What’s in your data?

December 7, 2015

Understanding how you categorize your data is the first step in the data sharing process. As proponents of risk-based de-identification,…

Limiting Risk When Sharing PHI

November 30, 2015

Six Strategies for Privacy Officers to Protect their Organization and Limit Risk when Sharing PHI Privacy Officers have a huge…

De-identifying Unstructured Data

November 23, 2015

There is a surplus of analytics waiting to be tapped by de-identifying unstructured data resources Often overlooked, unstructured data is…

Re-identification Attacks

November 16, 2015

Attacks on your data can come in various forms – avoid re-identification by understanding where these threats come from.

Anonymizing Clinical Trial Data in Practice

November 9, 2015

On October 29, 2015, Privacy Analytics held a side event at the 37th International Privacy Conference in Amsterdam, The Netherlands….

Fundamentals of De-Identification

November 2, 2015

You know why you need to de-identify, now get an idea of how When it comes to de-identification, a risk-based…

ROI on De-identification

October 26, 2015

Understanding the true value of anonymization means realizing how your organization can see ROI on de-identification. Many healthcare organizations are…

An Optimal Approach to De-Identification

October 19, 2015

Real de-identification is a risk management exercise We often hear people say de-identification doesn’t work. We hear this so often,…

Learning about the HIPAA Privacy Rule

October 13, 2015

Understanding the differences between the two veins of the Privacy Rule Initially proposed in November 1999, the U.S. Health Insurance…

Blurred Lines

October 5, 2015

Avoid blurred lines: data masking and real de-identification are not the same Often confused, data masking and de-identification are not…

A Primer on Protecting Health Information

September 29, 2015

Everything you need to know about PHI and de-identification (but were too afraid to ask) With the growing use of…

HIPAA Data Breaches on the Rise

September 21, 2015

A data breach occurs when secure information is intentionally OR unintentionally released into an untrusted environment. In the healthcare space,…

Free Webinar: De-Identification 101

Join Privacy Analytics for a high level introduction of de-identification and data masking.
Watch now

Free Download: De-Id 101

You have Successfully Subscribed!