Upcoming NIST Workshop to Focus on Draft Privacy Engineering Concepts
Time 1 Minute Read
Categories: Events, Online Privacy

On September 15-16, 2014, the National Institute of Standards and Technology (“NIST”) will sponsor a workshop to further its Privacy Engineering initiative. The workshop will focus on developing draft privacy engineering definitions and concepts that will be explored in a forthcoming NIST report.

Draft workshop materials available on the NIST website highlight some of the issues to be considered, and include a Model Discussion Draft that details NIST’s privacy engineering objectives. In addition, a draft Privacy Engineering discussion deck provides proposed definitions for key terms, lists “Problematic Data Actions” (such as appropriation or distortion of personal information, induced disclosure, surveillance and unanticipated revelation), and identifies certain harms to individuals that may arise from those problematic actions. The deck concludes with a list of discussion questions to be addressed during the workshop. NIST also will be accepting comments on the discussion questions via email to privacyeng@nist.gov through September 30, 2014.

Interested parties can register online for the workshop through the IAPP website.  There is no charge to attend the workshop.

You May Also Be Interested In

Time 10 Minute Read

On July 23, 2025, the Trump Administration published an AI Action Plan and three Executive Orders on AI.

Time 2 Minute Read

In April 2025, the National Institute of Standards and Technology announced the release of a draft update to its voluntary Privacy Framework, “NIST Privacy Framework 1.1 Initial Public Draft.”

Time 1 Minute Read

On March 24, 2025, the U.S. National Institute of Standards and Technology published a report titled “Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations.”

Time 3 Minute Read

Last week President Biden issued Executive Order 14144, titled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity,” which aims to strengthen software supply chain security, impose more stringent cybersecurity requirements on federal contractors, combat cybercrime, and encourage the development of identity verification technologies.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Archives

Jump to Page