Implementing De-identification IV: How to Choose De-identification Software

De-Identification / Transformation / Transigram

Implementing De-identification IV: How to Choose De-identification Software

Tagged , ,

Whether you decide to perform de-identification internally or procure a service provider, it is important that the technology to be used fits your organization’s needs and goals, and has the capacity to […]

READ MORE

Implementing De-identification III: Designing De-identification Business Architecture

De-Identification / Open Data / Transformation

Implementing De-identification III: Designing De-identification Business Architecture

Tagged ,

De-identification business architecture aims to ensure that de-identification is used with clear purposes and rules, integrates smoothly into your organization’s business process, and is genuinely useful to clients. The first two posts […]

READ MORE