White Papers

Resources: White Papers

White Papers

The reuse of personal data is often essential to an organization’s data strategy, but organizations can only reuse personal data if they meet the demands of privacy regulations. Fulfilling these demands in an ad hoc way can lead to bottlenecks and can block organizations from unlocking the true potential of their data.

White Papers

Get the most out of your data without compromising compliance and patient confidentiality. Learn how our Five Safes framework can help you develop a robust de-identification strategy.

White Papers

For companies wanting to do business in Europe, being GDPR-compliant is essential. Learn more about the rights of access and erasure the legislation covers as well as what types of data must be anonymized.

White Papers

Only a handful of experts exist around the world who are qualified to manually de-identify data. This is because de-identification is a complex and challenging field that requires highly specific knowledge. Simply removing the names and other types of direct identifiers from a dataset is insufficient to achieve de-identification.

White Papers

Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise. Re-identification results when a record is correctly tied to the person behind that data, even if the data was thought to have been made anonymous.

White Papers

Critics who question the value of de-identification often overlook the quality of the de-identification process. The issue is not whether there is value in de-identification but whether de-identification has been done properly so that data is truly anonymous. Not all de-identification practices are created equal.

White Papers

To leverage protected health information (PHI) for secondary purposes, an understanding of the different de-identification mechanisms is required. Under the U.S. Health Insurance Portability and Accountability Act (HIPAA), there are two methods for de-identification.

White Papers

Has your organization been considering de-identification? It’s not a simple undertaking to use Protected Health Information (PHI) for secondary purposes. There is a lot of risk when dealing with PHI.

White Papers

The HIPAA “expert determination” method for de-identifying health data offers the most promising way to minimize privacy risk while maximizing data utility.

Not finding what you're looking for?

Filter by Data Type

Categories

Join the next 5 Safes Data Privacy webinar

This course runs on the 2nd Wednesday of every month, at 11 a.m. ET (45 mins). Click the button to register and select the date that works best for you.