White Papers

Unlock the Five Safes and Maximize your Data

Get the most out of your data without compromising compliance and patient confidentiality...

GDPR and Anonymization

For companies wanting to do business in Europe, being GDPR-compliant is essential...

De-Identification 101: How to Protect Private Health Information

The growth in the use of electronic medical records, electronic insurance claims processing and other hospital software systems...

De-Identification 201: The Basics of Data De-identification

Only a handful of experts exist around the world who are qualified to manually de-identify data.

De-Identification 301: Understanding Your Likely Attackers

Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise.

De-Identification 401: De-Identifying Data the Right Way

Critics who question the value of de-identification often overlook the quality of the de-identification process.

Safe Harbor Versus The Statistical Method

To leverage protected health information (PHI) for secondary purposes, an understanding of the different de-identification mechanisms is required...

Perspectives on Health Data De-identification

Has your organization been considering de-identification? It’s not a simple undertaking to use Protected Health Information (PHI) for secondary purposes.

How Do You Make a De-identification Expert?

The HIPAA “expert determination” method for de-identifying health data offers the most promising way to minimize privacy risk while maximizing data utility.

Anonymization for Analytics

Data has become a precious, prized asset for healthcare organizations looking to control costs and improve patient care...

Filter by Data Type

Categories