Privitar's Complete Guide to Data De-Identification

Your complete guide to data de-identification, a fundamental component of data privacy

Basics of De-Identification

1: Introduction to Data Privacy

Data de-identification is one of the fundamental components of data privacy. Get an introduction to key concepts, including anonymity and risk. Learn how de-identification relates to privacy legislation, and why it is important for organizations to act and have a plan for reducing data risk by de-identifying data.

Access Course 1
The Identifiability Spectrum Course

2: The Identifiability Spectrum, Risk and Utility

Learn about identifiability as a spectrum and how you can mitigate risk by de-identification. Find out about the wider influences on data risk and how those influences play into your data de-identification strategy. Understand the role of data utility and how it influences your choices.

Access Course 2
Why De-Identify Data?

3: Why De-Identify Data?

Find out the big three reasons why you should de-identify data and the consequences of getting it wrong. See how you can process more data safely by using de-identified data. Learn the importance of being able to provide demonstrable safeguards.

Access Course 3
Intro to De-Identification Techniques

4: De-Identification Techniques

In this course, learn about the seven main types of de-identification techniques you can use including redaction, tokenization, perturbation, substitution, hashing, encryption and generalization. Explore how each technique works with examples of the technique in action.

Access Course 4
Different De-Identification Techniques

5: How to Choose the Right De-Identification Techniques

Dive deeper into de-identification techniques. Understand the nature of attacks on data and where each technique is applicable. Discover the simple questions you can ask which determine the appropriate technique to use. Understand the need for consistency and the importance of ring-fencing outgoing datasets.

Access Course 5
Managing De-Identified Data

6: Foundations for Managing De-Identified Data

Learn how to manage de-identified data successfully. Understand why consistency, visibility and traceability are vital in your overall data privacy strategy. Explore how you can reduce risk by using distinct roles and by enabling effective oversight.

Access Course 6
De-Identification Course 7

7: Using De-Identified Data in the Real World

In this course, find out about the practical uses of data in the real world and how those use cases drive the choices you need to make. Learn from real-life examples of how de-identification is used in different of organizations and use cases.  Explore how unstructured and aggregated data can present challenges to de-identified data.

Access Course 7

Ready to learn more about Privitar?

Our team of data privacy experts is here to answer your questions and discuss how data privacy can fuel your business.

Protected data demo