Conduct a remote Q&A project scoping video conference with client’s representatives
Receive source data or securely connect to client’s network
Identify direct and indirect identifiers
Define masking, suppression, or de-identification transformation rules
Create the software that transforms the source input data using the rules defined in the previous step
Perform Info Incognito internal quality assurance review of the anonymized data to ensure accuracy
Create the anonymized target data set or database
The automated masking solution can be installed on-site or it can be managed remotely from our secure hosting center over a private encrypted secure network. Our solution can be applied to any industry that is required to protect the privacy of individuals including insurance, financial services, education, human resources, advertising, retail, and others.
This service enables our clients to utilize valuable data for secondary purposes while still meeting regulatory requirements. It also significantly reduces the risks, costs, and damages associated with internal and external data breach.
Take a step forward and contact us to schedule a project scoping consultation.
We can apply our sophisticated risk-based methodology to your datasets. We have an expert committee comprised of PHD and Master’s level computer science, mathematics, and statistics experts that work together focusing on your data sharing initiatives.
The first step is contacting us to schedule a project scoping consultation or to learn more.
Please contact Info Incognito at your convenience for an initial consultation. We’ll work with your team to help secure your data and reduce your risk.
Call Today: (800) 871-9247
Info Incognito applies a sophisticated risk-based methodology to enable the sharing of sensitive data between organizations for secondary research or other purposes. We create supporting documentation and automated solutions to anonymize and de-identify personally identifiable information (PII) and other sensitive quasi identifiers contained in electronic databases and data files.
Our approach evaluates functional needs, mitigating controls, motives, capacity, and data sensitivity for the purpose of establishing information sharing risk thresholds. Generalization hierarchies for quasi-identifiers are created feeding into a lattice evaluation process. Then, multiple cluster based methods like k-anonymity, l-diversity, t-closeness are applied to sufficiently de-identify sensitive information while minimizing information loss and ultimately delivering on the functional usefulness of the data.
Info Incognito has a sophisticated risk-based methodology for implementing the HIPAA Expert Determination method.
Please contact us to learn more about our approach.
Info Incognito has a defined HIPAA Safe Harbor process consisting of five steps for anonymizing the data and delivering the results. We start out with an initial project scoping consultation that sets the stage and ultimately determines the techniques that will be used to perform anonymization by first discussing.
Below is a high-level outline of our five step process: