In 1997, an MIT graduate student named Latanya Sweeney stunned the privacy world by matching publicly available voter rolls ...
Data identification should be the first step to implementing a comprehensive data protection strategy. In fact, data identification holds the key to ensuring the effectiveness of downstream ...
Getting your hands on a large, rich, longitudinal set of patient data is a data scientist’s dream. You can’t train a model that predicts sepsis without access to a good dataset of hospital visits. You ...
De-identification is a critical component of using patient data both ethically and legally, ensuring compliance with a myriad of privacy regulations. TripleBlind’s de-identification of data occurs in ...
IBM® Unstructured Data Identification and Management addresses the problems that challenge records management, electronic discovery, compliance, storage optimization and data migration initiatives. By ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results