Self-service access to safe data
Protect data and manage risk
Analyze conversational chat data
Reduce the time and cost to comply
Right data in the right hands
Align control and business use
Controlled access to data
Flexibility, consistency, scalability
Our professional services
Power responsible use
From clinical to commercial
Optimize data tests
Open new revenue streams
Realize the potential of the cloud
Protect data from misuse
Transform your data
Opinion and industry insights
An A to Z of the industry
The podcast for data leaders
Press releases, awards, and more
Staying at the cutting edge
The team behind Privitar
A thriving partner ecosystem
Our story, values, and careers
Dedicated customer assistance
The A-Z of Privacy
An de-identification technique that replaces a value with another pre-defined value. The mapping of original values to replacement values is deterministic. That is, it is defined upfront, and thus allows for a high degree of control over the output data. However, this also means the mapping itself should be protected and not be disclosed externally.
Substitution can also provide a form of generalization, where the substituted value is less precise than the original and several values map to it.
For example, the value iPhone X could be mapped to be substituted by value iPhone – Type 1, and iPhone 8 could be substituted by iPhone – Type 2.
An alternative substitution method could be to map iPhone X and iPhone 8 to the value iPhone.
Return to glossary
Our team of data security and privacy experts are here to answer your questions and discuss how modern data provisioning can fuel business growth.