Loading...

Tag: de-identification

Implementing De-identification IV: How to Choose De-identification Software

Whether you decide to perform de-identification internally or procure a service provider, it is important that the technology to be used fits your organization’s needs and goals, and has the [ … ]

Implementing De-identification III: Designing De-identification Business Architecture

De-identification business architecture aims to ensure that de-identification is used with clear purposes and rules, integrates smoothly into your organization’s business process, and is genuinely useful to clients. The first [ … ]

%d bloggers like this: