Privitar’s Complete Guide to Data De-Identification

Your complete guide to data de-identification, a fundamental component of data privacy

Basics of De-Identification

Access Course 1

1: Introduction to Data Privacy

Data de-identification is one of the fundamental components of data privacy. Get an introduction to key concepts, including anonymity and risk. Learn how de-identification relates to privacy legislation, and why it is important for organizations to act and have a plan for reducing data risk by de-identifying data.

The Identifiability Spectrum Course

Access Course 2

2: The Identifiability Spectrum, Risk and Utility

Learn about identifiability as a spectrum and how you can mitigate risk by de-identification. Find out about the wider influences on data risk and how those influences play into your data de-identification strategy. Understand the role of data utility and how it influences your choices.

Why De-Identify Data?

Access Course 3

3: Why De-Identify Data?

Find out the big three reasons why you should de-identify data and the consequences of getting it wrong. See how you can process more data safely by using de-identified data. Learn the importance of being able to provide demonstrable safeguards.

Intro to De-Identification Techniques

Access Course 4

4: De-Identification Techniques

In this course, learn about the seven main types of de-identification techniques you can use including redaction, tokenization, perturbation, substitution, hashing, encryption and generalization. Explore how each technique works with examples of the technique in action.

Different De-Identification Techniques

Access Course 5

5: How to Choose the Right De-Identification Techniques

Dive deeper into de-identification techniques. Understand the nature of attacks on data and where each technique is applicable. Discover the simple questions you can ask which determine the appropriate technique to use. Understand the need for consistency and the importance of ring-fencing outgoing datasets.

Managing De-Identified Data

Access Course 6

6: Foundations for Managing De-Identified Data

Learn how to manage de-identified data successfully. Understand why consistency, visibility and traceability are vital in your overall data privacy strategy. Explore how you can reduce risk by using distinct roles and by enabling effective oversight.

De-Identification Course 7

Access Course 7

7: Using De-Identified Data in the Real World

In this course, find out about the practical uses of data in the real world and how those use cases drive the choices you need to make. Learn from real-life examples of how de-identification is used in different of organizations and use cases.  Explore how unstructured and aggregated data can present challenges to de-identified data.