Data identification should be the first step to implementing a comprehensive data protection strategy. In fact, data identification holds the key to ensuring the effectiveness of downstream ...
In 1997, an MIT graduate student named Latanya Sweeney stunned the privacy world by matching publicly available voter rolls ...
Getting your hands on a large, rich, longitudinal set of patient data is a data scientist’s dream. You can’t train a model that predicts sepsis without access to a good dataset of hospital visits. You ...
De-identification is a critical component of using patient data both ethically and legally, ensuring compliance with a myriad of privacy regulations. TripleBlind’s de-identification of data occurs in ...
Australian Attorney-General George Brandis has introduced into the Senate the legislation criminalising the re-identification of de-identified datasets that are collected and published by the ...
Value stream management involves people in the organization to examine workflows and other processes to ensure they are deriving the maximum value from their efforts while eliminating waste — of ...
Things like your name, home address, date of birth and even your Social Security number may have been sitting on the open internet. Researchers say an unprotected database tied to IDMerit, a company ...