Category: De-Identification
De-Identification / Transigram
Upcoming Series: Enterprise Guide on Implementing De-Identification
Upcoming Series: Implementing De-identification An Enterprise Implementation Guide Purchasing de-identification software and training staff to use it is a good first step – but more is needed to implement de-identification effectively. De-identification […]
READ MORE
De-Identification / Transformation / Transigram
Anonymization by Design: Taking the Guesswork out of Anonymization
Anonymization is becoming a necessity for organizations that use and share large personal data holdings. The goal of anonymization is to ensure that personal data used for secondary purposes cannot identify individuals. […]
READ MORE
Big Privacy / De-Identification / Enterprise Architecture
A Case for De-identification Business Architecture
Purchasing de-identification software and training staff to use it is a good first step – but more is needed to build an effective de-identification service. De-identification business architecture helps to clarify the […]
READ MORE
Big Privacy / De-Identification / Open Data
Privacy Clock
A straightforward strategy for companies which handle personal data to engage effectively with the #public on #privacy issues #PbD
READ MORE
MOST COMMENTED
News
How Big Data Is Transforming Environmental Sustainability
News
Why Our Fast-Changing World Requires Us to Change Collaboration
News
Forces of Bitcoin – Cryptography
News
Open Source Security Risks and Vulnerabilities to Know in 2019
News
Enhancing your Development with Kotlin
News
Technology and Big Data are Bringing in a New Wave of Financial Advising
News
Digital Supply Chain: Connecting the Dots of Design to Operate SCM Processes