Loading...

Category: Transigram

Implementing De-identification V: From Planning to Action to Automation

Assessing needs, setting maturity goals, designing business architecture, and choosing suitable technology sets the stage for rolling out new de-identification services smoothly. This is not a one-time event, but rather [ … ]

Implementing De-identification IV: How to Choose De-identification Software

Whether you decide to perform de-identification internally or procure a service provider, it is important that the technology to be used fits your organization’s needs and goals, and has the [ … ]

Implementing De-identification I: Who Gets What Kind of Data?

In our first article of our Implementing De-identification series, we discuss how to define use cases as a means to establish who will be receiving de-identified data and what types [ … ]

Upcoming Series: Enterprise Guide on Implementing De-Identification

Upcoming Series: Implementing De-identification An Enterprise Implementation Guide Purchasing de-identification software and training staff to use it is a good first step – but more is needed to implement de-identification [ … ]

Writing a policy that works

From government to corporations to non-governmental organizations, organizations of all kinds develop policies around particular issues, such as management of personal information, workplace conduct, service delivery, or accountability. After their [ … ]

Anonymization by Design: Taking the Guesswork out of Anonymization

Anonymization is becoming a necessity for organizations that use and share large personal data holdings. The goal of anonymization is to ensure that personal data used for secondary purposes cannot [ … ]

%d bloggers like this: