EHR vs EMR – What’s the difference?

March 14, 2016

After attending a recent trade show, it became apparent that organizations with similar products will use EHR vs EMR –…

New De-identification Training Program Launched

February 29, 2016

Newly launched training program addresses HIPAA Certification Gap Last week we shared the exciting news – Privacy Analytics and HITRUST…

Stolen Healthcare Data on the Rise

February 16, 2016

Protecting Healthcare Data before There’s a Breach In December 2015, the Louisiana Attorney General’s Medicaid Fraud Control Unit notified Louisiana…

Looking for a Moonshot

February 8, 2016

When the Vice-President of the Unites States sends out a call, you can’t help but answer it. Mid-January, VP Joe…

Sharing Individual Participant Data in the UK

January 18, 2016

Late last year, the BMC Medicine Journal published the recommended guidelines, “How should individual participant data (IPD) from clinical trials…

Safeguarding Against Data Breaches

January 11, 2016

At the end of December, Health IT Security published the article, ‘How Technical Safeguards Prevent Healthcare Data Breaches’ by Sara…

New Year, New Possibilities

January 4, 2016

What’s coming up for Privacy Analytics in the start of the new year After a wonderful holiday of family, friends…

Making the Case for De-identification

December 14, 2015

When sharing sensitive data for secondary purposes, there is no question that the data must be de-identified. As proponents of…

What’s in your data?

December 7, 2015

Understanding how you categorize your data is the first step in the data sharing process. As proponents of risk-based de-identification,…

Limiting Risk When Sharing PHI

November 30, 2015

Six Strategies for Privacy Officers to Protect their Organization and Limit Risk when Sharing PHI Privacy Officers have a huge…

De-identifying Unstructured Data

November 23, 2015

There is a surplus of analytics waiting to be tapped by de-identifying unstructured data resources Often overlooked, unstructured data is…

Re-identification Attacks

November 16, 2015

Attacks on your data can come in various forms – avoid re-identification by understanding where these threats come from.

Free Webinar: De-Identification 101

Join Privacy Analytics for a high level introduction of de-identification and data masking.
Watch now

Free Download: De-Id 101

You have Successfully Subscribed!