De-Identification / Transformation / Transigram

Implementing De-identification V: From Planning to Action to Automation

Assessing needs, setting maturity goals, designing business architecture, and choosing suitable technology sets the stage for rolling out new de-identification services smoothly. This is not a one-time event, but rather a process […]


De-Identification / Open Data / Transformation

Implementing De-identification III: Designing De-identification Business Architecture

Tagged ,

De-identification business architecture aims to ensure that de-identification is used with clear purposes and rules, integrates smoothly into your organization’s business process, and is genuinely useful to clients. The first two posts […]


De-Identification / Transformation

Implementing De-identification II: How Mature Is Your De-identification Practice?

Last week, we discussed defining use cases as a first step towards implementing de-identification effectively. The next step is to assess your existing de-identification practices and develop a plan to improve them. […]