Articles

7 Questions to Evolve Your Privacy Strategy

Shifting Gears: Transitioning from Ad Hoc to Proactive Privacy

3 Core Steps to Developing a Robust Privacy Strategy

Data privacy: A C-suite issue with high stakes

How Context Affects Anonymization in AI Model Development

Building an AI model can require large amounts of data about people, and this data needs to be appropriately handled and managed. To protect the privacy of people in the data, anonymized data can be ...

Data Privacy, AI, De-identification, and Anonymization: Putting It All Together

In 2024, we shared several short articles about de-identified or anonymized data. Here, we take a look at how they intersect.

Why Context Matters When Anonymizing Data

If you’ve been involved in anonymization projects (such as Expert Determinations under HIPAA), you may have been asked to describe the data context in detail: how the data will be used, where it will ...

How to Work Safely with Unstructured Text Data

Unstructured data sources—including text, images, audio, and video—are rich sources of information. They can drive technological innovation and power diverse use cases such as synthetic data ...

Data Privacy Considerations for DICOM Anonymization

Across industries, demand for medical images is on the rise. This is due to increased use cases, such as AI, which can support applications for diagnostics, tracking disease progression, and planning ...

Motivated Intruder Testing – What, How, and Why?

Many organizations are familiar with statistical assessments of identifiability, like Expert Determinations under HIPAA or anonymization assessments under other regulations like the GPDR. In these ...

10 Best Practices for Re-identification Risk Determinations

Re-identification Risk Determinations (RRDs) are assessments where an expert applies generally accepted statistical methods to determine how identifiable individuals are in a dataset. The expert will ...

An Integrated Approach to Securing AI

As artificial intelligence (AI) continues to expand across various sectors, securing these systems against potential threats has become increasingly important. Our previous article, A Blueprint for ...

Filter by Data Type

Categories