Universal security and privacy automation
Protect data and manage risk
Analyze conversational chat data
Reduce the time and cost to comply
Self-service without friction or delay
Align data protection and business use
Tailor access controls and data privacy
Flexible, consistent, scalable
Automate actionable compliance steps
Who we integrate with
Our professional services
Power responsible use
From clinical to commercial
Optimize data tests
Open new revenue streams
Realize the potential of the cloud
Protect data from misuse
Transform your data
Opinion and industry insights
An A to Z of the industry
The podcast for data leaders
Press releases, awards, and more
Staying at the cutting edge
The team behind Privitar
A thriving partner ecosystem
Our story, values, and careers
Dedicated customer assistance
The A-Z of Privacy
An de-identification technique that replaces a value with another pre-defined value. The mapping of original values to replacement values is deterministic. That is, it is defined upfront, and thus allows for a high degree of control over the output data. However, this also means the mapping itself should be protected and not be disclosed externally.
Substitution can also provide a form of generalization, where the substituted value is less precise than the original and several values map to it.
For example, the value iPhone X could be mapped to be substituted by value iPhone – Type 1, and iPhone 8 could be substituted by iPhone – Type 2.
An alternative substitution method could be to map iPhone X and iPhone 8 to the value iPhone.
Return to glossary
Our experts are ready to answer your questions and discuss how Privitar’s security and privacy solutions can fuel your efficiency, innovation, and business growth.