White Papers

How to de-identify (almost) everything

Statistical de-identification is enjoying a rise in interest, driven by increased regulation and skyrocketing data demands fed by tokenization and linkage technology, as well as AI initiatives.

10 Best Practices for ROI on HIPAA Expert Determination

The Health Insurance Portability and Accountability Act (HIPAA) requires de-identification experts to follow...

Differential Privacy and Risk Metrics for Creating Safe Data

Sensitive data can be reused in many ways to improve healthcare services, uncover new insights and opportunities that can influence healthcare...

Good Governance for Anonymized Data

A lot of focus is given to data governance for personal data, and just as much focus can be given to data governance for anonymized data to manage residual risks.

5 Best Practices for Driving Value Through Data Stewardship

Privacy Analytics facilitates an Executive Advisory Board (EAB) comprised of 21 senior-level executives working in data, analytics, privacy, and legal roles in private and public organizations.

Advancing Privacy-Enhancing Technologies

The importance of data sharing and analytics to drive evidence-based decision making has been highlighted by data science consortia and researchers alike.

Find Out Why Privacy Analytics Is a Top 3 Data Masking Provider Worldwide

The right data masking technology is critical to safely unlocking the value of your organization’s sensitive data for uses beyond its original intended...

Developing a Data-Sharing Leadership Playbook

Which strategies do you use to bolster your organization’s data-sharing initiatives? Are they primarily defensive or offensive?

Data Sharing: Strategies for an Uncertain World

What challenges and opportunities do you face when attempting to leverage and share sensitive data to drive innovation and increase ROI?

Solutions for Complex Data Environments

The reuse of personal data is often essential to an organization’s data strategy, but organizations can only reuse personal data if they meet the demands of privacy regulations.

Unlock the Five Safes and Maximize your Data

Get the most out of your data without compromising compliance and patient confidentiality...

GDPR and Anonymization

For companies wanting to do business in Europe, being GDPR-compliant is essential...

De-Identification 101: How to Protect Private Health Information

The growth in the use of electronic medical records, electronic insurance claims processing and other hospital software systems...

De-Identification 201: The Basics of Data De-identification

Only a handful of experts exist around the world who are qualified to manually de-identify data.

De-Identification 301: Understanding Your Likely Attackers

Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise.

De-Identification 401: De-Identifying Data the Right Way

Critics who question the value of de-identification often overlook the quality of the de-identification process.

Safe Harbor Versus The Statistical Method

To leverage protected health information (PHI) for secondary purposes, an understanding of the different de-identification mechanisms is required...

Perspectives on Health Data De-identification

Has your organization been considering de-identification? It’s not a simple undertaking to use Protected Health Information (PHI) for secondary purposes.

How Do You Make a De-identification Expert?

The HIPAA “expert determination” method for de-identifying health data offers the most promising way to minimize privacy risk while maximizing data utility.

Anonymization for Analytics

Data has become a precious, prized asset for healthcare organizations looking to control costs and improve patient care...

What’s the Risk – Sharing Data for Secondary Use

Privacy Officers know that sharing data for secondary use is inherently an exercise in risk management.

Will the 21st Century Cures Act Help or Hinder Secondary Use of Health Data?

The 21st Century Cures Act is proposed legislation that aims to accelerate the discovery, development and delivery of life-saving therapies for patients...

Strengthening Secondary Use

Data registries are an invaluable tool that require the secondary use of data for conducting evidence-based healthcare research.

Unlocking Big Data for Healthcare

There are powerful opportunities facing healthcare today. Big Data Analytics (BDA) is being leveraged by a broad spectrum of healthcare organizations to solve ongoing challenges...

Managing Privacy: The Imperative RWE Capability

As privacy compliance standards are changing frequently, healthcare organizations need to be confident in their privacy practices when leveraging PHI for secondary uses.

A Privacy Governance Framework to Support De-identification

While technology is an important enabler of data de-identification, technology is not the end of the story.

RWE and Risk: A Primer

Balancing the Demand for Deep Data with Patient Privacy. As pharma companies have become more sophisticated in their use of real-world evidence (RWE), ...

Avoid the Blur of Data Masking

Learn the difference between data masking and de-identification. Often confused, data masking and de-identification are not synonymous terms when it comes to unlocking protected health information ...

De-Identification of Unstructured Data

De-identifying Unstructured Data to Enable Health Analytics. According to one organization, 80 percent of medical record data will be unstructured within the next two years.

Specialty Pharmaceuticals and Patient Privacy

In the specialty pharmaceutical industry, patient privacy is crucial. Privacy can be a challenge for companies looking to gather and consolidate patient...

10 Best Practices for ROI on HIPAA Expert Determination

The Health Insurance Portability and Accountability Act (HIPAA) requires de-identification experts to follow generally accepted statistical and scientific methods for addressing re-identification ...

Filter by Data Type

Categories