Quantcast
Browsing all 187 articles
Browse latest View live

A Primer on Protecting Health Information

Everything you need to know about PHI and de-identification (but were too afraid to ask) With the growing use of electronic medical records, prevalence of electronic insurance claims processing and...

View Article


Blurred Lines

Avoid blurred lines: data masking and real de-identification are not the same Often confused, data masking and de-identification are not synonymous terms when it comes to unlocking protected health...

View Article


Learning about the HIPAA Privacy Rule

Understanding the differences between the two veins of the Privacy Rule Initially proposed in November 1999, the U.S. Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule created a...

View Article

An Optimal Approach to De-Identification

Real de-identification is a risk management exercise We often hear people say de-identification doesn’t work. We hear this so often, we created a blog post about it. Critics who question the value of...

View Article

Image may be NSFW.
Clik here to view.

Risk Monitor Demo

Your Trusted Partner in Risk Assessment Risk Monitor ensures your organization is staying compliant when sharing data for secondary use.  It is the only software available that can perform a risk...

View Article


What’s the Risk?

What’s the Risk – Sharing Data for Secondary Use: Six Ways Privacy Officers Can Limit Risk Exposure When Sharing or Monetizing Data Assets Healthcare organization are now recognizing the potential of...

View Article

ROI on De-identification

Understanding the true value of anonymization means realizing how your organization can see ROI on de-identification. Many healthcare organizations are sharing protected health information, this is a...

View Article

Fundamentals of De-Identification

You know why you need to de-identify, now get an idea of how When it comes to de-identification, a risk-based approach wins hands down at safely mitigating risk of re-identification and allowing data...

View Article


Risk Monitor Overview

Ensure your data sharing is compliant with Risk Monitor Learn everything there is to know about our revolutionary new product by watching the Risk Monitor Overview. In less than 5 minutes, Pamela...

View Article


Privacy Analytics Launches Risk Monitor

Risk Monitor software provides risk assessment and threat modeling capabilities to improve data governance and ensure privacy compliance as demand for ‘Big Data’ sharing increases Ottawa, ON, November...

View Article

Anonymizing Clinical Trial Data in Practice

On October 29, 2015, Privacy Analytics held a side event at the 37th International Privacy Conference in Amsterdam, The Netherlands. This event, The Anonymization of Clinical Trial Data in Practice,...

View Article

A Case Study of De-identifying a Clinical Trial Data Set

Interested in learning more about de-identifying a clinical trial data set? Don’t miss this webinar! A Case Study of De-identifying a Clinical Trial Data Set Using a Risk-based Method Many trial...

View Article

Re-Identification Attacks

Re-Identification attacks happen – but here’s what you can do about it The biggest risk when sharing sensitive data for research and analytics lies in the re-identification of individuals in the data....

View Article


De-identifying Unstructured Data

There is a surplus of analytics waiting to be tapped by de-identifying unstructured data resources Often overlooked, unstructured data is a rich source of information. This data represents text data...

View Article

Limiting Risk When Sharing PHI

Six Strategies for Privacy Officers to Protect their Organization and Limit Risk when Sharing PHI Privacy Officers have a huge challenge in front of them. Demand to share data is growing. Demand to...

View Article


The State of Data Sharing for Healthcare Analytics

Change, Challenges and Choice Privacy Analytics is proud to introduce The State of Data Sharing for Healthcare Analytics 2015-2016, a comprehensive and informative survey on health data sharing and...

View Article

Survey Shows Risk Growing Along with Data Sharing

Demand for access to health data outpacing the ability to ensure patient privacy Ottawa, ON, December 02, 2015 – As the demand for data sharing increases, more than two out of three healthcare...

View Article


The 21st Century Cures Act: Help or Hinder?

Will the 21st Century Cures Act Help or Hinder Secondary Use of Health Data? The 21st Century Cures Act is proposed legislation that aims to accelerate the discovery, development and delivery of...

View Article

What’s in your data?

Understanding how you categorize your data is the first step in the data sharing process. As proponents of risk-based de-identification, we believe to understand the risk inherent in datasets, a solid...

View Article

Making the Case for De-Identification

When sharing sensitive data for secondary purposes, there is no question that the data must be de-identified. As proponents of risk-based de-identification, we advocate for risk-measurement to be a...

View Article
Browsing all 187 articles
Browse latest View live