Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Introduction


NIST's Privacy Engineering Collaboration Space is an online venue open to the public where practitioners can discover, share, discuss, and improve upon open source tools, solutions, and processes that support privacy engineering and risk management.

Focus Areas

NIST has launched this space with an initial focus on de-identification and privacy risk assessment. Please limit your contributions to these topics. NIST welcomes collabspace [at] nist.gov (feedback) on future topics of interest. 

De-identification: a technique or process applied to a dataset with the goal of preventing or limiting certain types of privacy risks to individuals, protected groups, and establishments, while still allowing for the production of aggregate statistics. This focus area includes a broad scope of de-identification to allow for noise-introducing techniques such as differential privacy, data masking, and the creation of synthetic datasets that are based on privacy-preserving models.

Privacy Risk Assessment: a process that helps organizations to analyze and assess privacy risks for individuals arising from the processing of their data. This focus area includes, but is not limited to, risk models, risk assessment methodologies, and approaches to determining privacy risk factors.

Contributing to the Space

Contributions are made through our GitHub repository, and they come in three categories:

  1. Tool: A tool can be an open source solution or process, ranging from software to frameworks.
  2. Use Case: A use case is an example of an organization processing data about individuals for some explicit purpose(s) (e.g., where a goal is to prevent re-identification of the data during its processing, improve privacy risk assessment practices).
  3. Feedback: Help the community. Provide feedback on tools and use cases.

Tools and use cases are contributed via pull requests, while feedback is contributed via issues.

How to Contribute

Need help or have feedback?

Email us for assistance with using the space, or to submit feedback on future topics of interest.

collabspace [at] nist.gov (Contact Us)

Created October 28, 2018, Updated August 6, 2019