No results found.
Here are some suggested resources.
White Papers
June 19, 2020
Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise. Re-identification results when a record is correctly tied to the person behind that data, even if the data was thought to have been made anonymous.
White Papers
June 19, 2020
Critics who question the value of de-identification often overlook the quality of the de-identification process. The issue is not whether there is value in de-identification but whether de-identification has been done properly so that data is truly anonymous. Not all de-identification practices are created equal.
Videos
June 10, 2020
Depending on where you’re based, and where you do business, your data requires certain levels of regulatory compliance. Learn how you can tackle this problem head-on.
White Papers
June 15, 2020
Has your organization been considering de-identification? It’s not a simple undertaking to use Protected Health Information (PHI) for secondary purposes. There is a lot of risk when dealing with PHI.
Videos
June 10, 2020
Data masking. De-identification. Anonymization. These terms come up often in discussions about data privacy, but their definitions are sometimes unclear. Learn what the terms mean and how they differ from each other.
Videos
June 10, 2020
The HIPAA Privacy Rule outlines specific ways to de-identify Protected Health Information (PHI). Learn your options and which one is best for your organization.