De-Identification / Transformation / Transigram

Implementing De-identification V: From Planning to Action to Automation

Assessing needs, setting maturity goals, designing business architecture, and choosing suitable technology sets the stage for rolling out new de-identification services smoothly. This is not a one-time event, but rather a process […]

READ MORE

De-Identification / Transigram

Upcoming Series: Enterprise Guide on Implementing De-Identification

Upcoming Series: Implementing De-identification An Enterprise Implementation Guide Purchasing de-identification software and training staff to use it is a good first step – but more is needed to implement de-identification effectively. De-identification […]

READ MORE

Transformation / Transigram

Writing a policy that works

From government to corporations to non-governmental organizations, organizations of all kinds develop policies around particular issues, such as management of personal information, workplace conduct, service delivery, or accountability. After their adoption, however, […]

READ MORE

De-Identification / Transformation / Transigram

Anonymization by Design: Taking the Guesswork out of Anonymization

Anonymization is becoming a necessity for organizations that use and share large personal data holdings. The goal of anonymization is to ensure that personal data used for secondary purposes cannot identify individuals. […]

READ MORE