Courses & Educational Materials

The Privacy Tools project develops open access course materials and videos on data privacy from a variety of disciplinary perspectives.

A full list of courses is available here.

Learning more about Privacy in General

Open Course Materials: Bits: The Computer Science of Digital Information

Bits: The Computer Science of Digital Information
Professor: Harry R. Lewis, PhD, Gordon McKay Professor of Computer Science, Harvard University

Course Description: This course focuses on information as quantity, resource, and property. We study the application of quantitative methods to understanding how information technologies inform issues of public policy, regulation, and law. How are music, images, and telephone conversations represented digitally, and how are they moved reliably from place to place through wires, glass fibers, and the air? Who owns information, who owns software, what forms of regulation and law restrict the communication and use of information, and does it matter? How can personal privacy be protected at the same time that society benefits from communicated or shared information?

The recorded lectures are from the Harvard Faculty of Arts and Sciences course Quantitative Reasoning 48, which was offered as an online course at the Extension School. The Quicktime and MP3 formats are available for download, or you can play the Flash version directly.

Course Materials: View all lectures related to privacy

Learning more about Privacy as a Practicing Social Scientist

Open Course Materials: “Managing Confidential Data”

If you are a practicing social scientist, Micah Altman's course "Managing Confidential Data" may be on interest. Below is information on the course, including slides.

Course: "Managing Confidential Data”"

Professor: Micah Altman

Course Description: This tutorial provides a framework for identifying and managing confidential information in research. It is most appropriate for mid-late career graduate students, faculty, and professional research staff who actively engage in the design/planning of research. The course will provide an overview of the major legal requirements governing confidential research data; and the core technological measures used to safeguard data. And it will provide an introduction to the statistical methods and software tools used to analyze and limit disclosure risks. Failures of confidentiality threaten research integrity, reputation, legality, and funding. Every researcher in the social, behavioral and health sciences must understand how to manage confidential information in research. Successful management of confidential information is particularly challenging because it requires satisfying a combination of complex legal, statistical and technological constants. And the management of this information has grown increasingly challenging because of recent changes in the law, new forms of data collection, and advances in statistical methods for linking data. Course materials for "Managing Confidential Information" are available here.

This course was offered twice in 2015 and once so far in 2016.

Course Website:

Course Materials:

Managing Confidential Data: Tutorial Video

Below is a tutorial video of co-PI Micah Altman presenting "Managing Confidential Data," from our Summer Interns' Orientation (Summer 2015)

Learning more about Differential Privacy

Open Course Materials: Differential Privacy

Course: CS227r : Topics In Cryptography and Privacy-- Differential Privacy (Fall 2014)
Teaching Fellow: PhD Candidate Mark Bun

The syllabus, readings, and homework assignments are available on the course website.

Course: CS 229r: Mathematical Approaches to Data Privacy (Spring 2013)

The syllabus, reading list, and homework assignments are available on the course website.

Books and Surveys

  • A popular article on differential privacy, aimed at the general public.

Ori Heffetz and Katrina Ligett, Privacy and Data-Based Research

  • A survey about the need to preserve privacy when sharing research datasets, failed attempts at data anonymization, and differential privacy as a solution.  Aimed at practicing social scientists, and requires almost no mathematical knowledge at all.

Daniel Muise and Kobbi Nissim, Differential Privacy in CDFs

  • This presentation familiarizes social scientists with the errors introduced by differential privacy (DP), and explains how to manage DP’s random noise. It explains the effect of random noise introduced in DP-computations by making analogies to sampling error, and focuses on the case of cumulative density functions (CDFs) and histograms.

Collaborator Cynthia Dwork, A Firm Foundation for Private Data Analysis

  • A survey article on differential privacy, aimed at a broad computer science audience, with some mathematical background.
  • A comprehensive book about the theory of differential privacy, suitable for graduate students or advanced undergraduates in computer science or other mathematical sciences. Even non-CS audience would appreciate the first two episodes, which overlap greatly with the others surveys below.
Salil Vadhan, Complexity of Privacy
  • This tutorial provides an introduction to and overview of differential privacy, with the goal of conveying its deep connections to a variety of other topics in computational complexity, cryptography, and theoretical computer science at large.
Mallesh Pai and Aaron Roth, Privacy and Mechanism Design
  • A survey of the many connections between differential privacy and economic mechanism design, aimed at mathematically oriented readers having some familiarity with game theory and mechanism design.

Tutorial Videos

Tutorial Videos
PI Salil Vadhan's Nontechnical Introduction to Differential Privacy (Summer Intern Orientation 2015)
Senior Researcher Kobbi Nissim's Technical Introduction to Differential Privacy (Summer Intern Orientation 2015)
Tutorial Videos Links

Learning more about Cryptography

Open Course Materials: Cryptography

Professor: Salil P. Vadhan

Course Description: Algorithms to guarantee privacy and authenticity of data during communication and computation. Rigorous proofs of security based on precise definitions and assumptions. Topics may include one-way functions, private-key and public-key encryption, digital signatures, pseudorandom generators, fully homomorphic encryption, and the role of cryptography in network and systems security.

Fall 2013 and fall 2006 lecture notes, videos, and homework assignments are available on the course website.

Summer 2015 Project Tutorials

Summer 2015 Project Tutorials

Project Tutorial, Salil Vadhan (38:58 mins) Dataverse Overview, James Honaker (36:22 mins)

Legal Overview, Alexandra Wood (18:03 mins)

DataTags Demo, Michael Bar-Sinai

and Alexandra Wood (42:59 mins)

Managing Confidential Data, Micah Altman (40:26 mins) Differential Privacy (nontechnical), Salil Vadhan (50:44 mins)
R Tutorial, James Honaker (1:13:40 mins) Differential Privacy (technical), Kobbi Nissim (1:08:29 mins)