Data de-identification is one of the fundamental components of data privacy. Get an introduction to key concepts, including anonymity and risk. Learn how de-identification relates to privacy legislation, and why it is important for organizations to act and have a plan for reducing data risk by de-identifying data.Access Course 1
Learn about identifiability as a spectrum and how you can mitigate risk by de-identification. Find out about the wider influences on data risk and how those influences play into your data de-identification strategy. Understand the role of data utility and how it influences your choices.Access Course 2
Find out the big three reasons why you should de-identify data and the consequences of getting it wrong. See how you can process more data safely by using de-identified data. Learn the importance of being able to provide demonstrable safeguards.Access Course 3
In this course, learn about the seven main types of de-identification techniques you can use including redaction, tokenization, perturbation, substitution, hashing, encryption and generalization. Explore how each technique works with examples of the technique in action.Access Course 4
Dive deeper into de-identification techniques. Understand the nature of attacks on data and where each technique is applicable. Discover the simple questions you can ask which determine the appropriate technique to use. Understand the need for consistency and the importance of ring-fencing outgoing datasets.Access Course 5
Learn how to manage de-identified data successfully. Understand why consistency, visibility and traceability are vital in your overall data privacy strategy. Explore how you can reduce risk by using distinct roles and by enabling effective oversight.Access Course 6
In this course, find out about the practical uses of data in the real world and how those use cases drive the choices you need to make. Learn from real-life examples of how de-identification is used in different of organizations and use cases. Explore how unstructured and aggregated data can present challenges to de-identified data.Access Course 7
Our team of data privacy experts is here to answer your questions and discuss how data privacy can fuel your business.