2-Day Intensive Data De-Identification Training Course

Driving data value requires careful consideration beyond legal compliance under GDPR, HIPAA and state-level laws like CCPA.
Once you’ve completed this two-day course, you’ll know what’s required to maximize data utility while meeting your organization’s regulatory and privacy obligations.
Icon

Understand data de-identification and learn how to protect privacy

This course is designed to give you a better understanding of the HITRUST De-Identification Framework. You’ll learn about practical methods and tools used to render data non-identifiable (for example, de-identified under the HIPAA “Expert Determination” method; or anonymized under GDPR).

The primary material is delivered online or in-person by an instructor over two full days—either using a virtual environment, or privately, on-site at your own location.

 

The HITRUST De-Identification Framework offers a consistent, managed methodology for data de-identification and the sharing of compliance and risk information.

abigail
“Privacy Analytics’ training course provides a straightforward, pragmatic and accessible methodology to safely leverage sensitive data while protecting privacy. It’s helped me achieve greater confidence in bridging the legal, operational, business and technical aspects of data de-identification to ensure more seamless, efficient outcomes.”

Abigail Dubiniecki, Lawyer at nNovation LLP and Data Privacy Specialist at My Inhouse Lawyer

Learning Objectives and Benefits

What you will learn…

  • Key principles behind measuring identifiability and establishing defensible thresholds to render data non-identifiable.
  • How to apply de-identification to protect privacy while leveraging the power of your data.
  • Risk management and reporting necessary to provide auditable proof you’ve taken consistent, defensible steps toward protecting privacy.
The benefits to you and your organization...

 

  • Safely leverage sensitive data for analytics that drive priority business outcomes.
  • Align business and privacy teams to protect your organization’s sensitive data and uncover its untapped value.
  • Improve the efficiency of your data analysis and management operations by integrating industry-leading techniques with your existing processes and procedures.

Who Needs to Know About Data De-Identification?

This course is designed for professionals working in…
Analytics_Up_Icon
Analytics
Compliance_Icon
Compliance
Data_Graph_Icon
Data
Legal_Icon
Legal
Privacy_Management_Icon
Privacy
Computer_Security_Icon
Security
Bar_Graph_Icon
Statistics
Add_Icon
... and other domains

Learn from the Experts in Data Privacy

luk_head-2023-1024x1024
Luk Arbuckle
AI Practice Lead
Luk provides strategic leadership to our clients and to our organization on how to responsibly share and use data. He draws from an extensive background in statistics, data science and anonymization
Santa_Borel
Santa Borel
Head of Delivery, Data Privacy Solutions
Santa Borel helps clients maximize their investment in Privacy Analytics’ Eclipse Risk software platform in support of new product innovation, improved service delivery and business growth.
Brian-Rasquinha
Brian Rasquinha
Associate Director, Solution Architecture, Privacy Analytics
Brian draws on his expertise in privacy regulation and anonymization to determine what combination of Privacy Analytics’ will best support the immediate and long-term needs of each of our clients.

Course Curriculum

Module 1
Legal Considerations
A strong foundation begins here. Learn about compliance with HIPAA, GDPR, and state-level laws like CCPA.
Module 2
Concepts and Definitions
Understand the critical terms and principles used to define sensitive data and de-identification.
Module 3
Risk Measurement Concepts
Explore risk concepts and measurement methodologies that guide de-identification.
Module 4
Analysis of Context Risk
Discussion of different types of context risk and how to assess them for your specific environment.
Module 5
Data Transformation Methods
Methods for data de-identification, including pseudonymization, masking, and other transformation techniques.
Module 6
Risk Management and Reporting
De-identifying data is only part of the story—learn how to manage risks and report outcomes to stakeholders.

Schedule your data de-identification training

Privacy Policy