Resources

No results found.

Here are some suggested resources.

White Papers

Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise. Re-identification results when a record is correctly tied to the person behind that data, even if the data was thought to have been made anonymous.

White Papers

Critics who question the value of de-identification often overlook the quality of the de-identification process. The issue is not whether there is value in de-identification but whether de-identification has been done properly so that data is truly anonymous. Not all de-identification practices are created equal.

White Papers

Has your organization been considering de-identification? It’s not a simple undertaking to use Protected Health Information (PHI) for secondary purposes. There is a lot of risk when dealing with PHI.

Videos

The HIPAA Privacy Rule outlines specific ways to de-identify Protected Health Information (PHI). Learn your options and which one is best for your organization.

Not finding what you're looking for?

Filter by Data Type

Categories