A Primer on Protecting Health Information
Everything you need to know about PHI and de-identification (but were too afraid to ask) With the growing use of electronic medical records, prevalence of electronic insurance claims processing and...
View ArticleBlurred Lines
Avoid blurred lines: data masking and real de-identification are not the same Often confused, data masking and de-identification are not synonymous terms when it comes to unlocking protected health...
View ArticleLearning about the HIPAA Privacy Rule
Understanding the differences between the two veins of the Privacy Rule Initially proposed in November 1999, the U.S. Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule created a...
View ArticleAn Optimal Approach to De-Identification
Real de-identification is a risk management exercise We often hear people say de-identification doesn’t work. We hear this so often, we created a blog post about it. Critics who question the value of...
View ArticleRisk Monitor Demo
Your Trusted Partner in Risk Assessment Risk Monitor ensures your organization is staying compliant when sharing data for secondary use. It is the only software available that can perform a risk...
View ArticleWhat’s the Risk?
What’s the Risk – Sharing Data for Secondary Use: Six Ways Privacy Officers Can Limit Risk Exposure When Sharing or Monetizing Data Assets Healthcare organization are now recognizing the potential of...
View ArticleROI on De-identification
Understanding the true value of anonymization means realizing how your organization can see ROI on de-identification. Many healthcare organizations are sharing protected health information, this is a...
View ArticleFundamentals of De-Identification
You know why you need to de-identify, now get an idea of how When it comes to de-identification, a risk-based approach wins hands down at safely mitigating risk of re-identification and allowing data...
View ArticleRisk Monitor Overview
Ensure your data sharing is compliant with Risk Monitor Learn everything there is to know about our revolutionary new product by watching the Risk Monitor Overview. In less than 5 minutes, Pamela...
View ArticlePrivacy Analytics Launches Risk Monitor
Risk Monitor software provides risk assessment and threat modeling capabilities to improve data governance and ensure privacy compliance as demand for ‘Big Data’ sharing increases Ottawa, ON, November...
View ArticleAnonymizing Clinical Trial Data in Practice
On October 29, 2015, Privacy Analytics held a side event at the 37th International Privacy Conference in Amsterdam, The Netherlands. This event, The Anonymization of Clinical Trial Data in Practice,...
View ArticleA Case Study of De-identifying a Clinical Trial Data Set
Interested in learning more about de-identifying a clinical trial data set? Don’t miss this webinar! A Case Study of De-identifying a Clinical Trial Data Set Using a Risk-based Method Many trial...
View ArticleRe-Identification Attacks
Re-Identification attacks happen – but here’s what you can do about it The biggest risk when sharing sensitive data for research and analytics lies in the re-identification of individuals in the data....
View ArticleDe-identifying Unstructured Data
There is a surplus of analytics waiting to be tapped by de-identifying unstructured data resources Often overlooked, unstructured data is a rich source of information. This data represents text data...
View ArticleLimiting Risk When Sharing PHI
Six Strategies for Privacy Officers to Protect their Organization and Limit Risk when Sharing PHI Privacy Officers have a huge challenge in front of them. Demand to share data is growing. Demand to...
View ArticleThe State of Data Sharing for Healthcare Analytics
Change, Challenges and Choice Privacy Analytics is proud to introduce The State of Data Sharing for Healthcare Analytics 2015-2016, a comprehensive and informative survey on health data sharing and...
View ArticleSurvey Shows Risk Growing Along with Data Sharing
Demand for access to health data outpacing the ability to ensure patient privacy Ottawa, ON, December 02, 2015 – As the demand for data sharing increases, more than two out of three healthcare...
View ArticleThe 21st Century Cures Act: Help or Hinder?
Will the 21st Century Cures Act Help or Hinder Secondary Use of Health Data? The 21st Century Cures Act is proposed legislation that aims to accelerate the discovery, development and delivery of...
View ArticleWhat’s in your data?
Understanding how you categorize your data is the first step in the data sharing process. As proponents of risk-based de-identification, we believe to understand the risk inherent in datasets, a solid...
View ArticleMaking the Case for De-Identification
When sharing sensitive data for secondary purposes, there is no question that the data must be de-identified. As proponents of risk-based de-identification, we advocate for risk-measurement to be a...
View Article