Our Methodology

Remove what’s personal from your data.
Preserve what's valuable to your business.

Unlock the power of your data

Taking the right approach to data anonymization is critical to earn trust, avoid a privacy violation and ensure the utility of your data isn’t lost. It empowers you to use your data with confidence—to innovate, to grow your business and to improve the services that you deliver.

Are you taking the right approach?

Other methods undermine your data’s value

Many anonymization service providers “mask” data or apply simple rules that ignore the context in which data will be used or shared. This can easily reduce the utility of the data, potentially limiting innovation and new sources of revenue.

Watch this short video to learn more about the critical differences between data masking, de-identification and anonymization.

A risk-based approach delivers the best results

With risk-based anonymization, commercial and societal value can be unlocked from even the most sensitive personal data without compromising individual privacy or regulatory compliance.

Privacy Analytics has been setting the global standard for risk-based anonymization of personal information since 2007. Our methodology is recognized and aligned with global standards and best practices from around the world.

Learn more about the value and benefits of a risk-based approach by watching our video “What is Risk-Based Anonymization?”

Why should you trust our methodology?

Privacy Analytics’ methodology is a scalable and proportionate approach to compliance, resulting in service and software solutions that ensure data are useful while being sufficiently protected.

This methodology has been developed and is continuously refined based on:

  1. Precedents established by reputable organizations
  2. Regulatory guidance
  3. Engagement with global standards-setting bodies
  4. Working hand-in-hand with our clients to understand their evolving needs

“In a context where the privacy landscape is changing faster than ever, our Agile development team iterates quickly to solve our clients’ core challenge: maximizing their data value while protecting privacy.” 

Khaldoun El Abidine,

Director of Technology, Privacy Analytics

“We devote a lot of effort keeping up to date with evolving regulations and the changing expectations around privacy in the market. This translates into innovative and effective products and solutions for our clients.”

Santa Borel,

Senior Data Scientist, Privacy Analytics

How we achieve the outcome you need

Our structured approach to evaluate identifiability depends on the intended use-case for the data.

We consider:

Who will use your data

The physical and digital environment in which they have access

The potential for any kind of data breach

These assessments enable us to arrive at an overall measure of identifiability. Our measures of identifiability are used to inform you on what must be done from a technical, operational and strategic level to maintain the utility of your data while maintaining privacy.

We can then apply our proven processes and proprietary algorithms to de-identify your data to an appropriate threshold based on established benchmarks.

Attend Your Free Introduction to Data Privacy

Luk Arbuckle,

Chief Methodologist

Luk advises F500 enterprises on data privacy and co-authored, Building an Anonymization Pipeline: Creating Safe Data (O’Reilly Media).

In this free 25-minute online course, Chief Methodologist Luk Arbuckle provides an overview of data privacy fundamentals and introduces the 5 Safes of Risk-Based Anonymization.

Start your journey to turn data privacy into a competitive advantage for your organization.

Archiving / Destroying

Are you unleashing the full value of data you retain?

Your Challenges

Do you need help...


Value Retention

Client Success

Client: Comcast

Situation: California’s Consumer Privacy Act inspired Comcast to evolve the way in which they protect the privacy of customers who consent to share personal information with them.


Are you achieving intended outcomes from data?

Your Challenge

Do you need help...


Unbiased Results

Client Success

Client: Integrate.ai

Situation: Integrate.ai’s AI-powered tech helps clients improve their online experience by sharing signals about website visitor intent. They wanted to ensure privacy remained fully protected within the machine learning / AI context that produces these signals.


Do the right people have the right data?

Your Challenges

Do you need help...


Usable and Reusable Data

Client Success

Client: Novartis

Situation: Novartis’ digital transformation in drug R&D drives their need to maximize value from vast stores of clinical study data for critical internal research enabled by their data42 platform.



Are you empowering people to safely leverage trusted data?

Your Challenges

Do you need help...


Security / compliance efficiency


Client: ASCO’s CancerLinQ

Situation: CancerLinQ™, a subsidiary of American Society of Clinical Oncology, is a rapid learning healthcare system that helps oncologists aggregate and analyze data on cancer patients to improve care. To achieve this goal, they must de-identify patient data provided by subscribing practices across the U.S.


Acquiring / Collecting

Are you acquiring the right data? Do you have appropriate consent?

Your Challenge

Do you need help...


Consent / Contracting strategy

Client Success

Client: IQVIA

Situation: Needed to ensure the primary market research process was fully compliant with internal policies and regulations such as GDPR. 



Are You Effectively Planning for Success?

Your Challenges

Do you need help...


Build privacy in by design

Client Success

Client: Nuance

Situation: Needed to enable AI-driven product innovation with a defensible governance program for the safe and responsible use
of voice-to-text data under Shrems II.


Join the next 5 Safes Data Privacy webinar

This course runs on the 2nd Wednesday of every month, at 11 a.m. ET (45 mins). Click the button to register and select the date that works best for you.