Implementing De-identification V: From Planning to Action to Automation

De-Identification / Transformation / Transigram

Implementing De-identification V: From Planning to Action to Automation

Assessing needs, setting maturity goals, designing business architecture, and choosing suitable technology sets the stage for rolling out new de-identification services smoothly. This is not a one-time event, but rather a process […]

READ MORE

Implementing De-identification IV: How to Choose De-identification Software

De-Identification / Transformation / Transigram

Implementing De-identification IV: How to Choose De-identification Software

Tagged , ,

Whether you decide to perform de-identification internally or procure a service provider, it is important that the technology to be used fits your organization’s needs and goals, and has the capacity to […]

READ MORE

Implementing De-identification I: Who Gets What Kind of Data?

De-Identification / Transformation / Transigram

Implementing De-identification I: Who Gets What Kind of Data?

In our first article of our Implementing De-identification series, we discuss how to define use cases as a means to establish who will be receiving de-identified data and what types of data […]

READ MORE

Upcoming Series: Enterprise Guide on Implementing De-Identification

De-Identification / Transigram

Upcoming Series: Enterprise Guide on Implementing De-Identification

Upcoming Series: Implementing De-identification An Enterprise Implementation Guide Purchasing de-identification software and training staff to use it is a good first step – but more is needed to implement de-identification effectively. De-identification […]

READ MORE

Writing a policy that works

Transformation / Transigram

Writing a policy that works

From government to corporations to non-governmental organizations, organizations of all kinds develop policies around particular issues, such as management of personal information, workplace conduct, service delivery, or accountability. After their adoption, however, […]

READ MORE

Anonymization by Design: Taking the Guesswork out of Anonymization

De-Identification / Transformation / Transigram

Anonymization by Design: Taking the Guesswork out of Anonymization

Anonymization is becoming a necessity for organizations that use and share large personal data holdings. The goal of anonymization is to ensure that personal data used for secondary purposes cannot identify individuals. […]

READ MORE

News

How Big Data Is Transforming Environmental Sustainability

Big data is the driving force behind the information revolution. According to estimates from IBM, we have access to 300 times the amount of information that was available in 2005, only 14 […]

READ MORE

News

Enhancing your Development with Kotlin

Right since it was announced in Google IO ‘17, Kotlin has been a big hit among developers and many are now switching their development from traditional Java to Kotlin. My aim is […]

READ MORE

News

Technology and Big Data are Bringing in a New Wave of Financial Advising

Thanks to tech, investors have so many more options now than they did in the past, including a multitude of choices for financial advising — however, that may be exactly why so […]

READ MORE

News

Why Our Fast-Changing World Requires Us to Change Collaboration

The world around us is changing faster than ever before. It is changing politically (Brexit), socially (generation Z hitting the labour market), technologically (AI, quantum computing, blockchain and IoT coming our way), […]

READ MORE

%d bloggers like this: