White Papers

Good Governance for Anonymized Data

A lot of focus is given to data governance for personal data, and just as much focus can be given to data governance for anonymized data to manage residual risks.

Advancing Privacy-Enhancing Technologies

The importance of data sharing and analytics to drive evidence-based decision making has been highlighted by data science consortia and researchers alike.

Find Out Why Privacy Analytics Is a Top 3 Data Masking Provider Worldwide

The right data masking technology is critical to safely unlocking the value of your organization’s sensitive data for uses beyond its original intended...

Solutions for Complex Data Environments

The reuse of personal data is often essential to an organization’s data strategy, but organizations can only reuse personal data if they meet the demands of privacy regulations.

Unlock the Five Safes and Maximize your Data

Get the most out of your data without compromising compliance and patient confidentiality...

GDPR and Anonymization

For companies wanting to do business in Europe, being GDPR-compliant is essential...

De-Identification 101: How to Protect Private Health Information

The growth in the use of electronic medical records, electronic insurance claims processing and other hospital software systems...

De-Identification 201: The Basics of Data De-identification

Only a handful of experts exist around the world who are qualified to manually de-identify data.

De-Identification 301: Understanding Your Likely Attackers

Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise.

De-Identification 401: De-Identifying Data the Right Way

Critics who question the value of de-identification often overlook the quality of the de-identification process.

Top 5 Drawbacks to Using Only Data Masking

Although data masking and de-identification are often grouped together for discussion, the two use different approaches in making data anonymous.

The Definitive Guide to De-identification

More and more organizations are leveraging their health data for secondary purposes. They know just locking away their data in silos will no longer suffice.

What’s the Risk – Sharing Data for Secondary Use

Privacy Officers know that sharing data for secondary use is inherently an exercise in risk management.

Strengthening Secondary Use

Data registries are an invaluable tool that require the secondary use of data for conducting evidence-based healthcare research.

Unlocking Big Data for Healthcare

There are powerful opportunities facing healthcare today. Big Data Analytics (BDA) is being leveraged by a broad spectrum of healthcare organizations to solve ongoing challenges...

A Privacy Governance Framework to Support De-identification

While technology is an important enabler of data de-identification, technology is not the end of the story.

Avoid the Blur of Data Masking

Learn the difference between data masking and de-identification. Often confused, data masking and de-identification are not synonymous terms when it comes to unlocking protected health information ...

Filter by Data Type

Categories