Videos

Resources: Videos

No results found.

Here are some suggested resources.

Videos

Privacy Analytics’ flexible, extensible platform – with technology and commercial software options – enables you to put your sensitive data to work.

Videos

Learn how Privacy Analytics can help you turn transparency into greater value for your enterprise.

Videos

In this video, Privacy Analytics’ GM, Sarah Lyons, describes how to gain business value from sensitive data without running afoul of regulations or public trust.

Videos

In this video, Privacy Analytics’ GM, Sarah Lyons, explains how risk-based anonymization can help you turn your most sensitive data into a powerful asset.

Videos

Depending on where you’re based, and where you do business, your data requires certain levels of regulatory compliance. Learn how you can tackle this problem head-on.

Videos

Data masking. De-identification. Anonymization. These terms come up often in discussions about data privacy, but their definitions are sometimes unclear. Learn what the terms mean and how they differ from each other.

Videos

The HIPAA Privacy Rule outlines specific ways to de-identify Protected Health Information (PHI). Learn your options and which one is best for your organization.

Videos

You need to choose a de-identification method that will give you the richest possible data for the lowest risk. Learn why Expert Determination is your best bet.

Videos

Switching de-identification methods might be the most valuable data decision your company can make. In this video, Luk Arbuckle, Privacy Analytics’ Chief Methodologist, covers the basics of switching.

Videos

Should you invest in building internal de-identification capability? Watch this short video to find out.
Loading More...

Not finding what you're looking for?

Keyword Search

Search

Filter by Data Type

Categories

Archiving / Destroying

Are you unleashing the full value of data you retain?

Your Challenges

Do you need help...

OUR SOLUTION

Value Retention

Client Success

Client: Comcast

Situation: California’s Consumer Privacy Act inspired Comcast to evolve the way in which they protect the privacy of customers who consent to share personal information with them.

Evaluating

Are you achieving intended outcomes from data?

Your Challenge

Do you need help...

OUR SOLUTION

Unbiased Results

Client Success

Client: Integrate.ai

Situation: Integrate.ai’s AI-powered tech helps clients improve their online experience by sharing signals about website visitor intent. They wanted to ensure privacy remained fully protected within the machine learning / AI context that produces these signals.

Accessing

Do the right people have the right data?

Your Challenges

Do you need help...

OUR SOLUTION

Usable and Reusable Data

Client Success

Client: Novartis

Situation: Novartis’ digital transformation in drug R&D drives their need to maximize value from vast stores of clinical study data for critical internal research enabled by their data42 platform.

 

Maintaining

Are you empowering people to safely leverage trusted data?

Your Challenges

Do you need help...

OUR SOLUTION

Security / compliance efficiency

CLIENT SUCCESS

Client: ASCO’s CancerLinQ

Situation: CancerLinQ™, a subsidiary of American Society of Clinical Oncology, is a rapid learning healthcare system that helps oncologists aggregate and analyze data on cancer patients to improve care. To achieve this goal, they must de-identify patient data provided by subscribing practices across the U.S.

 

Acquiring / Collecting

Are you acquiring the right data? Do you have appropriate consent?

Your Challenge

Do you need help...

OUR SOLUTIONS

Consent / Contracting strategy

Client Success

Client: IQVIA

Situation: Needed to ensure the primary market research process was fully compliant with internal policies and regulations such as GDPR. 

 

Planning

Are You Effectively Planning for Success?

Your Challenges

Do you need help...

OUR SOLUTION

Build privacy in by design

Client Success

Client: Nuance

Situation: Needed to enable AI-driven product innovation with a defensible governance program for the safe and responsible use
of voice-to-text data under Shrems II.

 

Join the next 5 Safes Data Privacy webinar

This course runs on the 2nd Wednesday of every month, at 11 a.m. ET (45 mins). Click the button to register and select the date that works best for you.