White Papers

10 Best Practices for ROI on HIPAA Expert Determination

The Health Insurance Portability and Accountability Act (HIPAA) requires de-identification experts to follow...

Good Governance for Anonymized Data

A lot of focus is given to data governance for personal data, and just as much focus can be given to data governance for anonymized data to manage residual risks.

Advancing Privacy-Enhancing Technologies

The importance of data sharing and analytics to drive evidence-based decision making has been highlighted by data science consortia and researchers alike.

Find Out Why Privacy Analytics Is a Top 3 Data Masking Provider Worldwide

The right data masking technology is critical to safely unlocking the value of your organization’s sensitive data for uses beyond its original intended...

Solutions for Complex Data Environments

The reuse of personal data is often essential to an organization’s data strategy, but organizations can only reuse personal data if they meet the demands of privacy regulations.

Unlock the Five Safes and Maximize your Data

Get the most out of your data without compromising compliance and patient confidentiality...

De-Identification 101: How to Protect Private Health Information

The growth in the use of electronic medical records, electronic insurance claims processing and other hospital software systems...

De-Identification 301: Understanding Your Likely Attackers

Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise.

De-Identification 401: De-Identifying Data the Right Way

Critics who question the value of de-identification often overlook the quality of the de-identification process.

Perspectives on Health Data De-identification

Has your organization been considering de-identification? It’s not a simple undertaking to use Protected Health Information (PHI) for secondary purposes.

Top 5 Drawbacks to Using Only Data Masking

Although data masking and de-identification are often grouped together for discussion, the two use different approaches in making data anonymous.

The Definitive Guide to De-identification

More and more organizations are leveraging their health data for secondary purposes. They know just locking away their data in silos will no longer suffice.

What’s the Risk – Sharing Data for Secondary Use

Privacy Officers know that sharing data for secondary use is inherently an exercise in risk management.

Strengthening Secondary Use

Data registries are an invaluable tool that require the secondary use of data for conducting evidence-based healthcare research.

Unlocking Big Data for Healthcare

There are powerful opportunities facing healthcare today. Big Data Analytics (BDA) is being leveraged by a broad spectrum of healthcare organizations to solve ongoing challenges...

A Privacy Governance Framework to Support De-identification

While technology is an important enabler of data de-identification, technology is not the end of the story.

Avoid the Blur of Data Masking

Learn the difference between data masking and de-identification. Often confused, data masking and de-identification are not synonymous terms when it comes to unlocking protected health information ...

De-Identification of Unstructured Data

De-identifying Unstructured Data to Enable Health Analytics. According to one organization, 80 percent of medical record data will be unstructured within the next two years.

Achieving Clinical Trials Transparency

Recent policy changes by Europe’s regulatory authority for drugs and devices has rekindled the pharmaceutical industry’s focus on clinical trials transparency.

Specialty Pharmaceuticals and Patient Privacy

In the specialty pharmaceutical industry, patient privacy is crucial. Privacy can be a challenge for companies looking to gather and consolidate patient...

10 Best Practices for ROI on HIPAA Expert Determination

The Health Insurance Portability and Accountability Act (HIPAA) requires de-identification experts to follow generally accepted statistical and scientific methods for addressing re-identification ...

Filter by Data Type

Categories