No results found.
Here are some suggested resources.
White Papers
June 19, 2020
Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise. Re-identification results when a record is correctly tied to the person behind that data, even if the data was thought to have been made anonymous.
White Papers
June 19, 2020
Critics who question the value of de-identification often overlook the quality of the de-identification process. The issue is not whether there is value in de-identification but whether de-identification has been done properly so that data is truly anonymous. Not all de-identification practices are created equal.
Videos
June 10, 2020
Depending on where you’re based, and where you do business, your data requires certain levels of regulatory compliance. Learn how you can tackle this problem head-on.
Videos
June 10, 2020
Data masking. De-identification. Anonymization. These terms come up often in discussions about data privacy, but their definitions are sometimes unclear. Learn what the terms mean and how they differ from each other.
Webinars
Date of Webinar: June 19, 2020
August 17, 2020
California’s Consumer Privacy Act inspired Comcast to evolve the way in which the company protects the privacy of customers who consent to share personal information with them. Doina Iepuras, Senior Principal Architect at Comcast, explains how this large telecom conglomerate developed and deployed a strong privacy program within nine months in collaboration with Privacy Analytics.
Webinars
Date of Webinar: June 11, 2020
August 19, 2020
How can companies leverage the increasing business value of the sensitive data they manage (without running afoul of statutory regulations, or stakeholder trust)? Our…