Confidential Computing And Privacy: Policy Implications of Trusted Execution Environments
Confidential computing leverages two key technologies: trusted execution environments and attestation services. The technology allows organizations to restrict access to personal information, intellectual property, or sensitive or high-risk data through a secure hardware-based enclave or “trusted execution environment” (TEE). Economic sectors that have led the way in adopting confidential computing include financial services, healthcare, and […]
FPF Files Comments on White House Office of Science and Technology Policy Actions to Advance Privacy-Enhancing Technologies
FPF Files Comments on White House Office of Science and Technology Policy Actions to Advance Privacy-Enhancing Technologies On July 8, 2022, FPF filed comments with the White House Office of Science and Technology Policy (OSTP) regarding specific actions that would advance the adoption of privacy-enhancing technologies (PETs). As emerging technologies continue to offer increased speed, […]
Privacy Tech Buyer Framework Report
This FPF resource helps buyers determine which privacy tools are the most appropriate for their business needs. The Privacy Tech Buyer Framework is a step-by-step tool that provides guidance on buying the best privacy technology through three phases that include simplified steps and case studies. The Privacy Tech Buyer Framework is a gap-filling document meant […]
Privacy Tech’s Third Generation A Review of the Emerging Privacy Tech Sector Report
The Privacy Tech’s Third Generation A Review of the Emerging Privacy Tech Sector report makes a series of recommendations, including that the industry define as a priority a common vernacular for privacy tech; set standards for technologies in the “privacy stack” such as differential privacy, homomorphic encryption, and federated learning; and explore the needs of […]