White Papers

Resources: White Papers

White Papers

Which strategies do you use to bolster your organization’s data-sharing initiatives? Are they primarily defensive or offensive? Which approach works best? Download this event summary to find out.

White Papers

What challenges and opportunities do you face when attempting to leverage and share sensitive data to drive innovation and increase ROI? How do other data and analytics leaders tackle this challenge? Download this event summary and find out.

White Papers

The reuse of personal data is often essential to an organization’s data strategy, but organizations can only reuse personal data if they meet the demands of privacy regulations. Fulfilling these demands in an ad hoc way can lead to bottlenecks and can block organizations from unlocking the true potential of their data.

White Papers

Get the most out of your data without compromising compliance and patient confidentiality. Learn how our Five Safes framework can help you develop a robust de-identification strategy.

White Papers

For companies wanting to do business in Europe, being GDPR-compliant is essential. Learn more about the rights of access and erasure the legislation covers as well as what types of data must be anonymized.

White Papers

Only a handful of experts exist around the world who are qualified to manually de-identify data. This is because de-identification is a complex and challenging field that requires highly specific knowledge. Simply removing the names and other types of direct identifiers from a dataset is insufficient to achieve de-identification.

White Papers

Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise. Re-identification results when a record is correctly tied to the person behind that data, even if the data was thought to have been made anonymous.

White Papers

Critics who question the value of de-identification often overlook the quality of the de-identification process. The issue is not whether there is value in de-identification but whether de-identification has been done properly so that data is truly anonymous. Not all de-identification practices are created equal.

Not finding what you're looking for?

Filter by Data Type

Categories

Join the next 5 Safes Data Privacy webinar

This course runs on the 2nd Wednesday of every month, at 11 a.m. ET (45 mins). Click the button to register and select the date that works best for you.