White Papers

Top 5 Data Privacy Challenges

In today’s rapidly evolving data landscape, staying ahead of privacy challenges is crucial for any organization.

Differential Privacy and Risk Metrics for Creating Safe Data

Sensitive data can be reused in many ways to improve healthcare services, uncover new insights and opportunities that can influence healthcare...

Good Governance for Anonymized Data

A lot of focus is given to data governance for personal data, and just as much focus can be given to data governance for anonymized data to manage residual risks.

5 Best Practices for Driving Value Through Data Stewardship

Privacy Analytics facilitates an Executive Advisory Board (EAB) comprised of 21 senior-level executives working in data, analytics, privacy, and legal roles in private and public organizations.

Advancing Privacy-Enhancing Technologies

The importance of data sharing and analytics to drive evidence-based decision making has been highlighted by data science consortia and researchers alike.

Find Out Why Privacy Analytics Is a Top 3 Data Masking Provider Worldwide

The right data masking technology is critical to safely unlocking the value of your organization’s sensitive data for uses beyond its original intended...

Developing a Data-Sharing Leadership Playbook

Which strategies do you use to bolster your organization’s data-sharing initiatives? Are they primarily defensive or offensive?

Data Sharing: Strategies for an Uncertain World

What challenges and opportunities do you face when attempting to leverage and share sensitive data to drive innovation and increase ROI?

Solutions for Complex Data Environments

The reuse of personal data is often essential to an organization’s data strategy, but organizations can only reuse personal data if they meet the demands of privacy regulations.

Unlock the Five Safes and Maximize your Data

Get the most out of your data without compromising compliance and patient confidentiality...

GDPR and Anonymization

For companies wanting to do business in Europe, being GDPR-compliant is essential...

De-Identification 101: How to Protect Private Health Information

The growth in the use of electronic medical records, electronic insurance claims processing and other hospital software systems...

De-Identification 201: The Basics of Data De-identification

Only a handful of experts exist around the world who are qualified to manually de-identify data.

De-Identification 301: Understanding Your Likely Attackers

Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise.

De-Identification 401: De-Identifying Data the Right Way

Critics who question the value of de-identification often overlook the quality of the de-identification process.

ROI on De-identification

The business of de-identifying this data and using it for secondary purposes is only in its infancy...

De-identification Protocols

Learn what steps need to be taken in order to protect private data while limiting risk of re-identification.

Top 5 Drawbacks to Using Only Data Masking

Although data masking and de-identification are often grouped together for discussion, the two use different approaches in making data anonymous.

The Definitive Guide to De-identification

More and more organizations are leveraging their health data for secondary purposes. They know just locking away their data in silos will no longer suffice.

MIT CDOIQ Symposium 2019 Summary

Globally renowned data privacy expert Luk Arbuckle – co-author of Anonymizing Health Data (O’Reilly Media) – co-moderated this invite-only, half-day deep dive into the complex topic of bridging the ...

A Privacy Governance Framework to Support De-identification

While technology is an important enabler of data de-identification, technology is not the end of the story.

Filter by Data Type

Categories