CIMM is taking a pro-active role in advancing new media nomenclature and processes with both its Lexicon(terms and definitions associated with Set-Top Box data measurement) and Asset Identification Primer (glossary of asset terms). These documents form the basis of this column, which offers a common language for Set-Top Box nomenclature that can expedite the rollout of the data for its many industry applications.
We have spent the last few weeks reviewing terms associated with anonymization and privacy. Data points can be hashed and de-identified (Set-Top-Box Lexicon: Types of Anonymization). Another way to insure privacy is to only allow certain users to access certain levels of information. Encryption is a gate key method used in Set-Top-Box data, which restricts data access to a select group or to a specific person.
See also Anonymization, De-identify, Hashed ID, Pretty Good Privacy Encryption
CIMM DEFINITION: A protection procedure where an algorithm is inserted into a process or dataset that will allow access to the content only to those who have the security key.
2: “A form of encoding transmitted data for security purposes. It normally requires the decryption “key” to decipher the transmission upon receipt. The level of security is dependent on the complexity of the key used. A method used to translate plaintext into ciphertext.” (Source: CableLabs)
3: “A process used to obfuscate information often used with MAC ID and / or system supplied keys.” (Source: Nielsen)
PGP abbr Pretty Good Privacy Encryption
See also: Anonymization
CIMM DEFINITION : Software that offers authentication and the ability to encrypt and decrypt data points.
NOTE - In some cases hashing is carried out daily which destroys ability to do Reach / Frequency / Frequency Distribution / ROI reporting because there is no persistent anonymous household identifier in those cases. (Source:TRA)
Please refer to the CIMM Lexicon online at http://www.cimm-us.org/lexicon.htm for additional information on these and other terms.