An ongoing challenge with big data and other secondary analytics initiatives is getting access to data. This Advisor describes a risk-based approach to de-identification, in which the data is transformed and administrative and technical controls are put in place.
Not a member? Gain Access to the Cutter Experts today — register now to read select open-access articles.
Member/Guest loginForgot your password?