conferences](http://www.wikicfp.com/cfp/servlet/tool.search?q=privacy&year=f)### Related Awesome Lists
---
* [awesome-cryptography](https://github.com/sobolevn/awesome-cryptography)
* [awesome-appsec](https://github.com/paragonie/awesome-appsec)
* [awesome-security](https://github.com/sbilly/awesome-security)
* [personal-security-checklist](https://github.com/Lissy93/personal-security-checklist)
* [awesome-web-security](https://github.com/qazbnm456/awesome-web-security)
* [privacy-respecting](https://github.com/nikitavoloboev/privacy-respecting)
* [awesome-privacy](https://github.com/KevinColemanInc/awesome-privacy)### Subreddits
---
* [r/privacy](https://reddit.com/r/privacy)
* [r/security](https://reddit.com/r/security)
* [r/netsec](https://reddit.com/r/netsec)### Certifications
---
* [CISSP](https://www.isc2.org/Certifications/CISSP)
* [CISM](http://www.isaca.org/Certification/CISM-Certified-Information-Security-Manager/Pages/default.aspx)
* [Q/ISP](http://www.securityuniversity.net/QISP.php)### Miscellaneous
---
* [Privacy Patterns](https://privacypatterns.org/) Software engineering design solutions to privacy problems
* [Data Protection Laws around the World](https://www.dlapiperdataprotection.com/)
(e.g., [Turkey](https://www.dlapiperdataprotection.com/index.html?c=TR&c2=&t=law), [USA](https://www.dlapiperdataprotection.com/index.html?c=US&c2=&t=law))
* [GDPR Tracker](https://gdprtracker.io/) GDPR compliance of various cloud services & subprocessors
* [Data Processor Agreements](https://github.com/tollwerk/data-processing-agreements) A collection of data processor agrements
* [Privacy Incidents Database](https://sites.google.com/site/privacyincidentsdatabase/incidents)
* [The new EU General Data Protection Regulation in Under 60 Minutes!](https://www.youtube.com/watch?v=NxgZ57BTkFQ)
* [Facebook CEO Mark Zuckerberg testimony on data privacy before Senate committee](https://www.youtube.com/watch?v=GQN4On0K7-w)
* [Data Privacy for Data Scientists](https://github.com/KIProtect/data-privacy-for-data-scientists)