Home Resources 101 Guide to De-Id TY 101 Guide to De-Id TY Privitar’s Complete Guide to Data De-Identification Your complete guide to data de-identification, a fundamental component of data privacy Access Course 1 1: Introduction to Data Privacy Data de-identification is one of the fundamental components of data privacy. Get an introduction to key concepts, including anonymity and risk. Learn how de-identification relates to privacy legislation, and why it is important for organizations to act and have a plan for reducing data risk by de-identifying data. Access Course 2 2: The Identifiability Spectrum, Risk and Utility Learn about identifiability as a spectrum and how you can mitigate risk by de-identification. Find out about the wider influences on data risk and how those influences play into your data de-identification strategy. Understand the role of data utility and how it influences your choices. Access Course 3 3: Why De-Identify Data? Find out the big three reasons why you should de-identify data and the consequences of getting it wrong. See how you can process more data safely by using de-identified data. Learn the importance of being able to provide demonstrable safeguards. Access Course 4 4: De-Identification Techniques In this course, learn about the seven main types of de-identification techniques you can use including redaction, tokenization, perturbation, substitution, hashing, encryption and generalization. Explore how each technique works with examples of the technique in action. Access Course 5 5: How to Choose the Right De-Identification Techniques Dive deeper into de-identification techniques. Understand the nature of attacks on data and where each technique is applicable. Discover the simple questions you can ask which determine the appropriate technique to use. Understand the need for consistency and the importance of ring-fencing outgoing datasets. Access Course 6 6: Foundations for Managing De-Identified Data Learn how to manage de-identified data successfully. Understand why consistency, visibility and traceability are vital in your overall data privacy strategy. Explore how you can reduce risk by using distinct roles and by enabling effective oversight. Access Course 7 7: Using De-Identified Data in the Real World In this course, find out about the practical uses of data in the real world and how those use cases drive the choices you need to make. Learn from real-life examples of how de-identification is used in different of organizations and use cases. Explore how unstructured and aggregated data can present challenges to de-identified data. No List