A comprehensive set of privacy preserving techniques
De-Identification Requires a Platform Approach
The scope of data, users and purposes in your enterprise is vast. You need a data privacy platform that can meet the requirements for every context; a simple one size fits all using only masking or tokenization or encryption will fall flat.
That’s why the Privitar Data Privacy Platform™ enables you to select from the full range of de-identification techniques in any combination so you can tune the data resolution and re-identification risk according to each individual analysis, model or use.
Access Privitar’s Guide to Data De-Identification
The Privitar Data De-identification 101 series provides a ground-level introduction to the issues surrounding data de-identification, one of the fundamental components of data privacy.
Understand Data ContextA successful data privacy program takes full account of data context. Context includes:
- Dataset required for each analysis/model
- Combinations of direct and quasi-identifiers
- Different access rights and privileges of the employees and third parties
- Data users’ access to other datasets that could be used in a linkage attack
- The questions asked and insights sought
De-Identification TechniquesOnce you understand the data context, you are equipped to select and apply the right techniques from Privitar’s full roster in any combination to the direct and quasi-identifiers.
Advanced CapabilitiesIt’s not just about having the full set of deidentification techniques from which to choose for a given data context. Privitar also provides you the flexibility to decide when to preserve consistency, format and reversibility. For advanced data privacy programs, only the Privitar Data Privacy Platform layers on the capabilities of SecureLink™ and differential privacy – giving you the power to safely combine, share or release data.
Ready to learn more?
Our team of data privacy experts are here to answer your questions and discuss how data privacy can fuel your business.