This document discusses various privacy preservation techniques in data mining. It summarizes classification, clustering, and association rule learning as common privacy preservation approaches. For classification, it describes decision trees, k-nearest neighbors, artificial neural networks, support vector machines, and naive Bayes models. It provides advantages and disadvantages of these techniques. The document concludes that privacy preservation techniques have emerged to allow for efficient and effective data mining while protecting sensitive data.